talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

10

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: Gucer Vasfi ×
IBM Storage FlashSystem 9500 Product Guide for IBM Storage Virtualize 8.6

This IBM® Redpaper® Product Guide describes the IBM Storage FlashSystem® 9500 solution, which is a next-generation IBM Storage FlashSystem control enclosure. It combines the performance of flash and a Non-Volatile Memory Express (NVMe)-optimized architecture with the reliability and innovation of IBM FlashCore® technology and the rich feature set and high availability (HA) of IBM Storage Virtualize. Often, applications exist that are foundational to the operations and success of an enterprise. These applications might function as prime revenue generators, guide or control important tasks, or provide crucial business intelligence, among many other jobs. Whatever their purpose, they are mission critical to the organization. They demand the highest levels of performance, functionality, security, and availability. They also must be protected against the newer threat of cyberattacks. To support such mission-critical applications, enterprises of all types and sizes turn to the IBM Storage FlashSystem 9500. IBM Storage FlashSystem 9500 provides a rich set of software-defined storage (SDS) features that are delivered by IBM Storage Virtualize, including the following examples: Data reduction and deduplication Dynamic tiering Thin-provisioning Snapshots Cloning Replication and data copy services Cyber resilience Transparent Cloud Tiering IBM HyperSwap® including 3-site replication for HA Scale-out and scale-up configurations that further enhance capacity and throughput for better availability This Redpaper applies to IBM Storage Virtualize V8.6.

Cyber Resiliency with IBM Storage Sentinel and IBM Storage Safeguarded Copy

IBM Storage Sentinel is a cyber resiliency solution for SAP HANA, Oracle, and Epic healthcare systems, designed to help organizations enhance ransomware detection and incident recovery. IBM Storage Sentinel automates the creation of immutable backup copies of your data, then uses machine learning to detect signs of possible corruption and generate forensic reports that help you quickly diagnose and identify the source of the attack. Because IBM Storage Sentinel can intelligently isolate infected backups, your organization can identify the most recent verified and validated backup copies, greatly accelerating your time to recovery. This IBM Redbooks publication explains how to implement a cyber resiliency solution for SAP HANA, Oracle, and Epic healthcare systems using IBM Storage Sentinel and IBM Storage Safeguarded Copy. Target audience of this document is cyber security and storage specialists.

IBM FlashSystem 7300 Product Guide

This IBM® Redpaper Product Guide describes the IBM FlashSystem® 7300 solution, which is a next-generation IBM FlashSystem control enclosure. It combines the performance of flash and a Non-Volatile Memory Express (NVMe)-optimized architecture with the reliability and innovation of IBM FlashCore® technology and the rich feature set and high availability (HA) of IBM Spectrum® Virtualize. To take advantage of artificial intelligence (AI)-enhanced applications, real-time big data analytics, and cloud architectures that require higher levels of system performance and storage capacity, enterprises around the globe are rapidly moving to modernize established IT infrastructures. However, for many organizations, staff resources, and expertise are limited, and cost-efficiency is a top priority. These organizations have important investments in existing infrastructure that they want to maximize. They need enterprise-grade solutions that optimize cost-efficiency while simplifying the pathway to modernization. IBM FlashSystem 7300 is designed specifically for these requirements and use cases. It also delivers a cyber resilience without compromising application performance. IBM FlashSystem 7300 provides a rich set of software-defined storage (SDS) features that are delivered by IBM Spectrum Virtualize, including the following examples: Data reduction and deduplication Dynamic tiering Thin-provisioning Snapshots Cloning Replication and data copy services Cyber resilience Transparent Cloud Tiering (TCT) IBM HyperSwap® including 3-site replication for high availability Scale-out and scale-up configurations further enhance capacity and throughput for better availability With the release of IBM Spectrum Virtualize V8.5, extra functions and features are available, including support for new third-generation IBM FlashCore Modules Non-Volatile Memory Express (NVMe) type drives within the control enclosure, and 100 Gbps Ethernet adapters that provide NVMe Remote Direct Memory Access (RDMA) options. New software features include GUI enhancements, security enhancements including multifactor authentication and single sign-on, and Fibre Channel (FC) portsets.

IBM FlashSystem 9500 Product Guide

This IBM® Redpaper® Product Guide describes the IBM FlashSystem® 9500 solution, which is a next-generation IBM FlashSystem control enclosure. It combines the performance of flash and a Non-Volatile Memory Express (NVMe)-optimized architecture with the reliability and innovation of IBM FlashCore® technology and the rich feature set and high availability (HA) of IBM Spectrum® Virtualize. Often, applications exist that are foundational to the operations and success of an enterprise. These applications might function as prime revenue generators, guide or control important tasks, or provide crucial business intelligence, among many other jobs. Whatever their purpose, they are mission critical to the organization. They demand the highest levels of performance, functionality, security, and availability. They also must be protected against the modern scourge, cyberattacks. To support such mission-critical applications, enterprises of all types and sizes turn to the IBM FlashSystem 9500. IBM FlashSystem 9500 provides a rich set of software-defined storage (SDS) features that are delivered by IBM Spectrum Virtualize, including the following examples: Data reduction and deduplication Dynamic tiering Thin-provisioning Snapshots Cloning Replication and data copy services Cyber resilience Transparent Cloud Tiering IBM HyperSwap® including 3-site replication for HA Scale-out and scale-up configurations that further enhance capacity and throughput for better availability With the release of IBM Spectrum Virtualize V8.5, extra functions and features are available, including support for new third-generation IBM FlashCore Modules NVMe-type drives within the control enclosure, and 100 Gbps Ethernet adapters that provide NVMe Remote Direct Memory Access (RDMA) options. New software features include GUI enhancements and security enhancements, including multifactor authentication (MFA) and single sign-on (SSO), and Fibre Channel (FC) portsets.

Securing Your Critical Workloads with IBM Hyper Protect Services

Many organizations must protect their mission-critical applications in production, but security threats can also surface during the development and pre-production phases. Also, during deployment and production, insiders who manage the infrastructure that hosts critical applications can pose a threat given their super-user credentials and level of access to secrets or encryption keys. Organizations must incorporate secure design practices in their development operations and embrace DevSecOps to protect their applications from the vulnerabilities and threat vectors that can compromise their data and potentially threaten their business. IBM® Cloud Hyper Protect Services provide built-in data-at-rest and data-in-flight protection to help developers easily build secure cloud applications by using a portfolio of cloud services that are powered by IBM LinuxONE. The LinuxONE platform ensures that client data is always encrypted, whether at rest or in transit. This feature gives customers complete authority over sensitive data and associated workloads (which restricts access, even for cloud admins) and helps them meet regulatory compliance requirements. LinuxONE also allows customers to build mission-critical applications that require quick time to market and dependable rapid expansion. The purpose of this IBM Redbooks® publication is to: Introduce the IBM Hyper Protect Services that are running on IBM LinuxONE on the IBM Cloud™ and on-premises Provide high-level design architectures Describe deployment best practices Provide guides to getting started and examples of the use of the Hyper Protect Services The target audience for this book is IBM Hyper Protect Virtual Services technical specialists, IT architects, and system administrators.

IBM Netcool Operations Insight Version 1.4: Deployment Guide

IBM® Netcool® Operations Insight integrates infrastructure and operations management into a single coherent structure across business applications, virtualized servers, network devices and protocols, internet protocols, and security and storage devices. This IBM Redbooks® publication will help you install, tailor, and configure Netcool Operations Insight Version 1.4. Netcool Operations Insight consists of several products and components that can be installed on many servers in many combinations. You must make many decisions, both critical and personal preference. The purpose of this document is to accelerate the initial deployment of Netcool Operations Insight by making preferred practice choices. The target audience of this book is Netcool Operations Insight deployment specialists.

Building Real-time Mobile Solutions with MQTT and IBM MessageSight

Message Queuing Telemetry Transport (MQTT) is a messaging protocol designed for the Internet of Things (IoT). It is lightweight enough to be supported by the smallest devices, yet robust enough to ensure that important messages get to their destinations every time. With MQTT devices, such as energy meters, cars, trains, mobile phones and tablets, and personal health care devices, devices can communicate with each other and with other systems or applications. IBM® MessageSight is a messaging appliance designed to handle the scale and security of a robust IoT solution. MessageSight allows you to easily secure connections, configure policies for messaging, and scale to up to a million concurrently connected devices. This IBM Redbooks® publication introduces MQTT and MessageSight through a simple key fob remote MQTT application. It then dives into the architecture and development of a robust, cross-platform Ride Share and Taxi solution (PickMeUp) with real-time voice, GPS location sharing, and chat among a variety of mobile platforms. The publication also includes an addendum describing use cases in a variety of other domains, with sample messaging topology and suggestions for design.

IBM Business Process Manager Version 8.0 Production Topologies

This IBM® Redbooks® publication describes how to build production topologies for IBM Business Process Manager V8.0. This book is an update of the existing book IBM Business Process Manager V7.5 Production Topologies, SG24-7976. It is intended for IT Architects and IT Specialists who want to understand and implement these topologies. Use this book to select the appropriate production topologies for an environment, then follow the step-by-step instructions to build those topologies. Part 1 introduces IBM Business Process Manager and provides an overview of basic topology components, and Process Server and Process Center. This part also provides an overview of the production topologies described in this book, including a selection criteria for when to select a topology. IBM Business Process Manager security and the presentation layer are also addressed in this part. Part 2 provides a series of step-by-step instructions for creating production topology environments by using deployment environment patterns. This process includes topologies that incorporate IBM Business Monitor. This part also describes advanced topology topics. Part 3 covers post installation instructions for implementing production topology environments such as configuring IBM Business Process Manager to use IBM HTTP Server and WebSphere® proxy server. Please note that the additional material referenced in the text is not available from IBM.

Tivoli Integration Scenarios

This IBM® Redbooks® publication provides a broad view of how Tivoli® system management products work together in several common scenarios. You must achieve seamless integration for operations personnel to work with the solution. This integration is necessary to ensure that the product can be used easily by the users. Product integration contains multiple dimensions, such as security, navigation, data and task integrations. Within the context of the scenarios in this book, you see examples of these integrations. The scenarios implemented in this book are largely based on the input from the integration team, and several clients using IBM products. We based these scenarios on common real-life examples that IT operations often have to deal with. Of course, these scenarios are only a small subset of the possible integration scenarios that can be accomplished by the Tivoli products, but they were chosen to be representative of the integration possibilities using the Tivoli products. We discuss these implementations and benefits that are realized by these integrations, and also provide sample scenarios of how these integrations work. This book is a reference guide for IT architects and IT specialists working on integrating Tivoli products in real-life environments.

Getting Started with IBM Tivoli Workload Scheduler V8.3

IBM Tivoli Workload Scheduler is an IBM strategic scheduling product that runs on different platforms including the mainframe. The new version of the product, IBM Tivoli Workload Scheduler V8.3, comes with some important enhancements, such as relational database management system (RDBMS) support, new advanced planning system, which allows the definition of plans that span more that 24 hours, removal of framework requirements, new application programming interface (API), Job Scheduling Console enhancements, and so on. This IBM Redbooks publication documents the architecture, deployment, best practices, and migration scenarios for IBM Tivoli Workload Scheduler V8.3 on distributed environment. In addition, we cover IBM Tivoli Workload Scheduler V8.3 security, IBM DB2 and IBM WebSphere considerations, troubleshooting, tuning for performance, application programming interface, and JnextPlan, which has replaced the JnextDay process in this release. Clients and Tivoli professionals who are responsible for installing, administering, maintaining, or using IBM Tivoli Workload Scheduler V8.3 will find this book a major reference.