Skip to main content

Cyber Resiliency with IBM Storage Sentinel and IBM Storage Safeguarded Copy

A draft IBM Redbooks publication


Last updated on 31 August 2023

  1. .PDF (7.0 MB)

Share this page:   

IBM Form #: SG24-8541-00

Authors: Axel Westphal, Christopher Vollmar, Daniel Thompson, David Green, Gerd Franke, Guillaume Legmar, Markus Standau, Nezih Boyacioglu, Thomas Gerisch and Vasfi Gucer

    menu icon


    IBM Storage Sentinel is a cyber resiliency solution for SAP HANA, Oracle, and Epic healthcare systems, designed to help organizations enhance ransomware detection and incident recovery. IBM Storage Sentinel automates the creation of immutable backup copies of your data, then uses machine learning to detect signs of possible corruption and generate forensic reports that help you quickly diagnose and identify the source of the attack. Because IBM Storage Sentinel can intelligently isolate infected backups, your organization can identify the

    most recent verified and validated backup copies, greatly accelerating your time to recovery.

    This IBM Redbooks publication explains how to implement a cyber resiliency solution for SAP HANA, Oracle, and Epic healthcare systems using IBM Storage Sentinel and IBM Storage Safeguarded Copy.

    Target audience of this document is cyber security and storage specialists.

    Table of Contents

    Chapter 1. Introduction

    Chapter 2. Orchestration and IBM Storage Safeguarded Copy function

    Chapter 3. EPIC use case

    Chapter 4. Configuring IBM Storage Sentinel for SAP HANA

    Chapter 5. Scanning Engine

    Chapter 6. Overall Cyber Vault setup: Putting it all together

    Chapter 7. Supported patterns


    Special Notices

    The material included in this document is in DRAFT form and is provided 'as is' without warranty of any kind. IBM is not responsible for the accuracy or completeness of the material, and may update the document at any time. The final, published document may not include any, or all, of the material included herein. Client assumes all risks associated with Client's use of this document.