Showing documents 1 to 5 of 51  Next

Results per page: 5 | 10 | 20


cover image

Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar: An Enhanced Cyber Resiliency Solution
Storage Solutions

Redpaper, published 13 Sep 2021

Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of threats that are provided by IBM QRadar®, help reduce the impact of incidents on business data. Such integration provides an excellent platform for hosting unstructured business data that is subject to ... [more]


cover image

IBM DS8000 Safeguarded Copy (Updated for DS8000 R9.2)
Storage Solutions

Redpaper, published 31 Aug 2021

This IBM® Redpaper™ publication explains the IBM DS8000® Safeguarded Copy functions. With Safeguarded Copy, organizations have the ability to improve their cyber resiliency by frequently creating protected point-in-time backups of their critical data, with minimum impact and effective resource utilization. The paper is intended for IT security architects who plan and design an organization’s cyber security strategy, and the infrastructure technical specialists who implement them. The content is structured into four major sections:
- Safeguarded Copy introduction
- ... [more]


cover image

Getting Started with IBM Z Cyber Vault
IBM Z

Draft Redbooks, last updated 27 Aug 2021

With cyberattacks on the raise, cyber resiliency is becoming more important than ever. Cyber resiliency can provide the required capability in the face of adversity, without significant impact if detected early. A cybersecurity strategy might minimize the risk of attacks getting through to systems, applications, and data, but a cyber resiliency strategy is needed to minimize the impact of a cyberattack by recovering quickly. Preparing for, responding to, and recovering from a cyberattack is not something that just happens, but rather must be thoroughly architected, planned for, and tested. ... [more]


cover image

IBM FlashSystem 5200 Product Guide
Flash storage

Redpaper, published 5 May 2021, last updated 26 Aug 2021

This IBM® Redbooks® Product Guide publication describes the IBM FlashSystem® 5200 solution, which is a next-generation IBM FlashSystem control enclosure. It is an NVMe end-to-end platform that is targeted at the entry and midrange market and delivers the full capabilities of IBM FlashCore® technology. It also provides a rich set of software-defined storage (SDS) features that are delivered by IBM Spectrum® Virtualize, including the following features:
- Data reduction and deduplication
- Dynamic tiering
- Thin provisioning
- Snapshots
- Cloning
- Replication ... [more]


cover image

IBM FlashSystem Best Practices and Performance Guidelines
Software Defined Storage

Redbooks, published 13 May 2021, last updated 6 Aug 2021

This IBM® Redbooks® publication captures several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM FlashSystem products. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, remote copy services, and hosts. It explains how you can optimize disk performance with the IBM System Storage® Easy Tier® function. It also provides preferred practices for ... [more]


 Next

The above is a list of IBM Redbooks and Redpapers on Storage Software, showing most recently published first. IBM Redbooks publications are available for download in PDF and EPUB formats and most are also available on Google Play Books and Apple Books.



IBM Redbooks Badges
Redbooks Author Digital Badge

IBM Redbooks want technical practitioners to be recognized for their newly gained knowledge, experience and accomplishments.

Become an IBM certified Redbooks author

Follow IBM Redbooks

Follow IBM Redbooks