The Intrusion Detection System (IDS) debuted on IBM i 5.4. The article “Intrusion Detection on System i” ( from the August 2007 issue of this magazine outlined various types of attacks and network events and revealed a means of auditing for such events. It covered IP fragments, malformed packets, synchronization (SYN) floods, Internet Control Message Protocol (ICMP)-redirect messages, perpetual echo, restricted IP options and restricted IP protocols. It also addressed traffic-regulation anomalies, fast scans and the more dangerous slow scan.

Leading IBM Premier Business Partner gives back to the local community through sponsorship at PGA Champions golf classic in Los Angeles for 3rd consecutive year.

A decade ago, our biggest IT concerns were such things as processor frequency, memory and storage capacity and network bandwidth. Today we’re more concerned with improving productivity through virtualization, optimization, energy stewardship, and flexible sourcing. We need to provide high availability and quality of existing services, but also meet customer expectations for real-time, dynamic access to innovative new services. […]

Reliable, efficient information is key to competing in today’s marketplace—regardless of whether you’re an enterprise or mid-sized business. SAP business applications paired with BladeCenter servers allow businesses of all sizes to benefit from relevant,timely information with simple management, excellent performance and rock-solid reliability. With SAP Business Suite and SAP Business All-in-One on IBM BladeCenter servers, […]

IBM Systems Mag coverage of Smart i Appliance launch
IBM’s own IBM Systems Magazine, Nov. 2008, described Key’s joint project with its alliances to launch the Smart i Appliance.

RedOrbit (Technology): Short form for initial product announcement for Smart I appliance for affordable BI Solution.

Key Partners with IBM’s ISS…
…to provide IT security services infrastructure with the new IBM Internet Security Systems division (ISS). Regulatory and PCI compliance continues to grow in both importance and cost. At the same time, exposure to liability and threats from inadequate security is increasing – from catastrophic downtime to non-compliance penalties associated with industry and government mandates.