Showing documents 21 to 30 of 151  Previous  Next

Results per page: 5 | 10 | 20


cover image

LDAP Authentication for IBM Storage DS8000 Systems: Updated for DS8000 Release 9.3.2
Storage hardware

Redpaper, published 29 Jun 2023

The IBM Storage DS8000® series includes the option to replace the locally based user ID and password authentication with a centralized, directory-based approach. This IBM® Redpaper publication helps DS8000 storage administrators understand the concepts and benefits of a centralized directory. It provides the information that is required for implementing a DS8000 authentication mechanism that is based on the Lightweight Directory Access Protocol (LDAP). Starting with the IBM Storage DS8000 Release 9.1 code, a simpler, native LDAP authentication method is supported along with the former ... [more]


cover image

IBM Storage Fusion Product Guide
Storage solutions

Redpaper, published 22 May 2023, last updated 23 Jun 2023

This IBM® Redbooks® publication offers a short overview of IBM's integrated environment for container workloads, IBM Storage Fusion. The product comes in two variants, IBM Storage Fusion HCI System including all required hardware, and IBM Storage Fusion SDS (software-only) for deployment in public or private Clouds. This paper has been updated with the 2.5.1 release only for IBM Storage Fusion and the 2.5.2 release of IBM Storage Fusion HCI ... [more]


cover image

IBM Storage DS8900F Product Guide Release 9.3.2
Storage solutions

Product Guide, published 20 Jun 2022, last updated 30 Mar 2023

This IBM® Redbooks Product Guide provides an overview of the features and functions that are available with the IBM Storage DS8900F models that run microcode Release 9.3.2 (Bundle 89.32/Licensed Machine Code 7.9.32). As of February 2023, the DS8900F with DS8000 Release 9.3.2 is the latest addition. The DS8900F is an all-flash system exclusively, and it offers three classes:
- IBM DS8980F: Analytic Class: The DS8980F Analytic Class offers best performance for organizations that want to expand their workload possibilities to artificial intelligence (AI), Business Intelligence, and ... [more]


cover image

Proactive Early Threat Detection and Securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy
Storage solutions

Blueprint, published 10 Mar 2023

This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM Security® Guardium® Data Protection and IBM QRadar® . It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM Copy Services Manager as orchestration software to start IBM FlashSystem® Safeguarded Copy functions. The Safeguarded Copy creates an immutable copy of the data in an air-gapped form on the same IBM FlashSystem for isolation and eventual quick ... [more]


cover image

Policy-Based Replication with IBM Storage FlashSystem, IBM SAN Volume Controller and IBM Storage Virtualize
Storage hardware

Redpaper, published 14 Feb 2023

Policy-based replication is the successor to Remote Copy for providing replication services for IBM Storage FlashSystem, IBM SAN Volume Controller, and IBM Storage Virtualize for version 8.5.2 and later. This new management model uses volume groups and replication policies to enable the system to automatically deploy and manage replication. This significantly simplifies the tasks that are associated with configuring, managing, and monitoring replication. Compared to Remote Copy, policy-based replication replicates data between systems with minimal overhead, significantly higher throughput, ... [more]


cover image

IBM Spectrum Protect Plus: Protecting Red Hat OpenShift Containerized Environments
Storage solutions

Redpaper, published 9 Dec 2022, last updated 14 Dec 2022

This IBM® Redpaper publication describes support for Red Hat OpenShift Container Platform application data protection with IBM Spectrum® Protect Plus. It explains backup and restore operations for persistent volume data by using the Container Storage Interface (CSI) plug-in. The paper starts with an introduction and overview of containers and Red Hat OpenShift, followed by a quick review of the IBM Spectrum Protect Plus architecture and functions. Readers who are familiar with any one of these topics can skip the corresponding chapters. Chapter 3, “Installing IBM Spectrum Protect Plus as a ... [more]


cover image

Cyber Resiliency with Splunk Enterprise and IBM FlashSystem Storage Safeguarded Copy with IBM Copy Services Manager
Storage software

Blueprint, published 12 Dec 2022

The focus of this document is to highlight early threat detection by using Splunk Enterprise and proactively start a cyber resilience workflow in response to a cyberattack or malicious user action. The workflow uses IBM® Copy Services Manager (CSM) as orchestration software to invoke the IBM FlashSystem® storage Safeguarded Copy function, which creates an immutable copy of the data in an air-gapped form on the same IBM FlashSystem Storage for isolation and eventual quick recovery. This document explains the steps that are required to enable and forward IBM FlashSystem audit logs and set a ... [more]


cover image

Offloading storage volumes from Safeguarded Copy to AWS S3 Object Storage with IBM FlashSystem Transparent Cloud Tiering
Storage solutions

Blueprint, published 22 Nov 2022

The focus of this IBM® Blueprint is to showcase a method to store volumes that are created by using Safeguarded Copy off-premise to Amazon S3 object storage that uses the IBM FlashSystem Transparent cloud tiering (TCT) feature. TCT enables volume data to be copied and transferred to object storage. The TCT feature supports creating connections to cloud service providers to store copies of volume data in private or public clouds. This feature is useful for organizations of all sizes when planning for disaster recovery operations or storing a copy of data as extra backup. TCT provides seamless ... [more]


cover image

IBM Elastic Storage System Introduction Guide
Storage solutions

Redpaper, published 21 Nov 2022, last updated 22 Nov 2022

This IBM® Redpaper publication provides an overview of the IBM Elastic Storage® Server (IBM ESS) and IBM Elastic Storage System (also IBM ESS). These scalable, high-performance data and file management solution, are built on IBM Spectrum® Scale technology. Providing reliability, performance, and scalability, IBM ESS can be implemented for a range of diverse requirements. The latest IBM ESS 3500 is the most innovative system that provides investment protection to expand or build a new Global Data Platform and use current storage. The system allows enhanced, non-disruptive upgrades to grow ... [more]


cover image

Proactive Early Threat Detection and Securing SQL Database With IBM QRadar and IBM Spectrum Copy Data Management Using IBM FlashSystem Safeguarded Copy
Storage solutions

Blueprint, published 14 Oct 2022

This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM Spectrum® Copy Data Management as orchestration software to start IBM FlashSystem® Safeguarded Copy functions. The Safeguarded Copy creates an immutable copy of the data in an air-gapped form on the same IBM FlashSystem for isolation and eventual quick recovery. This document describes how to ... [more]


 Previous  Next

The above is a list of IBM Redbooks and Redpapers on Storage solutions, showing most recently published first. IBM Redbooks publications are available for download in PDF and EPUB formats and most are also available on Google Play Books and Apple Books.



IBM Redbooks Badges
Redbooks Author Digital Badge

IBM Redbooks want technical practitioners to be recognized for their newly gained knowledge, experience and accomplishments.

Become an IBM certified Redbooks author

Follow IBM Redbooks

Follow IBM Redbooks