5 Key Strategies for IBM i IFS Cybersecurity — Mel Zucker & Joe Hertvik

Critical business assets stored in IBM i IFS files are as vulnerable to ransomware and other cyberthreats as files stored on Windows and Linux servers. 

Yet many organizations still haven’t deployed Anti-Ransomware and other advanced threat protection solutions on IBM i servers. 

How can you protect IBM i servers from ransomware and other cyberattacks? 

Listen to this webinar to learn how ransomware and other cyberattacks threaten IBM i servers, and how to enhance IBM i cybersecurity & protect IFS assets against cyberthreats, including:

  • What the IFS is and why it’s so vulnerable to cyberattacks
  • Regulatory compliance requirements covering IFS ransomware and cyber protection
  • Implementing key strategies to secure and protect the IFS against cyberthreats

Register today and discover how to strengthen IBM i cybersecurity and safeguard essential IFS assets. 

Mel Zucker

Senior IBM i Solutions Engineer, Software Engineering of America

Mel Zucker has been a Senior IBM i Solutions Engineer with Software Engineering of America for the past 9 years. Prior to joining SEA, Mel was a member of the IBM team supporting their line of midrange products for over 30 years. While at IBM, Mel was the recipient of multiple IBM Means Service and System Engineering Achievement awards.

Joe Hertvik

Hertvik & Associates

Joe Hertvik, PMP is the owner of Hertvik & Associates, an IT administration and infrastructure consultancy, specializing in IBM i and network management. He has managed IBM i hardware and network systems for Fortune 500 and private companies for 20+ years. 

Joe has written more than 1000 articles covering IBM I, networking & project management topics, making him a go-to reference for IBM i & infrastructure information.

Key:

Complete
Failed
Available
Locked
Video
Open to view video.
Open to view video.