sea white-space

On Demand Webinar

6 Strategies for Maximum IBM i Ransomware Protection

Critical business assets stored in IBM i IFS files are as vulnerable to ransomware and other cyberthreats as files stored on Windows and Linux servers.  

View SEA’s webinar and learn how to deploy total IBM i cybersecurity against ransomware threats (device, network, and IBM i server), including: 

  • Where IBM systems are vulnerable to ransomware  
  • Stopping ransomware on the network before it reaches IBM i servers 
  • Enabling native i OS security protections that guard against ransomware 
  • Using third-party solutions to identify, alert, stop, and report on IBM i ransomware activity 
  • Deploying IT operational protections against ransomware: Backup, recovery, encryption, scanning, disaster recovery, and high availability

Our Speaker

Ken_McCalister-1-modified

Ken McCalister

Ken McCalister has spent 35 years working with IBM i technology. Ken has vast experience working in all aspects of digital technology and management, including Administration, Engineering & Security. Ken is part of the IBM i Technical Team at Seasoft, providing support to its many diverse clients