Is Your IBM Power/IBM i Offsite Protection as Strong as You Think?

If you run on IBM Power, you already know what reliability looks like. Systems that do not blink. Workloads that just run. Security that has been hardened over decades. 

That is not the problem. 

The problem is that reliability and resilience are no longer the same thing and treating them like they are, is where risk creeps in. 

On April 16th at 10 AM EST, our CTO, Ron Morita, and VP of Product, Dale Hoffman, will walk through what has changed, and more importantly, what IBM i teams should be rethinking right now when it comes to data protection. 

The shift 

For a long time, the assumption was simple. If your production environment was stable and your backups were running, you were covered. 

That assumption does not hold anymore. 

Attackers are not just going after production systems, they are going after recovery. Backup infrastructure has become a primary target because it is the safety net. Take that out, and everything else gets a lot more expensive, a lot more complicated, and sometimes, unrecoverable. 

At the same time, the definition of “secure” has expanded. It is not just about keeping bad actors out. It is about designing for the reality that something, whether it is ransomware or an internal mistake, will eventually get in. 

And when it does, the question becomes, can you still recover cleanly? 

Where most IBM i strategies fall short 

What we are seeing across IBM i environments is not a lack of effort. It is more of a mismatch between legacy assumptions and current threats. 

  • Backups that are logically separate, but still reachable over the network 
  • Offsite strategies that exist, but may not meet modern immutability expectations for compliance and recoverability 
  • Recovery processes that depend heavily on one or two people who “just know how it works” 
  • Cost models that underestimate the real impact of downtime, especially in a true recovery scenario 

None of these are unusual. But taken together, they create gaps and those gaps only show up when you need to recover. 

Why this matters now 

Compliance requirements are tightening. Threats are getting more targeted. And experienced IBM i talent is getting harder to replace. 

That combination is forcing a shift from “we have backups” to “we can recover, confidently and cleanly, no matter what.” 

There is a difference. 

Join us 

If you’re responsible for IBM i data protection and you want a clearer, more practical framework for evaluating where you stand and where you might be exposed, this session is worth your time. 

April 16th at 10 AM EST 

Reserve your spot now, here! 

Cathy Won
.
Cathy brings her passion for technology and products to FalconStor with a background of leading teams in product marketing, product management and engineering for both software and hardware companies in storage, networking, finance, and healthcare. As a strategic and innovative thinker, she brings a unique blend of understanding the balance of business demands and technology in products. She has led key marketing initiatives for companies like HPE, NetApp, Dell EMC, Veritas, Juniper Networks and more, as a consultant and employee. She holds an MBA and B.S. in Information Systems.