The purpose of this blog is to provide a high-level overview of 4 key 2020 IBM i trends. Each topic involves more detail than I can provide with this summary.
Disclaimer: IBM i is an operating system. iSeries and AS400 are servers. I use these terms interchangeably to make is easy for folks to find this information with web searches.
1) Security
Warding off hackers, malware, ransomware and data breaches is serious stuff. Neglectful or naïve dismissal can lead to grave consequences.
The two areas of this topic I hear most frequently discussed include:
1. Data-at-rest encryption, and
2. End point security.
Both cases require knowledgeable IBM i user involvement.
Data-At-Rest Encryption
Generally, IBM i storage data-at-rest security requires user implemented software. Software providers like HelpSystem, Raz-Lee Security Inc, and SyncSort offer solutions for users to create field-level encryption.
Another option for storage data-at-rest encryption is SAN-based. Even the SAN-based solution requires software for storage data-at-rest encryption.
Here’s the point for IBM i storage data-at-rest encryption. From my experience and observations, IBM i storage data-at-rest encryption requires active user involvement to implement the needed software for a successful solution.
So what?
Particularly with prospective hosting clients that do not understand IBM i, I encounter stubborn persistence that IBM i data-at-rest encryption can be outsourced with no user involvement.
Well, not in my experience.
IBM i Endpoint Security
Perhaps the most important basic step IBM i users can take is endpoint security to protect user name and password.
In the few cases I have read about when intrusion occurred, it was the result of unprotected user name and password. Most common causes include storing one’s user name and password on a vulnerable Windows-based workstation, failure to delete the user name and password of a terminated employee, or providing a user name and password with unrestricted access to all files (i.e., QSECOFR to a part-time consultant).
2) V7.4 Adoption
IBM i V7.4 has lots of goodies to entice users to upgrade.
Without going into depth, the highlights include:
1. Synchronous Replication for Continuous Availability,
2. Enhanced Authority Collection, enhanced to capture details related to authority collection by User profile or Object,
3. Java 8,
4. POWER9s are pre-loaded with the firmware and operating system security patches that mitigate known Meltdown and Spectre vulnerabilities.
3) POWER9 Adoption
More IBM legacy POWER users will adopt POWER9 for its price performance and support.
Most recently, IBM 8202-E4D users have been notified that their server is End Of Support (EOS) effective December 31, 2020.
Other legacy POWER users may have Extended Hardware Support. In my experience, extended support delays an eventual upgrade for committed IBM POWER users.
Quite simply, there is a growing population of legacy IBM POWER users that will be in the market for POWER9 in 2020.
When they get their new POWER9, they will be thrilled with its performance!
4) IBM i (iSeries/AS400) Cloud Hosting
IBM i cloud hosting will continue to gain momentum for 2 common reasons:
1. Many users want to outsource their IBM i to focus their resources or augment their IT skills (due to shrinking pool of IBM i expertise).
2. Host archive or legacy systems to satisfy transition to a new system or compliance.
Need Help With These Or Other IBM i Issues?
If you would like help, email me at blosey@source-data.com or call me at 714-593-0387.
Leave a Reply