Skip to main content

Cyber Resiliency with IBM Storage Sentinel and IBM Security

An IBM Redbooks publication

thumbnail 

Published on 22 November 2024, updated 28 November 2024

  1. .PDF (12.0 MB)

Share this page:   

ISBN-10: 073846192X
ISBN-13: 9780738461922
IBM Form #: SG24-8562-00


Authors: Marcelo Cristiano Mendes Ayaviri , Nezih Boyacioglu, Juan Carlos Jimenez Fuentes, Vasfi Gucer, Akash Kushwah, Michael Mirochnik, Earl Springer, Markus Standau and Christopher Vollmar

    menu icon

    Abstract

    In today's data-driven world, safeguarding sensitive information and ensuring uninterrupted business operations is a top priority. This IBM® Redbooks® explores how the integrated solution of IBM Storage Sentinel, IBM Storage FlashSystem, IBM Storage Copy Data Management, IBM Security® Guardium®, and IBM Security QRadar® empowers organizations to protect their valuable assets, minimize downtime, and maintain operational resilience. By leveraging these products, organizations can effectively detect, prevent, and recover from cyberattacks, ensuring business continuity and minimizing downtime.

    This book empowers security, AI, and storage professionals to build a secure and resilient IT infrastructure. You will gain expert guidance on configuring IBM Storage Sentinel for critical applications like VMware, EPIC, and SAP HANA. By leveraging Sentinel's advanced features, you will optimize performance, enhance security, and ensure business continuity.

    Additionally, the book explores how IBM Guardium strengthens AI environments by protecting sensitive data, monitoring user access, and detecting potential threats, safeguarding the integrity and confidentiality of AI models and data.

    Table of Contents

    Chapter 1. Introduction

    Chapter 2. IBM Storage Sentinel: An end-to-end automated cyber resiliency solution

    Chapter 3. Scanning engine and its technology

    Chapter 4. Protecting SAP HANA databases

    Chapter 5. Configuring IBM Storage Sentinel for VMware

    Chapter 6. Protecting EPIC Cache and IRIS use case (on AIX)

    Chapter 7. Secure and resilient AI