Cargando…

Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000 /

The focus of this blueprint is to highlight early threat detection by IBM℗ʼ QRadar℗ʼ and to proactively start a cyber resilience workflow in response to a cyberattack or malicious user actions. The workflow uses IBM Copy Services Manager (CSM) as orchestration software to start IBM DS8000℗ʼ Safeguar...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : IBM Redbooks, [2022]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007i 4500
001 OR_on1302339167
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 220308s2022 xx a ob 000 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO 
024 8 |a 9780738460406 
029 1 |a AU@  |b 000071520887 
035 |a (OCoLC)1302339167 
037 |a 9780738460406  |b O'Reilly Media 
050 4 |a TK5105.59 
082 0 4 |a 363.32/8028557  |2 23 
049 |a UAMI 
245 0 0 |a Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000 /  |c IBM. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b IBM Redbooks,  |c [2022] 
300 |a 1 online resource (44 pages) :  |b color illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references. 
520 |a The focus of this blueprint is to highlight early threat detection by IBM℗ʼ QRadar℗ʼ and to proactively start a cyber resilience workflow in response to a cyberattack or malicious user actions. The workflow uses IBM Copy Services Manager (CSM) as orchestration software to start IBM DS8000℗ʼ Safeguarded Copy functions. The Safeguarded Copy creates an immutable copy of the data in an air-gapped form on the same DS8000 system for isolation and eventual quick recovery. This document also explains the steps that are involved to enable and forward IBM DS8000 audit logs to IBM QRadar. It also discusses how to use create various rules to determine a threat, and configure and start a suitable response to the detected threat in IBM QRadar. Finally, this document explains how to register a storage system and create a Scheduled Task by using CSM. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security  |x Management. 
650 0 |a Data protection. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique  |x Gestion. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
710 2 |a International Business Machines Corporation,  |e issuing body. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780738460406/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP