Skip to content
March Survey: Cybersecurity - IBM Power
TechPulse is TechChannel’s sponsored monthly micro-survey program designed to capture real-time
sentiments and trends from IBM Power professionals.
1.
What emerging/escalating threat are you most concerned about?
AI-assisted attacks via automated phishing, deepfake social engineering, evasive malware or AI agents
Exploitation of AI systems (e.g., through prompt injections, jailbreaking or compromise of AI agents)
Future attacks powered by quantum computing through the “harvest now, decrypt later” strategy
Advanced supply chain attacks compromising upstream providers
Fake IT worker schemes with cybercriminals posing as IT professionals
Other (please specify)
2.
What role does security have in your hardware upgrade decisions?
Minimal influence: Security enhancements are beneficial but not a deciding factor.
Secondary factor: Security is important, but our upgrades are primarily driven by other needs.
Balanced consideration: Security improvements are one of several factors influencing our upgrade plans.
Primary driver: We are upgrading to z16 or z17 specifically to capitalize on enhanced platform security.
Compliance-driven: Upgrade timelines are influenced by regulatory or compliance requirements.
3.
What barriers do you face in implementing your desired security controls? (select all that apply)
Budget constraints or insufficient funding
Lack of skilled personnel or staffing shortages
Technical complexity or system incompatibility
Organizational resistance or lack of executive buy-in
Integration challenges with existing infrastructure
Varying compliance standards that slow rollouts across global teams
Time/resource limitations for testing and deployment
Vendor or third-party dependencies (e.g., supply chain delays for patches, integrations or APIs)
Other (please specify)
4.
Does your current forms and labeling solution require 'client-side' installations on PCs, or is it centrally managed and secured within your IBM i environment?
Centrally managed on IBM i (native)
Hybrid (IBM i and PC) – Please see comments section below
Entirely decentralized (standalone PC software)
Not sure
If hybrid, where does operational data reside, where is print engine?
5.
In the event of a cyber incident (e.g., ransomware) targeting your PC network, would your ability to design and print critical shipping labels or customer forms be impacted?
Yes – Our templates/software reside on PC servers/workstations.
No – Our labeling/forms environment is hosted entirely on the secured IBM i.
Unsure – We have not tested our labels/forms in a disaster recovery/cyber recovery drill.
6.
Would you like to be entered into a drawing for a $100 Visa gift card for completing this survey? (If "yes," please provide name and email below.)
Yes
No
7.
Please provide your name and email address