sea white-space

Live Webinar

6 Strategies for Maximum IBM i Ransomware Protection 

Wednesday, August 7th, 1 PM CT

Critical business assets stored in IBM i IFS files are as vulnerable to ransomware and other cyberthreats as files stored on Windows and Linux servers.  

Attend SEA’s webinar and learn how to deploy total IBM i cybersecurity against ransomware threats (device, network, and IBM i server), including: 

  • Where IBM systems are vulnerable to ransomware  
  • Stopping ransomware on the network before it reaches IBM i servers 
  • Enabling native i OS security protections that guard against ransomware 
  • Using third-party solutions to identify, alert, stop, and report on IBM i ransomware activity 
  • Deploying IT operational protections against ransomware: Backup, recovery, encryption, scanning, disaster recovery, and high availability 

All attendees will receive a free copy of SEA’s IBM i Malware and Ransomware Readiness Checklist  for defending IBM i systems and surrounding infrastructure against potential ransomware threats.  

Our Speaker


Ken McCalister

Ken McCalister has spent 35 years working with IBM i technology. Ken has vast experience working in all aspects of digital technology and management, including Administration, Engineering & Security. Ken is part of the IBM i Technical Team at Seasoft, providing support to its many diverse clients