Securing Data on Threat Detection Using IBM Spectrum Scale and IBM QRadar: an Enhanced Cyber Resiliency Solution
Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features...
Gespeichert in:
Beteiligte Personen: | , , , , , |
---|---|
Körperschaft: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Erscheinungsort nicht ermittelbar]
IBM Redbooks
2020
|
Ausgabe: | 1st edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780738458892/?ar |
Zusammenfassung: | Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of threats that are provided by IBM QRadar®, help reduce the impact of incidents on business data. Such integration provides an excellent platform for hosting unstructured business data that is subject to regulatory compliance requirements. This paper describes how IBM Spectrum Scale File Audit Logging can be integrated with IBM QRadar. Using IBM QRadar, an administrator can monitor, inspect, detect, and derive insights for identifying potential threats to the data that is stored on IBM Spectrum Scale. When the threats are identified, you can quickly act on them to mitigate or reduce the impact of incidents. We further demonstrate how the threat detection by IBM QRadar can proactively trigger data snapshots or cyber resiliency workflow in IBM Spectrum Scale to protect the data during threat. This paper is intended for chief technology officers, solution engineers, security architects, and systems administrators. |
Beschreibung: | Online resource; Title from title page (viewed May 18, 2020) |
Umfang: | 1 Online-Ressource (54 Seiten) |
ISBN: | 9780738458892 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-053537734 | ||
003 | DE-627-1 | ||
005 | 20240228121052.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200625s2020 xx |||||o 00| ||eng c | ||
020 | |a 9780738458892 |9 978-0-7384-5889-2 | ||
035 | |a (DE-627-1)053537734 | ||
035 | |a (DE-599)KEP053537734 | ||
035 | |a (ORHE)9780738458892 | ||
035 | |a (DE-627-1)053537734 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Chakrabarty, Boudhayan |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Securing Data on Threat Detection Using IBM Spectrum Scale and IBM QRadar |b an Enhanced Cyber Resiliency Solution |c Chakrabarty, Boudhayan |
250 | |a 1st edition. | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b IBM Redbooks |c 2020 | |
300 | |a 1 Online-Ressource (54 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; Title from title page (viewed May 18, 2020) | ||
520 | |a Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of threats that are provided by IBM QRadar®, help reduce the impact of incidents on business data. Such integration provides an excellent platform for hosting unstructured business data that is subject to regulatory compliance requirements. This paper describes how IBM Spectrum Scale File Audit Logging can be integrated with IBM QRadar. Using IBM QRadar, an administrator can monitor, inspect, detect, and derive insights for identifying potential threats to the data that is stored on IBM Spectrum Scale. When the threats are identified, you can quickly act on them to mitigate or reduce the impact of incidents. We further demonstrate how the threat detection by IBM QRadar can proactively trigger data snapshots or cyber resiliency workflow in IBM Spectrum Scale to protect the data during threat. This paper is intended for chief technology officers, solution engineers, security architects, and systems administrators. | ||
650 | 0 | |a Database management |x Computer programs | |
650 | 0 | |a IBM software | |
650 | 4 | |a Bases de données ; Gestion ; Logiciels | |
650 | 4 | |a Logiciels IBM | |
650 | 4 | |a Database management ; Computer programs | |
650 | 4 | |a IBM software | |
700 | 1 | |a Kothekar, Ashish |e VerfasserIn |4 aut | |
700 | 1 | |a Mujumdar, Praphullachandra |e VerfasserIn |4 aut | |
700 | 1 | |a Raut, Smita |e VerfasserIn |4 aut | |
700 | 1 | |a Patil, Sandeep |e VerfasserIn |4 aut | |
700 | 1 | |a Ukirde, Digvijay |e VerfasserIn |4 aut | |
710 | 2 | |a Safari, an O'Reilly Media Company. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780738458892/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-053537734 |
---|---|
_version_ | 1821494839414358016 |
adam_text | |
any_adam_object | |
author | Chakrabarty, Boudhayan Kothekar, Ashish Mujumdar, Praphullachandra Raut, Smita Patil, Sandeep Ukirde, Digvijay |
author_corporate | Safari, an O'Reilly Media Company |
author_corporate_role | ctb |
author_facet | Chakrabarty, Boudhayan Kothekar, Ashish Mujumdar, Praphullachandra Raut, Smita Patil, Sandeep Ukirde, Digvijay Safari, an O'Reilly Media Company |
author_role | aut aut aut aut aut aut |
author_sort | Chakrabarty, Boudhayan |
author_variant | b c bc a k ak p m pm s r sr s p sp d u du |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)053537734 (DE-599)KEP053537734 (ORHE)9780738458892 |
edition | 1st edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03109cam a22004812 4500</leader><controlfield tag="001">ZDB-30-ORH-053537734</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121052.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200625s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738458892</subfield><subfield code="9">978-0-7384-5889-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)053537734</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP053537734</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738458892</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)053537734</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chakrabarty, Boudhayan</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing Data on Threat Detection Using IBM Spectrum Scale and IBM QRadar</subfield><subfield code="b">an Enhanced Cyber Resiliency Solution</subfield><subfield code="c">Chakrabarty, Boudhayan</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">IBM Redbooks</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (54 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; Title from title page (viewed May 18, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of threats that are provided by IBM QRadar®, help reduce the impact of incidents on business data. Such integration provides an excellent platform for hosting unstructured business data that is subject to regulatory compliance requirements. This paper describes how IBM Spectrum Scale File Audit Logging can be integrated with IBM QRadar. Using IBM QRadar, an administrator can monitor, inspect, detect, and derive insights for identifying potential threats to the data that is stored on IBM Spectrum Scale. When the threats are identified, you can quickly act on them to mitigate or reduce the impact of incidents. We further demonstrate how the threat detection by IBM QRadar can proactively trigger data snapshots or cyber resiliency workflow in IBM Spectrum Scale to protect the data during threat. This paper is intended for chief technology officers, solution engineers, security architects, and systems administrators.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Database management</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">IBM software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Bases de données ; Gestion ; Logiciels</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels IBM</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database management ; Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IBM software</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kothekar, Ashish</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mujumdar, Praphullachandra</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Raut, Smita</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Patil, Sandeep</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ukirde, Digvijay</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Safari, an O'Reilly Media Company.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738458892/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-053537734 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:45Z |
institution | BVB |
isbn | 9780738458892 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (54 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IBM Redbooks |
record_format | marc |
spelling | Chakrabarty, Boudhayan VerfasserIn aut Securing Data on Threat Detection Using IBM Spectrum Scale and IBM QRadar an Enhanced Cyber Resiliency Solution Chakrabarty, Boudhayan 1st edition. [Erscheinungsort nicht ermittelbar] IBM Redbooks 2020 1 Online-Ressource (54 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; Title from title page (viewed May 18, 2020) Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of threats that are provided by IBM QRadar®, help reduce the impact of incidents on business data. Such integration provides an excellent platform for hosting unstructured business data that is subject to regulatory compliance requirements. This paper describes how IBM Spectrum Scale File Audit Logging can be integrated with IBM QRadar. Using IBM QRadar, an administrator can monitor, inspect, detect, and derive insights for identifying potential threats to the data that is stored on IBM Spectrum Scale. When the threats are identified, you can quickly act on them to mitigate or reduce the impact of incidents. We further demonstrate how the threat detection by IBM QRadar can proactively trigger data snapshots or cyber resiliency workflow in IBM Spectrum Scale to protect the data during threat. This paper is intended for chief technology officers, solution engineers, security architects, and systems administrators. Database management Computer programs IBM software Bases de données ; Gestion ; Logiciels Logiciels IBM Database management ; Computer programs Kothekar, Ashish VerfasserIn aut Mujumdar, Praphullachandra VerfasserIn aut Raut, Smita VerfasserIn aut Patil, Sandeep VerfasserIn aut Ukirde, Digvijay VerfasserIn aut Safari, an O'Reilly Media Company. MitwirkendeR ctb |
spellingShingle | Chakrabarty, Boudhayan Kothekar, Ashish Mujumdar, Praphullachandra Raut, Smita Patil, Sandeep Ukirde, Digvijay Securing Data on Threat Detection Using IBM Spectrum Scale and IBM QRadar an Enhanced Cyber Resiliency Solution Database management Computer programs IBM software Bases de données ; Gestion ; Logiciels Logiciels IBM Database management ; Computer programs |
title | Securing Data on Threat Detection Using IBM Spectrum Scale and IBM QRadar an Enhanced Cyber Resiliency Solution |
title_auth | Securing Data on Threat Detection Using IBM Spectrum Scale and IBM QRadar an Enhanced Cyber Resiliency Solution |
title_exact_search | Securing Data on Threat Detection Using IBM Spectrum Scale and IBM QRadar an Enhanced Cyber Resiliency Solution |
title_full | Securing Data on Threat Detection Using IBM Spectrum Scale and IBM QRadar an Enhanced Cyber Resiliency Solution Chakrabarty, Boudhayan |
title_fullStr | Securing Data on Threat Detection Using IBM Spectrum Scale and IBM QRadar an Enhanced Cyber Resiliency Solution Chakrabarty, Boudhayan |
title_full_unstemmed | Securing Data on Threat Detection Using IBM Spectrum Scale and IBM QRadar an Enhanced Cyber Resiliency Solution Chakrabarty, Boudhayan |
title_short | Securing Data on Threat Detection Using IBM Spectrum Scale and IBM QRadar |
title_sort | securing data on threat detection using ibm spectrum scale and ibm qradar an enhanced cyber resiliency solution |
title_sub | an Enhanced Cyber Resiliency Solution |
topic | Database management Computer programs IBM software Bases de données ; Gestion ; Logiciels Logiciels IBM Database management ; Computer programs |
topic_facet | Database management Computer programs IBM software Bases de données ; Gestion ; Logiciels Logiciels IBM Database management ; Computer programs |
work_keys_str_mv | AT chakrabartyboudhayan securingdataonthreatdetectionusingibmspectrumscaleandibmqradaranenhancedcyberresiliencysolution AT kothekarashish securingdataonthreatdetectionusingibmspectrumscaleandibmqradaranenhancedcyberresiliencysolution AT mujumdarpraphullachandra securingdataonthreatdetectionusingibmspectrumscaleandibmqradaranenhancedcyberresiliencysolution AT rautsmita securingdataonthreatdetectionusingibmspectrumscaleandibmqradaranenhancedcyberresiliencysolution AT patilsandeep securingdataonthreatdetectionusingibmspectrumscaleandibmqradaranenhancedcyberresiliencysolution AT ukirdedigvijay securingdataonthreatdetectionusingibmspectrumscaleandibmqradaranenhancedcyberresiliencysolution AT safarianoreillymediacompany securingdataonthreatdetectionusingibmspectrumscaleandibmqradaranenhancedcyberresiliencysolution |