-
Author Hemant Kantak , Shashank Shingornikar
The focus of this document is to highlight early threat detection by using Splunk Enterprise and proactively start a cyber resilience workflow in response to a cyberattack or malicious user action. The workflow uses IBM® Copy Services Manager (CSM) as orchestration software to invoke the IBM FlashSy....
Release Date 2022/12 -
Author Shashank Shingornikaris , Manoj Kateja , Christopher Vollmar
The focus of this IBM® Blueprint is to showcase a method to store volumes that are created by using Safeguarded Copy off-premise to Amazon S3 object storage that uses the IBM FlashSystem Transparent cloud tiering (TCT) feature. TCT enables volume data to be copied and transferred to object storage. ....
Release Date 2022/11 -
Author Tejas Sapkar , Shashank Shingornikar
This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM....
Release Date 2022/10 -
Author Shashank Shingornikar , Raninder Ravi Bhandari
This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM Security Guardium® Data Protection and IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. T....
Release Date 2022/08 -
Author Boudhayan Chakrabarty , Sandeep R Patil , Shashank Shingornikar , Ashish Kothekar
Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features....
Release Date 2021/09