On Demand Webinar
6 Strategies for Maximum IBM i Ransomware Protection
Critical business assets stored in IBM i IFS files are as vulnerable to ransomware and other cyberthreats as files stored on Windows and Linux servers.
View SEA’s webinar and learn how to deploy total IBM i cybersecurity against ransomware threats (device, network, and IBM i server), including:
- Where IBM systems are vulnerable to ransomware
- Stopping ransomware on the network before it reaches IBM i servers
- Enabling native i OS security protections that guard against ransomware
- Using third-party solutions to identify, alert, stop, and report on IBM i ransomware activity
- Deploying IT operational protections against ransomware: Backup, recovery, encryption, scanning, disaster recovery, and high availability
Our Speaker
Ken McCalister
Ken McCalister has spent 35 years working with IBM i technology. Ken has vast experience working in all aspects of digital technology and management, including Administration, Engineering & Security. Ken is part of the IBM i Technical Team at Seasoft, providing support to its many diverse clients