Web Analytics Made Easy - Statcounter

AS400IBM AS400 SoftwarePower 11 SystemsPower 11 PricingPower 10 SystemsIBM Flashsystems AS/400 Service & Support

Contact us for Pricing or Questions:        (888) 682-5335                *We Ship Worldwide

IBM i Security: IFS Real-Time Ransomware Protection

Protecting the IBM i Integrated File System IFS from ransomware and other forms of malware can be a fairly quick process, and there are a number of simple steps you can take to minimize your systems’ vulnerabilities to prevent a successful attack. You should be aware, viruses, ransomware and other forms of malware do not run on the IBM i, however these threats can severely wreak havoc on the IBM i as a result of a few common security vulnerabilities that can often be resolved with a few simple changes. Other IBM i environments will have to take additional security measures...

Continue reading
1
  88 Views

Important Updates on End of Support for IBM Products

New-Square-_20230906-183254_1

IBM Hardware End of Service Updates On May 31st, 2024 IBM will be ending hardware support for all Power8 systems. After that date, IBM will continue the support with a hardware service extension. This hardware service extension will be an additional fee that will be as high as 70% or more of the existing hardware maintenance. This fee is included in current quotes that will renew later than 5/31/2024. On October 20th, 2023 IBM will be withdrawing all Power9 systems and will no longer be shipping them. IBM Software End of Service Updates As of September 30th, 2023 IBM is ending...

Continue reading
2
  1450 Views

IBM i Screen Capture

IBM-i-Screen-Capture IBM i Screen Capture

Screen Capture for IBM i is a feature of the Authority Manager that automates monitoring users performing sensitive tasks or those needing special authorities to perform specific tasks in a controlled and fully auditing environment. The IBM i Screen Capture feature takes a screen shot of each screen the user is on and includes all the user entered text, and saves the screen shot in a searchable pdf and log on the IBM i. The IBM i Authority Manager enables monitoring powerful users via rules that ensures ticket numbers are used for assigned tasks, auditing and screen capture is enabled, and...

Continue reading
1
  585 Views

Understanding IBM Support: End of Marketing vs. End of Support vs. End of Life

Server Maintenance

IBM uses three key lifecycle milestones when they discuss support for hardware products.  End of Marketing (EOM), End of Support (EOS), and End of Life (EOL). These terms define when a system is no longer sold, when IBM winds down official support, and when it reaches the absolute end of its support. Knowing these distinctions helps businesses plan upgrades, extend warranties, and maintain system reliability. End of Marketing (EOM): No Longer Available for Purchase What it means: IBM stops selling a specific System or Feature. This means new units can no longer be purchased directly from New from IBM. Impact: Existing users...

Continue reading
0
  1035 Views

4 Ways IBM Power10 Makes IT Simpler, Smarter, and Ready for Growth

IBM_Simplify-Growth

IT can be a double-edged sword for growing businesses. On one hand, it’s critical to operations and growth. On the other, managing increasingly complex infrastructure can tie up time, resources, and budgets. Instead of driving progress, inefficient IT systems often hold businesses back, keeping their teams stuck in maintenance mode instead of focusing on what really matters: growth, innovation, and delivering results.  The good news? IBM Power10 changes that dynamic. Built with efficiency, automation, and performance in mind, Power10 simplifies IT in ways that save businesses time, money, and resources. Here are 4 reasons why upgrading to Power10 can make a...

Continue reading
0
  647 Views

Future-Proof Your Business: A 5-Step Guide to Resilient Continuity Planning

IBM-Planning_Disaster-recovery

Downtime isn’t just inconvenient—it can be catastrophic. From natural disasters to cyberattacks and hardware failures, businesses face a growing number of threats that can disrupt operations, damage reputations, and lead to significant financial losses. That’s why having a resilient business continuity strategy isn’t just a good idea—it’s essential.  Learn more about the real costs of a data breach in our blog.  So, where do you start? Building a robust business continuity plan may seem daunting but breaking it down into manageable steps can make all the difference. Here are five key steps to create a strategy that keeps your business running...

Continue reading
0
  579 Views

Still Stuck on Legacy Systems? Here’s Why Upgrading to IBM Power10 Makes More Sense (and Costs Less) Than You Think

IBM-Upgrade-to-POWER10

We get it—upgrading your IT systems probably isn’t at the top of your to-do list. If your current legacy systems are working “well enough,” it’s easy to put off change. But here’s the truth: those older systems are costing your business more than you realize. Between unexpected downtime, rising maintenance bills, and serious security risks, sticking with outdated systems can hold you back while quietly eating away at your bottom line. So, what’s the better option? IBM Power10. Upgrading to IBM Power10 can give your business a massive performance boost, strengthen security, and even save you money in the long run. Let’s break...

Continue reading
0
  743 Views

The Cost of a Data Breach: Why Robust User Access Security is Non-Negotiable

IBM_Cost-of-A-Data-Breach

Data breaches are no longer a hypothetical risk; they’re a costly reality for organizations across industries. IBM’s 2023 Cost of a Data Breach Report highlights the severity of the problem, including revealing that the global average cost of a breach in 2023 reached $4.45 million. Beyond the financial damage, breaches disrupt operations, tarnish reputations, and leave lasting legal and compliance challenges. The report found that at the heart of many of these breaches lies a glaring vulnerability: user access security. Phishing attacks and compromised login credentials—often interconnected—remain the top causes of data breaches. Addressing these vulnerabilities isn’t just a best practice;...

Continue reading
0
  647 Views

Beyond Configuration: Unlocking the Full Value of IBM Power10 with Midland

Beyond_Configuration_IBM-Power10

  Purchasing an IBM Power10 server is an investment in your business's future. With its power, security, and scalability, this server is built to handle modern workloads effortlessly. However, a server’s potential doesn’t end at its configuration. For maximum return on investment, you need a partner who can handle the details beyond the hardware—ensuring smooth deployment, reliable support, and proactive cost management. That’s where Midland comes in.  As an IBM Gold Business Partner, Midland’s expertise and white-glove services empower your business to unlock the full capabilities of Power10. Here’s how we go beyond system configuration to deliver long-term value.  1. Evaluate...

Continue reading
0
  652 Views

AS400 Network Segmentation: Firewall Manager

AS400 Firewall Manager is a software based firewall that runs natively on the IBM i that enables administrators to define incoming and outgoing access policies based on Ports, IP Addresses, and logical groups of which AS400 Network Segmentation policies can be applied for the types of traffic that may flow in and out of the IBM i. The AS400 Firewall Manager uses AS400 exit programs to control traffic, and provides a simple point and click GUI interface to define policies. The AS400 exit program for the QIBM_QSO_ACCEPT exit point is used to monitor and control incoming traffic and a separate exit...

Continue reading
1
  604 Views

IBM i 2FA Two-Factor Authentication FAQ

ibm-i-2fa-mfa-one-step IBM i 2FA MFA One Step Authentication

IBM i Two-Factor Authentication (2FA) is a quick and simple to implement Multi-Factor Authentication solution that ensures a user’s identity before granting access to critical or sensitive data on your system. IBM i 2FA can be enforced for various connection types, including interactive 5250 telnet signon sessions, and for most TCP/IP connections where users logon thru an exit point, such Database Server for ODBC and JDBC connections, Signon Server, FTP Server and File Server for accessing the IFS, which can help prevent ransomware and other forms of malware from damaging your system. IBM i MFA can also be used for securing SSH...

Continue reading
1
  1170 Views

IBM V7R5 TR1 Technology Refresh Details

IBM V7R5 Technology Refresh 1 TR1 builds on the simplicity of integration theme in the IBM i 7.5.0 base release, and includes many fixes and enhancements that improve performance of IBM i Power10 and Power9 servers as explained in the memo to IBM i customers. The IBM V7R5 TR1 enhancements and new functions released on December 2, 2022 are explained in this article below. IBM i 7.5 TR1 has been designated MF99401 PTF in PTF Group Level is SF99957, and has RS-750-B Resave Level and RE22291 PTF Marker. IBM V7R5 TR2 enhancements and new functions are explained in a separate article,...

Continue reading
4
  3115 Views

IBM Power9 Withdrawn Systems and Features

End_of_marketing_power9

IBM Power9 Systems and features below are only available in refurbished or used condition, and are no longer sold in new condition by IBM as specified by below dates. The IBM Power9 withdrawn systems and features from marketing are listed below, but can still be placed under an IBM Hardware Maintenance HWMA at standard rates. The below list of IBM Power9 systems and features do not have an end of life, end of service or end of support date specified by IBM. Midland will continue to sell IBM Power9 Server models, features, and parts in used and refurbished condition. All used and...

Continue reading
1
  3787 Views

IBM i 7.4 TR2 Announcement Details 5770-SS1 V7R4

IBM i 7.4 TR2 Details: V7R4 Technology Release 2 Announcement for 5770-SS1 IBM i V7R4 TR2 Technology Release 2 for IBM POWER9 and POWER8 Systems with OS400 was announced on May 15, 2020, adding many new enhancements for security, encryption, virtualization, high availability, backup and recovery, web services, DB2 database, administration, architecture, APIs, development and many other major improvements that affect operating system components, software licenses and hardware features. Read about IBM V7R5 announcement details here. IBM i 7.4 TR2 is supported on select Power Systems servers with POWER9 or POWER8 processors and OS400 operating systems. IBM i customers using Blades,...

Continue reading
0
  9179 Views

SIEM Automation Real-Time Detection and Response

Security detection and response that is not automated or real-time, is simply not providing protection and is not security at all. You should already know which SIEM features are most important to improve your security posture. Automation and Real-time Detection and Response are the key for security. Now it’s just a matter of finding which SIEM delivers on all its promises. Odds are, you are not satisfied with your SIEM and perhaps feel you have invested in the wrong solution. Depending on the SIEM vendor, you may even feel trapped, and must continue with the limited options from your current vendor....

Continue reading
1
  1403 Views

Disaster Recovery with IBM Flashsystems

IBM Flash System Storage is an inexpensive start in a cyber resilience solution that simplifies and futureproofs business continuity. Now that’s business continuity made easy!

Please let us know your name.
Please let us know your email address.
Please write a subject for your message.
Please let us know your message.
{Security:body} {Security:validation}
 
1
  3614 Views

Endpoint Security EDR Solutions

What to Look for in an Endpoint Security, EDR SolutionLegacy endpoint security tools are no match for today’s malware and ransomware attacks. Attackers are well aware of the protection methods that outdated EDR solutions are using, and renders them useless. Attackers have studied these tools for years and know exactly how to by-pass them, and in some cases disables them entirely. Outdated endpoint security tools are looking for well-known criteria, which is exactly why endpoints are still attackers favorite and easiest targets. If your endpoint security defenses cannot evolve as fast as the ransomware mutates, you simply cannot protect against the...

Continue reading
0
  1324 Views

IBM AIX Power Systems TCO

ibm-power-aix-servers

IBM AIX Power systems are enterprise-class open standards-based Unix servers that support critical applications and database workloads having high I/O and memory requirements, and require maximum performance, availability, security and scalability. IBM’s AIX Power systems have been the most popular Unix server line in the world for over a decade for a number of compounding reasons. As a whole, IBM’s AIX Power server platform has countless industry leading benchmarks and application specific achievements that attrct businesses for specific uses cases, but after factoring in software license costs, the total cost of ownership numbers makes the IBM Power platform the obvious choice....

Continue reading
2
  2118 Views

Assure Security Latest Version Upgrade

  Authentication required.

This is a password protected blog, please kindly enter the password into the password field below to view the blog.

IBM Immutable Backups for Cyber Resilience

immutable-backup-cyber-resilience Immutable Backup Cyber Resilience

Immutable backup technology is crtical component for Cyber Resiliency and Disaster Recovery for organizations of any size. Cyber resilience is a measure of an organization’s ability to protect data and continue business operations despite a successful cyberattack involving data that is either corrupted or destroyed, such as from a malware or ransomware attack. The measure of cyber resiliency is based on amount of data loss and recovery time required to resume normal business operations. If you were to conduct a cyber resiliency analysis of your environment based on NIST CSF, it would assesses and score your organization’s readiness to sustain and...

Continue reading
4
  2762 Views

)-->