Cargando…

Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar : an Enhanced Cyber Resiliency Solution /

Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features...

Descripción completa

Detalles Bibliográficos
Autores principales: Chakrabarty, Boudhayan (Autor), Patil, Sandeep (Autor), Shingornikar, Shashank (Autor), Kothekar, Ashish (Autor), Mujumdar, Praphullachandra (Autor), Raut, Smita (Autor), Ukirde, Digvijay (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico eBook
Idioma:Inglés
Publicado: IBM Redbooks, 2021.
Edición:1st edition.
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1277510115
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu||||||||
008 140921s2021 xx o 000 0 eng d
040 |a AU@  |b eng  |c AU@  |d OCLCQ  |d TOH  |d OCLCQ 
020 |z 9780738460017 
020 |z 073846001X 
024 8 |a 9780738460017 
029 0 |a AU@  |b 000070045904 
035 |a (OCoLC)1277510115 
049 |a UAMI 
100 1 |a Chakrabarty, Boudhayan,  |e author. 
245 1 0 |a Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar :  |b an Enhanced Cyber Resiliency Solution /  |c Chakrabarty, Boudhayan. 
250 |a 1st edition. 
264 1 |b IBM Redbooks,  |c 2021. 
300 |a 1 online resource (68 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
520 |a Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of threats that are provided by IBM QRadar®, help reduce the impact of incidents on business data. Such integration provides an excellent platform for hosting unstructured business data that is subject to regulatory compliance requirements. This paper describes how IBM Spectrum Scale File Audit Logging can be integrated with IBM QRadar. Using IBM QRadar, an administrator can monitor, inspect, detect, and derive insights for identifying potential threats to the data that is stored on IBM Spectrum Scale. When the threats are identified, you can quickly act on them to mitigate or reduce the impact of incidents. We further demonstrate how the threat detection by IBM QRadar can proactively trigger data snapshots or cyber resiliency workflow in IBM Spectrum Scale to protect the data during threat. This third edition has added the section "Ransomware threat detection", where we describe a ransomware attack scenario within an environment to leverage IBM Spectrum Scale File Audit logs integration with IBM QRadar. This paper is intended for chief technology officers, solution engineers, security architects, and systems administrators. This paper assumes a basic understanding of IBM Spectrum Scale and IBM QRadar and their administration 
542 |f Copyright 2021 © IBM  |g 2021 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 |a Online resource; Title from title page (viewed September 13, 2021) 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
700 1 |a Patil, Sandeep,  |e author. 
700 1 |a Shingornikar, Shashank,  |e author. 
700 1 |a Kothekar, Ashish,  |e author. 
700 1 |a Mujumdar, Praphullachandra,  |e author. 
700 1 |a Raut, Smita,  |e author. 
700 1 |a Ukirde, Digvijay,  |e author. 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780738460017/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP