UCG Technologies Blog

UCG Technologies Blog 2021

IBMi Ransomeware Protection

Don’t Forget About The Co-Lo Alternative To Cloud

Cloud is a consumption model, not a panacea. And for a lot of customers, moving some – or even all of their applications – to the cloud is something to consider or even possibly the right move. But for many customers who are committed to their applications and therefore to their IBM i platform, the best and lowest cost way to get infrastructure to support those applications is still to put machinery on premises or to have it installed in a co-location facility.

View Blog Post
IBMi Ransomeware Protection

Ransomware Epidemic Hits Epic Proportions, And IBM i Shops Take Notice

The ransomware outbreak hit home for millions of Americans last week when attackers shut down a major East Coast pipeline as well as a hospital network on the West Coast. For IBM i shops, the events are a potent reminder to re-evaluate network security and data protection systems to ensure they’re resilient from attack.

View Blog Post
IBMi Strategic Partners

Strategic Partnerships Add Value: A Case for On-Prem IBM i Deployment

As organizations decide where to run their IBM i workloads with a growing range of strategies, it becomes more important to have strong differentiators in the various options to help make prudent IT decisions.

View Blog Post
IBMi Hosting Blog Post

Do the Math When Looking at IBM i Hosting for Cost Savings

COVID-19 has accelerated certain business trends that were already gaining strength prior to the start of the pandemic. E-commerce, telehealth, and video conferencing are some of the most obvious examples. One example that may not be as obvious to the general public but has a profound impact on business is the shift in strategy of IBM i infrastructure from traditional, on-premises environments to some form of remote configuration. These remote configurations and all of their variations are broadly referred to in the community as IBM i hosting.

View Blog Post
Disaster Recovery image

CYBER-ATTACKS ON THE RISE. PROTECT WITH THE TRIPLE PLAY.

Protecting an organization’s data is not a single-faceted approach, and companies need to do everything they can to both proactively prevent an attempted attack and reactively respond to a successful attack. Learn how to protech your business with Cloud Backup, DRaaS, and Enterprise Cybersecurity.

View Blog Post
Disaster Recovery image

What is DraaS?

by Matt Paterini

Every organization needs a sound disaster recovery plan to protect their business from natural disasters, weather events, cyber-attacks, and other unexpected threats. Disaster recovery strategies can take on different forms depending on the requirements of the business, specifically the defined Recovery Time Objective (RTO) and Recovery Point Objective (RPO).

View Blog Post