Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Interpreting the Key Points of The 2022 IBM i Marketplace Survey Results
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Interpreting the Key Points of The 2022 IBM i Marketplace Survey Results

3 years ago Tripwire Guest Authors
Interpreting the Key Points of The 2022 IBM i Marketplace Survey Results

This year marks the eighth edition of the popular IBM i Marketplace Survey Results. Each year, HelpSystems collects data about how companies utilize the IBM i platform and the IT enterprises it helps. Year after year, the survey has started to demonstrate long-term directions that provide useful information about the future of this entrusted technology.

Despite constant challenges, nearly 500 IBM i users from all over the world took part in this year’s survey, which illustrated a good perspective for Power10, a growing RDi user base, and concern about cybersecurity. Along with cybersecurity, the most relevant issues in the IBM i community contain high availability, disaster recovery, modernization, automation, IBM i skills, and all things cloud.

Participants pinpointed many core challenges associated with IT infrastructure. It includes security and regulations, automation, modernization, and multiple other issues like high availability, and remote operations. Concern about cybersecurity is still high among participants.

SURVEY HIGHLIGHTS

Cybersecurity is still the top concern when planning an IT infrastructure 

If you’re worried about cybersecurity in your company, you’re not alone. According to the latest IBM i Marketplace Study from HelpSystems, cybersecurity, and ransomware were the top concerns of IBM i clients, topping out High Availability / Disaster Recovery, application, and IBM i skill.

Over the years, the most consistent issue in the IBM i Marketplace Survey Results is the ongoing cybersecurity threat. The year 2022 was no exception. The survey has revealed that 62% of firms believe cybersecurity is the ultimate crisis as they develop their IT infrastructure. However, while businesses prioritizing security appear to be enforcing numerous solutions, it’s still disturbing that 30% of them do not plan to implement them.

While it is obvious that a robust, proactive outlook on cybersecurity is crucial for any company, the complexity of this process could be responsible for many enterprise leaders feeling perplexed and devastated. For many companies, cybersecurity measures are just too complicated to wrap their hands around, but that doesn’t mean it’s not required. Deploying managed security services could deliver more than a few benefits to a company’s security team. For example, the managed security services manage the day-to-day monitoring and administration of your security environment.

The survey further shows that the next significant concern is high availability/disaster recovery, at 59%, and afterward, modernizing applications at 56%, which has gained 5 points from last year. Although there is not a huge transition to cloud for IBM i users, this could also imply updating browser interfaces, updating the database, SQL Services, or deploying open source to their server.

This doesn’t suggest that IBM i clients are against cloud, but the importance doesn’t yet appear like it is with other servers, as server sprawl isn’t a problem for IBM i clients. Another rationale could be that IBM i clients are more cost wary, and there aren’t tremendous cost advantages associated with switching to the cloud.

Over the past few years, many businesses have encountered data breaches, ransomware, and security vulnerabilities. They understand the damage these attacks bring when cybersecurity is not prioritized. Although companies prioritizing security seem to be implementing numerous solutions, it is still disturbing that, on average, almost 30% of respondents do not plan to execute each of the surveyed solutions, such as secure managed file transfer, privileged user management, compliance and audit reporting, exit point security, anti-malware and ransomware protection, multi-factor authentication, database encryption, and SIEM/SYSLOG solutions.

Most particularly, 42% of respondents voiced that they are not preparing to enforce database encryption despite it being a large piece of many regulations. This could be that some firms don’t assume what they’re holding on IBM i as crucial data, or it could echo that the client may be depending on applications they are running to control the data encryption. Other disturbing statistics indicate that a majority do not plan to enforce multi-factor authentication or anti-malware and ransomware protection.

The survey further shows that the general concern in cybersecurity challenges is transformation. Threats are continually altering, and that keeps companies on their toes. The rise of complicated regulations, many of which are state-specific, forebodes that keeping up with transformations is a trend that will continue to witness growth.

High Availability is also a major concern

Disaster recovery is a company’s strategy of regaining access to its IT infrastructure after a cyber attack, or natural calamity. According to the survey, 59% of respondents this year referred to disaster recovery as a top concern while configuring their IT infrastructure. Albeit a low rate, 2% of respondents actually don’t have a framework setup to recover from a fiasco.

Outlook for Power10 looks robust

In September 2021, IBM introduced its Power10-based processor called IBM Power E1080 scale-up servers. It would be interesting to see how many businesses decide to update, because this introduction happened after the survey began. But, when asked about Power10, 73% of interviewees expressed they are thinking about it. This is not unexpected, because modern hardware has provable benefits in the areas of security, virtualization, and high availability. With the launch of Power10, older hardware will start to phase out the software it supports. So, it is important to plan all the upgrades carefully to avoid being left without help.

IBM i remains business-critical for many organizations. 

As anticipated, many organizations run the bulk of their key business applications on the IBM i platform, given that the platform is well-known for its resilience and dependability, among other things. The IBM i is utilized by 70% of respondents, and more than half of respondents’ critical business applications run on the platform. This shows the belief users have in the IBM i platform. The percentage of respondents who intend to remove all IBM i-based applications from their systems during the next two years is merely 5%.

Remote operations become the new normal for most organizations

Nowadays, running in a business-as-usual mode involves supporting remote operations. Along with it comes a new set of hardships, the two most significant of which are supporting remote workers (42%), and security issues (46%) with remote access. Further, many companies are changing how they support remote work by automating manual tasks (38%), and utilizing IBM i Access Client Solutions (34%), as well as by implementing layered security for VPN access (32%).

Rational Developers (RDi) use increases as businesses continue to prioritize teamwork, productivity, and modernization

Rational Developer for I (RDi) is a top productivity tool for IBM i. RDi is an integrated development environment (IDE) designed on the Eclipse platform. According to the survey, there is a substantial trend toward using RDi is echoed. 22% of interviewees stated that all of their developers utilize RDi, up from 16% in 2021. With RDi, the partnership is streamlined, which is paramount in today’s, especially work-from-home setup.

Development on IBM i is expanding, and RPG utilization skyrockets

How much development takes place on the IBM i is particularly noteworthy in this survey. For example, Report Program Generator (RPG) is an advanced procedural programming language utilized by enterprises to design retail business applications. According to the survey, RPG language utilization has climbed to 93% this year. An ever-increasing number of users are writing in a mix of languages, particularly because the advanced RPGs look and function like various languages, making it more simple to learn. This looks good for the eventual future of IBM i and may help in filling the hole in IBM i skill gap.

The ROI of IBM i is better than other servers

For most enterprises, there are two main kinds of hosting to consider: cloud/shared hosting and dedicated hosting. Eventually, the alternative that presents the most promising return on investment (ROI) is the one that fulfills your enterprise’s special requirements and specifications. According to the survey, 94% of interviewees this year accept that their IBM i server provides them better ROI over various servers, the most noteworthy figure starting around 2016. Almost one-fourth of respondents will extend their IBM i market presence in 2022, and 43% of clients will keep on running their IBM i climate with no changes. This addresses the fulfillment and dependability clients are facing.

To learn more about the 2022 IBM I Marketplace Survey Results, download your copy here.


About the Author: Prasanna Peshkar is a cybersecurity researcher, educator, and cybersecurity technical content writer. He is interested in performing audits by assessing web application threats, and vulnerabilities. He is interested in new attack methodologies, tools and frameworks. He also spends time looking for new vulnerabilities, and understanding emerging cybersecurity threats in blockchain technology.

Twitter:@sqlinterstellar

LinkedIn

Facebook

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor and do not necessarily reflect those of Tripwire, Inc.

The post ” Interpreting the Key Points of The 2022 IBM i Marketplace Survey Results” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Cloud, Critical Severity, Encryption, Facebook, Finance, High Severity, Low Severity, Malware, Medium Severity, Ransomware, TripWire

Continue Reading

Previous A 5 Step Checklist for Complying with PCI DSS 4.0
Next Nearly 1,900 Signal Messenger Accounts Potentially Compromised in Twilio Hack

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

7 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

8 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

10 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

11 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

13 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

16 hours ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT