Resources

On-Demand Webinar

How to Avoid IFS Security Mistakes

In this webinar, IBM i security expert Sandi Moore teaches you how to correct IFS vulnerabilities that are often overlooked , including one that allows the IFS to spread malware throughout your environment.
Datasheet

IBM i Server Suites

See Halycon's four IBM i software suite levels designed to run natively on your IBM i. Select the suite level that is right for your operations with confidence.
Datasheet

Trap Receiver

Trap Receiver enables you to receive and interpret incoming SNMP traps from capable devices, automatically presenting them in the format of your choice.
Datasheet

HA-MX Monitor

HA-MX Monitor ensures a maximum return on your investment for your MIMIX solution and helps eliminate lost income as a result of downtime.
Blog

3 Ways Malware Can Reach Your IFS

It's true that IBM i can't be infected by a PC virus. It's also true that the IFS can act as a host and spread malicious programs throughout your environment.
Blog

Why Corporate Networks are Key Targets for Cryptojacking

The days of being able to ignore cryptocurrency is over. Even if you don’t use it, you’re now at risk of being adversely affected by it through cryptomining malware, also known as cryptojacking. Read on to find out what cryptocurrency is, how cryptojacking is on the rise, and how you can protect your organization.