Contact us for Pricing or Questions:      (888) 682-5335          *We Ship Worldwide

IBM i Performance Optimization: Improving Application Response Times

Keeping your IBM i optimized for optimal response times requires regular monitoring of system resources and identifying various elements that affect application performance. Poor response times of only two or three seconds delay can quickly get compounded over time when poorly written applications are involved or database maintenance has been neglected. Like most performance degradation issues on the IBM i , response time issues only get worse as the number of transactions multiply. Ignoring sys...
Continue reading

2019 IBM QRadar Price List by License

2019 IBM QRadar Price List by License
*Also see QRadar Pricing on all IBM SIEM Security Intelligence Product Prices (including QRadar Hardware Appliances)   2019 QRadar Manufacturer Suggested Retail Price Chart by License * MSRP   QRadar SIEM by IBM Security - Event Processor Virtual 1690 - Failover Install License + SW Subscription & Support 12 Months (D0WSSLL) $6,420.00 Get Pricing QRadar SIEM by IBM Security - Flow Processor Virtual 1790 - Failover Install License + SW Subscription & Support 12 Months (D0WSYLL) ...
Continue reading

IBM Power System's Fastest RAID Controller

IBM EJ14 PCIe3 12 GB Cache RAID Plus SAS Adapter is the highest performing raid controller (SAS adapter) for IBM Power9 and Power8 systems that will significantly improve raid performance. The IBM EJ14 PCIe3 12 GB Cache RAID PLUS SAS Adapter has four 6 Gb connectors enabling the highest performance HDD or SSD  SAS controller capabilities for IBM Power systems using PCIe Gen3 technology and IBM’s latest SAS RAID adapter technology. The EJ14 PCIe3 SAS adapter builds on the success of the EJ0L...
Continue reading

POWER9: Main changes and updates Vs POWER8

POWER9: Main changes and updates Vs POWER8
POWER9 is here , and with it comes loads of new hardware. With the second batch of released hardware there are several new systems that are focused on small and mid-range applications. These include Power9 models  S922 , S914 , and S924 as well as Linux and SAP Hana specialized variants, the L922, L924, H922, and H924. The new systems are util...
Continue reading

IBM i Backup Performance and Optimization

IBM i Backup Performance and Optimization
IBM i backup performance is affected by many variables, and many data transfer rate bottlenecks can be very easy to resolve. Some simple changes you can try to improve backup performance may only require using the correct media generation for your tape library/drive, minimize resource sharing, shortening the distance between the IBM i PCIe I/O adapter and tape library/drive, using backup optimization settings or restructuring your backup processes. These minor changes are virtually free to try a...
Continue reading

IBM z SIEM and SYSLOG Forwarding Considerations

IBM z SIEM and SYSLOG Forwarding Considerations
The IBM z mainframe system remains the workhorse for most of the largest and most successful companies in the world, maintaining both mission critical legacy software applications and new workloads. In the scope of sensitive data and security, the IBM z/OS protects the company’s jewels for good reason, but has a plethora of system and security event log sources that must be monitored and forwarded to a SIEM like IBM QRadar and LogRhythm or a  SYSLOG Server like the Splunk. Since IBM mainfra...
Continue reading

IBM z: More than a legacy workhorse

IBM z: More than a legacy workhorse
IBM mainframe systems are still running the bulk of critical workloads at over 70% of the world’s largest and most successful companies. The first IBM mainframe and 911 Porcshe were both sold in same year, 1964. Most people do not realize how advanced and powerful the IBM z platform is, and always has been. The fact is, virtualization was being developed on the IBM mainframe in the 1960s and added this amazing new technology to the platform in 1972, decades before any other platform. To this day...
Continue reading

IBM i Power System Upgrade: Is it needed?

IBM i Power System Upgrade: Is it needed?
Is it time to upgrade your IBM i Power System? Or do you need to upgrade your IBM i Power System? Most companies upgrade their IBM Power systems on a scheduled interval, but there are instances when response times and throughput bottlenecks cause unacceptable performance levels, and a quick fix is needed. IBM i response times and throughput rely on common system resources and can have a similar effect on performance from an end user experience, but the variables that cause them are very differen...
Continue reading

IBM i Security: Compliance Requires Access Controls

IBM i Security: Compliance Requires Access Controls
Security breaches making headlines are almost always due to inadequate access controls at one or more levels of the company’s infrastructure. Known and unknown vulnerabilities may have assisted in some of these breaches, but with the proper access controls in place, they could have been prevented or significantly minimized. The IBM i is not immune, and is not the most secure platform in your environment if necessary access controls have not been implemented. All compliance regulations have gener...
Continue reading

IBM i Performance Issues and Degradation

IBM i Performance Issues and Degradation
Sporadic IBM i  performance issues and prolonged degradation that slowly creeps up over time can sometimes be abated by fine tuning memory pools, disk, database, applicatons, jobs and threads, but it’s not a task an untrained administrator should be attempting. IBM i response times and throughput performance issues can be due to numerous factors, and often requires a lot of man hours to pin point by a trained expert. If your IBM Power iSeries already has the Performance Adjuster enabled (vi...
Continue reading

Enterprise IBM SSD with eMLC Prices

Enterprise IBM SSD with eMLC Prices
IBM SSD Price Drop IBM Solid State Drive SSD prices for iSeries, VIOS and Power AIX systems have dropped so much over the years, making the decision to replace those much slower HDDs very simple. Using Enterprise  IBM SSD  with eMLC will give queries, applications and other frequently accessed data a significant performance boost. The cost of replacing existing Power system hard disk drives with solid state drives is likely a fraction of what you originally paid for your current hard d...
Continue reading

Database Clustering - Replication Solves Real-Time Data Access Requirements

Database Clustering - Replication Solves Real-Time Data Access Requirements
Database clustering involves database replication to achieve high availability (mirroring, redundancy and disaster recovery), workload balancing for performance or scaling (queries, reporting, business intelligence, analytics and data warehousing), maintenance (upgrades, migration, testing and development), database consolidation and other objectives for data access, efficiency and better decision making. It is use database clustering and replication services where the source and target database...
Continue reading

Database Migration and Converter with Real-Time Replication

Database Migration and Converter with Real-Time Replication
Database migration and  conversion  projects can be a time consuming and costly endeavor without the right software, and converting large complex production databases with real-time replication and transformation requirements significantly compound the risks. Using a database migration and conversion tool to map fields of disparate databases correctly and keeping them in sync is key to a successful and non-disruptive conversion. Critical business applications utilizing the database to ...
Continue reading

How QRadar Pricing Works

How QRadar Pricing Works
IBM QRadar pricing is determined by the number of event logs per second and network flow logs per minute the SIEM must ingest. On average, QRadar will replace 6 customer installed security products. Furthermore, QRadar is considered by industry experts to be one of the most advanced and mature SIEM tools on the market, that can also integrate with a customer’s existing security defenses. Volume pricing discounts are provided for all QRadar SIEM product lines , including on premise appliances, so...
Continue reading

How To Proactively Prevent Cybersecurity Breaches With QRadar AI SIEM

How To Proactively Prevent Cybersecurity Breaches With QRadar AI SIEM
Most companies discover cybersecurity breaches long after the damage is done. Consequently, in the following weeks and months security personnel and executives will exhaust all resources investigating and responding to the all the events that led up to the attack, and tackle a host of other costly post-incident damage control and prevention initiatives. If the attack was not the result of a zero-day exploit, post analysis will involve a painful discovery process identifying the vulnerabilities t...
Continue reading

IBM i MFA and Password Self-Service: A winning combination

IBMi_MFA_and_passwords
Implementing IBM i Multi Factor Authentication (MFA) and Password Self-Service (PSS) as an integrated solution allows companies to enjoy the cost savings of automation, while enhancing security and addressing compliance requirements at the same time. On the surface, IBM i MFA , Password Self-Service and 2FA software solutions already have a lot in common. If you are thinking of implementing IBM i MFA, 2FA or Password Self Service, you may want to consider implementing them together to gain both ...
Continue reading

QRadar Prices for All-in-On Appliances

QRadar Prices for All-in-On Appliances
QRadar Prices for All-in-One SIEM Appliances are calculated based on the volume of events and network flows ingested by the SIEM. All QRadar Security Intelligence offerings, can flexibly grow and scale by simply adding an additional appliance for workload specific requirements, or use a hybrid of software licenses running on customer provided virtual machines and the cloud. QRadar pricing for the different product lines is significantly different. For instance, IBM’s SIEM SaaS QRadar on Cloud of...
Continue reading

How to Accelerate the Use of AI in Organizations with Power9 Systems

How to Accelerate the Use of AI in Organizations with Power9 Systems
Written by: Bob Picciano Open any business publication or digital journal today, and you will read about the promise of AI, known as artificial or augmented intelligence, and how it will transform your business. The fact is, AI will not only transform your entire business, whether you are in health care, finance, retail or manufacturing, but it will also transform technology itself. The essential task of information technology (IT), and how we measure its value, has reached an inflection point. ...
Continue reading

IBM i Multi-Factor Authentication for MFA Compliance

Security_Cover_Stock
IBM i Multi-Factor Authentication (MFA) is a critical cybersecurity defense required by PCI, FFIEC and 23 NYCRR 500 in Section 500.12b, stating any company providing financial services within the state of New York must implement MFA to protect system data and applications for all users that have external network access, or use an approved access control equivalent. IBM i Multi Factor Authentication prices are very affordable, simple to implement and provide the quickest means to protect against ...
Continue reading

SFTP FTPS - IBM i iSeries Secure FTP Methods

Upload_Cloud_Stock_tweaked
SFTP and FTPS are Secure FTP methods the IBM i supports natively for both client and server roles, and can safely transfer sensitive files to and from other systems or cloud services. Secure FTP requirements may dictate using SFTP versus FTPS for the MFT project, but is usually a personal preference. Both SFTP and FTPS use encrypted connections for file transfer, SFTP uses SSH cryptographic protocol and FTPS can use TLS or SSL implicit security (always on) cryptographic protocol. FTPS explicit c...
Continue reading
Google+