Upload
helpsystems
View
161
Download
0
Embed Size (px)
Citation preview
All trademarks and registered trademarks are the property of their respective owners.© HelpSystems LLC. All rights reserved.
How to Upgrade to IBM i 7.3
Insert Your Presentation Title Here (via Master Slide)
Your Presenters
Tom HuntingtonExecutive Vice President of Technical Solutions
HelpSystems
Pete MassielloPresident
iTech Solutions
Insert Your Presentation Title Here (via Master Slide)
Agenda
• Why Upgrade?• Tips and Procedures– Pete Massiello
• What’s New at HelpSystems?– Tom Huntington
Insert Your Presentation Title Here (via Master Slide)
• IBM dropped normal support for V5R4 in September 2013• IBM dropped support for 6.1 in September 2015• Java runs faster on 7.1, 7.2, and 7.3• SQL runs faster on 7.1, 7.2, and 7.3• Support of newer hardware for POWER7 or POWER8– SAN, VTL
• New security features of 7.3
Why Upgrade?
Insert Your Presentation Title Here (via Master Slide)
• Why Upgrade?• Tips and Procedures– Pete Massiello
• What’s New at HelpSystems?– Tom Huntington
Agenda
Insert Your Presentation Title Here (via Master Slide)
Next up: Pete’s Presentation
Pete MassielloPresident
iTech Solutions
Insert Your Presentation Title Here (via Master Slide)
• Why Upgrade?• Tips and Procedures– Pete Massiello
• What’s New at HelpSystems?– Tom Huntington
Agenda
Insert Your Presentation Title Here (via Master Slide)
HelpSystems At-A-Glance
Insert Your Presentation Title Here (via Master Slide)
Delivered April 15, 2016IBM i 7.3 Compatibility Testing for All Brands
Insert Your Presentation Title Here (via Master Slide)
• Tango/04; February 2016– Spain and Argentina for greater geographic reach
– Alignia—Monitor and align IT and business processes Potential for future product offering
• Linoma Software; June 2016– Go Anywhere—Managed file transfers
– Crypto Complete—IBM i database encryption
– Fits very well into our cybersecurity solutions
Two Acquisitions
Insert Your Presentation Title Here (via Master Slide)
GoAnywhere MFTIBM i, Linux, AIX MFT
Insert Your Presentation Title Here (via Master Slide)
Crypto Completetm
Through Authorization Lists, users can be granted access to the fully decrypted field values, restricted to the masked values, or can be completely denied access. Key Management
Security Controls
Audit Logs & Alerts
FieldProc Programs
Key Rotation
Policy Settings for PCI
Crypto Complete and Field Procedures
IBM i-baseddata-at-restencryption
Insert Your Presentation Title Here (via Master Slide)
BI Deliveries
Sequel 11.4April 2016• Improved Excel add-in and support
for Excel 2016• Support for Windows 10 in
ViewPoint• View Builder improvements• New *ADS Security setting, to
enforce use of Advanced Database Security (row/column security rules)
Sequel Data WarehouseJanuary 2016• Change management• Security/authority enhancements• Integrate Esend• Enhanced error reporting• Event subscriptions
Insert Your Presentation Title Here (via Master Slide)
• 13th Annual State of IBM i Security Study• New Security Scan format for
both English and Spanish• New Policy Minder for AIX and
Linux
Security Deliverables
Insert Your Presentation Title Here (via Master Slide)
Intermapper 6.0April 2016• Alerting on interface
performance – Port monitoring– Ability to set thresholds
for link utilization, errors, and discards
• Ability to set up defaults based on link speeds
• Ability to consolidate interface list and alert status on a device
• Ability to view map status with overall status both links and devices
Network Monitoring
Insert Your Presentation Title Here (via Master Slide)
• Security services– Risk assessments
Our security experts will run an assessment and uncover vulnerabilities on your system
– Penetration testing We can come to your site and prove which security vulnerabilities leave you at risk
– Security architecture We’ll create a detailed plan on how to
remediate your vulnerabilities
– Remediation We can work with your security
administrator to execute the plan created
during security architecture
Professional Services at HelpSystems
Insert Your Presentation Title Here (via Master Slide)
• Managed services– Managed Security Services
Standard Managed Security Services–We monitor 10 key metrics monthly
–We deliver the monthly summary report to you
–We will perform an annual Risk Assessment
Premium Managed Security Services– Includes the standard Managed Security Services
– 5 additional key metrics
– Plus 1 hour of services per system or partition each month» To be used for remediation or anything else you need help with
Professional Services at HelpSystems
Insert Your Presentation Title Here (via Master Slide)
Robot MonitorNow – Dashboards with Views
Monitor view
Short-term history view
Detailed history view
History summary view
Accounting summary view
Disk summary view
Dashboard views can contain multiple types of
informationMonitor elements
Short-Term history elements
Disk summary, etc. elements
Text element
Image element
Insert Your Presentation Title Here (via Master Slide)
Robot MonitorNew Dashboard View
Insert Your Presentation Title Here (via Master Slide)
Robot MonitorProblem Determination – CPU Usage
Insert Your Presentation Title Here (via Master Slide)
Robot MonitorDrill Down to Details
Insert Your Presentation Title Here (via Master Slide)
Contact Information
Tom Huntington, [email protected]
Pete Massiello, iTech [email protected]
Thank you for attending!