<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1601576979905566&amp;ev=PageView&amp;noscript=1">
 outlook
Logo ON WHITE-1
Solutions & Services Success Stories Partners
Industries
Healthcare
Local Government
Financial Services
Retail
Resources
All Resources
Technology Topics & Trends
About
Our Story
Our People
Accreditations
Corporate Social Responsibility
Careers
Contact
  • Data Security & Resilience
    data security icon
    Data Security & Resilience

    Secure data optimisation & proactive backup

  • Software
    software icon
    Software

    Proactive Licencing, Compliance & Asset Management

  • cyber security
    cyber security icon
    Cyber Security

    Agile, Modular & Secure Cybersecurity & Managed Siem

  • Cloud & Datacentre
    cyber security icon
    Cloud & Datacentre

    Manage & Transform Multi-cloud, Hybrid & On-premise

cyber security icon Managed Backup disaster recovery icon Disaster Recovery cyber recovery icon Cyber Recovery CopyAssure icon CopyAssure
cyber security icon Software Licensing cyber security icon Managed License Compliance cyber security icon Software Asset Management
cyber security icon Managed SIEM cyber security icon Exposure Management cyber security icon MXDR cyber security icon MDR cyber security icon Security Consultancy cyber security icon Incident Response cyber security icon Cyber Security Assessment
agentic ai icon Agentic AI cyber security icon Infrastructure Modernisation cyber security icon Cloud Optimisation cyber security icon Datacentre Services cyber security icon Hybrid Cloud cyber security icon ProCare
  • Contact
  • Sign In
  • Contact
  • Sign In
×
  • Solutions & Services
  • Success Stories
  • Partners
  • Industries
  • Resources
  • About
Solutions & Services
  • Data Security & Resilience

    • cyber security icon Managed Backup
    • disaster recovery icon Disaster Recovery
    • cyber recovery icon Cyber Recovery
    • CopyAssure icon CopyAssure
  • Software

    • cyber security icon Software Licensing
    • cyber security icon Managed License Compliance
    • cyber security icon Software Asset Management
  • Cyber Security

    • cyber security icon Managed SIEM
    • cyber security icon Exposure Management
    • cyber security icon MXDR
    • cyber security icon MDR
    • cyber security icon Security Consultancy
    • cyber security icon Incident Response
    • cyber security icon Cyber Security Assessment
  • Cloud & Datacentre

    • agentic ai icon Agentic AI
    • cyber security icon Infrastructure Modernisation
    • cyber security icon Cloud Optimisation
    • cyber security icon Datacentre Services
    • cyber security icon Hybrid Cloud
    • cyber security icon ProCare
Industries
  • Healthcare
  • Local Government
  • Financial Services
  • Retail
Resources
  • All Resources
  • Technology Topics & Trends
About
  • Our Story
  • Our People
  • Careers
  • Contact
  • Accreditations
  • Corporate Social Responsibility

Blog

Data Security & Resilience

Outage to Outlast: Key Insights on Building Operational Resilience for IBM Power

Abikaye Mehat
Abikaye Mehat

27 November 2025

Time to read

Loading read time...

Share this post

Table of contents

  • The Threat Landscape Is Escalating & Fast
  • Hybrid Cloud: A Double-Edged Sword
  • Why Backups Aren’t the Whole Story
  • A Real-World Recovery Challenge
  • Practical Steps Every IBM Power Client Can Take
  • Want to to See the Full Discussion?

 

 

The cyber landscape is shifting fast and organisations running IBM Power workloads are feeling the pressure. From rising ransomware attempts to increasingly complex hybrid environments, resilience has become a top priority.

To explore these challenges, we recently hosted our webinar “Outage to Outlast: Building Operational Resilience for IBM Power Systems” in collaboration with IBM, featuring expert speakers Andrew Laidlaw (IBM) and Jack Wilkins (Celerity).

Here’s a high-level overview of the discussion, you can find the full on-demand session here.

The Threat Landscape Is Escalating & Fast

One of the central themes was the accelerating pace and impact of cyber threats. While ransomware remains the most prominent risk, AI-driven attacks are now emerging and becoming harder to detect, with 1 in 6 breaches involving AI. Despite this risk, AI also presents a cost saving opportunity, security teams using AI and automation lower the cost of a breach by 1.9 million USD.

Andrew highlighted recent UK incidents involving well-known brands where disruption lasted weeks, with the Jaguar Land Rover attack reportedly costing 1.9 billion. A stark reminder that even large, well-resourced organisations can struggle to recover quickly when core systems are affected.

The takeaway? Threats are growing in sophistication, and recovery needs to be faster, cleaner and more predictable.

Hybrid Cloud: A Double-Edged Sword

Many Power clients are modernising through hybrid cloud: extending workloads into cloud platforms, connecting applications through APIs and scaling resources across environments.

This delivers real benefits: flexibility, cost efficiency, powerful DR options. But it also comes with new risks.

The speakers walked through:

  • How hybrid architectures expand the attack surface
  • Why network pathways and permissions must be tightly controlled
  • The importance of secure, consistent configurations across on-prem and cloud

But the message wasn’t one of avoidance, it was about awareness and opportunity. When designed with resilience in mind, hybrid cloud can significantly strengthen recovery capabilities.

Why Backups Aren’t the Whole Story

Most organisations believe their backups are enough to get them out of trouble. In reality, backups alone rarely guarantee a smooth recovery.

Common issues discussed included:

  • backups that restore technically, but applications don’t start
  • missing or inconsistent data
  • slow restore times
  • uncertainty about whether a copy is “clean” after a cyber incident

The session explored why regular testing is the missing link for many organisations and how testing uncovers risks that day-to-day operations simply don’t reveal.

This part of the conversation led into a real-world example…

A Real-World Recovery Challenge

During the webinar, Jack shared the story of a large food manufacturer facing ongoing resilience challenges within their IBM Power environment. Despite investing in modernising their storage and backup approach, they still struggled with one crucial issue: their systems couldn’t recover quickly or reliably enough to meet operational requirements.

By evolving their strategy and making smarter use of existing IBM technologies, they achieved a dramatic improvement in recovery speed, confidence and overall resilience.

If this sounds familiar, you may want to explore our detailed case study with Oscar Mayer, where we break down the full transformation. Read it here.

Practical Steps Every IBM Power Client Can Take

For organisations unsure where to begin or how to make meaningful progress, our speakers shared a set of simple, practical starting points:

  • Perform a risk assessment to understand your exposure
  • Strengthen identity controls, especially MFA for privileged access
  • Maintain patching discipline across firmware, OS and applications
  • Review your backup strategy, ensuring immutability and offsite copies
  • Test recoveries regularly, not just annually

No matter the size of your budget or team, these steps can make a real difference.

Want to to See the Full Discussion?

The webinar goes much deeper into:

  • real-world cyber incidents
  • hybrid-cloud resilience strategies
  • recovery validation
  • what to look out for in your own environment
  • and a live demonstration of a modern approach to automated IBM Power recovery testing

If you’re responsible for IBM Power, cyber resilience, or continuity planning, this is one you won’t want to miss.

Watch the webinar on demand here.

Latest News

All Resources
Zero Trust - Celerity Limited
Zero Trust - Celerity Limited
Cyber Security

Zero Trust - Celerity Limited

Secure your data, eliminate risk and harness the power of Zero Trust.

Read topic
Ransomware - Celerity Limited
Ransomware - Celerity Limited
Cyber Security

Ransomware - Celerity Limited

Protecting your business from threats and data loss.

Read topic
Software Licence Compliance
Software Licence Compliance
Software

Software Licence Compliance

Identifying unlicensed software, monitoring license usage, and ensuring that your organisation abides by its license agreements.

Read topic
Logo WHITE-cropped
phone 0845 565 2097
email info@celerity-uk.com
Vector
9001_Certification Badges_RGB_(0421)_4 14001 Certification Badges_RGB_(0421)_4 27001 Certification Badges_RGB_(0421)_4 cyberessentials_certification mark plus_colour

Transforming Technology. Empowering People.

QUICK LINKS
  • Technology Topics & Trends
  • Clients
  • Partners
  • Policies
LATEST BLOGS
  • Outage to Outlast: Key Insights on Building Operational Resilience for IBM Power
  • Why Cyber Resilience Isn’t Optional - It’s Critical in 2025
  • Rewatch the Webinar: Building Operational Resilience for IBM Power Systems

Ⓒ Celerity 2025 All Rights Reserved

Privacy

Terms

 

  • There are no suggestions because the search field is empty.