Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar: an Enhanced Cyber Resiliency Solution
Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features...
Gespeichert in:
Beteiligte Personen: | , , , , , , |
---|---|
Körperschaft: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Erscheinungsort nicht ermittelbar]
IBM Redbooks
2021
|
Ausgabe: | 1st edition. |
Links: | https://learning.oreilly.com/library/view/-/9780738460017/?ar |
Zusammenfassung: | Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of threats that are provided by IBM QRadar®, help reduce the impact of incidents on business data. Such integration provides an excellent platform for hosting unstructured business data that is subject to regulatory compliance requirements. This paper describes how IBM Spectrum Scale File Audit Logging can be integrated with IBM QRadar. Using IBM QRadar, an administrator can monitor, inspect, detect, and derive insights for identifying potential threats to the data that is stored on IBM Spectrum Scale. When the threats are identified, you can quickly act on them to mitigate or reduce the impact of incidents. We further demonstrate how the threat detection by IBM QRadar can proactively trigger data snapshots or cyber resiliency workflow in IBM Spectrum Scale to protect the data during threat. This third edition has added the section "Ransomware threat detection", where we describe a ransomware attack scenario within an environment to leverage IBM Spectrum Scale File Audit logs integration with IBM QRadar. This paper is intended for chief technology officers, solution engineers, security architects, and systems administrators. This paper assumes a basic understanding of IBM Spectrum Scale and IBM QRadar and their administration |
Beschreibung: | Online resource; Title from title page (viewed September 13, 2021) |
Umfang: | 1 Online-Ressource (68 Seiten) |
ISBN: | 9780738460017 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-068521189 | ||
003 | DE-627-1 | ||
005 | 20240228121448.0 | ||
007 | cr uuu---uuuuu | ||
008 | 211006s2021 xx |||||o 00| ||eng c | ||
020 | |a 9780738460017 |9 978-0-7384-6001-7 | ||
035 | |a (DE-627-1)068521189 | ||
035 | |a (DE-599)KEP068521189 | ||
035 | |a (ORHE)9780738460017 | ||
035 | |a (DE-627-1)068521189 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Chakrabarty, Boudhayan |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar |b an Enhanced Cyber Resiliency Solution |c Chakrabarty, Boudhayan |
250 | |a 1st edition. | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b IBM Redbooks |c 2021 | |
300 | |a 1 Online-Ressource (68 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; Title from title page (viewed September 13, 2021) | ||
520 | |a Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of threats that are provided by IBM QRadar®, help reduce the impact of incidents on business data. Such integration provides an excellent platform for hosting unstructured business data that is subject to regulatory compliance requirements. This paper describes how IBM Spectrum Scale File Audit Logging can be integrated with IBM QRadar. Using IBM QRadar, an administrator can monitor, inspect, detect, and derive insights for identifying potential threats to the data that is stored on IBM Spectrum Scale. When the threats are identified, you can quickly act on them to mitigate or reduce the impact of incidents. We further demonstrate how the threat detection by IBM QRadar can proactively trigger data snapshots or cyber resiliency workflow in IBM Spectrum Scale to protect the data during threat. This third edition has added the section "Ransomware threat detection", where we describe a ransomware attack scenario within an environment to leverage IBM Spectrum Scale File Audit logs integration with IBM QRadar. This paper is intended for chief technology officers, solution engineers, security architects, and systems administrators. This paper assumes a basic understanding of IBM Spectrum Scale and IBM QRadar and their administration | ||
700 | 1 | |a Patil, Sandeep |e VerfasserIn |4 aut | |
700 | 1 | |a Shingornikar, Shashank |e VerfasserIn |4 aut | |
700 | 1 | |a Kothekar, Ashish |e VerfasserIn |4 aut | |
700 | 1 | |a Mujumdar, Praphullachandra |e VerfasserIn |4 aut | |
700 | 1 | |a Raut, Smita |e VerfasserIn |4 aut | |
700 | 1 | |a Ukirde, Digvijay |e VerfasserIn |4 aut | |
710 | 2 | |a Safari, an O'Reilly Media Company. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780738460017/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-068521189 |
---|---|
_version_ | 1821494830466859008 |
adam_text | |
any_adam_object | |
author | Chakrabarty, Boudhayan Patil, Sandeep Shingornikar, Shashank Kothekar, Ashish Mujumdar, Praphullachandra Raut, Smita Ukirde, Digvijay |
author_corporate | Safari, an O'Reilly Media Company |
author_corporate_role | ctb |
author_facet | Chakrabarty, Boudhayan Patil, Sandeep Shingornikar, Shashank Kothekar, Ashish Mujumdar, Praphullachandra Raut, Smita Ukirde, Digvijay Safari, an O'Reilly Media Company |
author_role | aut aut aut aut aut aut aut |
author_sort | Chakrabarty, Boudhayan |
author_variant | b c bc s p sp s s ss a k ak p m pm s r sr d u du |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)068521189 (DE-599)KEP068521189 (ORHE)9780738460017 |
edition | 1st edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03239cam a22004212 4500</leader><controlfield tag="001">ZDB-30-ORH-068521189</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121448.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">211006s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738460017</subfield><subfield code="9">978-0-7384-6001-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)068521189</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP068521189</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738460017</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)068521189</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chakrabarty, Boudhayan</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar</subfield><subfield code="b">an Enhanced Cyber Resiliency Solution</subfield><subfield code="c">Chakrabarty, Boudhayan</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">IBM Redbooks</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (68 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; Title from title page (viewed September 13, 2021)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of threats that are provided by IBM QRadar®, help reduce the impact of incidents on business data. Such integration provides an excellent platform for hosting unstructured business data that is subject to regulatory compliance requirements. This paper describes how IBM Spectrum Scale File Audit Logging can be integrated with IBM QRadar. Using IBM QRadar, an administrator can monitor, inspect, detect, and derive insights for identifying potential threats to the data that is stored on IBM Spectrum Scale. When the threats are identified, you can quickly act on them to mitigate or reduce the impact of incidents. We further demonstrate how the threat detection by IBM QRadar can proactively trigger data snapshots or cyber resiliency workflow in IBM Spectrum Scale to protect the data during threat. This third edition has added the section "Ransomware threat detection", where we describe a ransomware attack scenario within an environment to leverage IBM Spectrum Scale File Audit logs integration with IBM QRadar. This paper is intended for chief technology officers, solution engineers, security architects, and systems administrators. This paper assumes a basic understanding of IBM Spectrum Scale and IBM QRadar and their administration</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Patil, Sandeep</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shingornikar, Shashank</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kothekar, Ashish</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mujumdar, Praphullachandra</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Raut, Smita</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ukirde, Digvijay</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Safari, an O'Reilly Media Company.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738460017/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-068521189 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:37Z |
institution | BVB |
isbn | 9780738460017 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (68 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | IBM Redbooks |
record_format | marc |
spelling | Chakrabarty, Boudhayan VerfasserIn aut Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar an Enhanced Cyber Resiliency Solution Chakrabarty, Boudhayan 1st edition. [Erscheinungsort nicht ermittelbar] IBM Redbooks 2021 1 Online-Ressource (68 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; Title from title page (viewed September 13, 2021) Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of threats that are provided by IBM QRadar®, help reduce the impact of incidents on business data. Such integration provides an excellent platform for hosting unstructured business data that is subject to regulatory compliance requirements. This paper describes how IBM Spectrum Scale File Audit Logging can be integrated with IBM QRadar. Using IBM QRadar, an administrator can monitor, inspect, detect, and derive insights for identifying potential threats to the data that is stored on IBM Spectrum Scale. When the threats are identified, you can quickly act on them to mitigate or reduce the impact of incidents. We further demonstrate how the threat detection by IBM QRadar can proactively trigger data snapshots or cyber resiliency workflow in IBM Spectrum Scale to protect the data during threat. This third edition has added the section "Ransomware threat detection", where we describe a ransomware attack scenario within an environment to leverage IBM Spectrum Scale File Audit logs integration with IBM QRadar. This paper is intended for chief technology officers, solution engineers, security architects, and systems administrators. This paper assumes a basic understanding of IBM Spectrum Scale and IBM QRadar and their administration Patil, Sandeep VerfasserIn aut Shingornikar, Shashank VerfasserIn aut Kothekar, Ashish VerfasserIn aut Mujumdar, Praphullachandra VerfasserIn aut Raut, Smita VerfasserIn aut Ukirde, Digvijay VerfasserIn aut Safari, an O'Reilly Media Company. MitwirkendeR ctb |
spellingShingle | Chakrabarty, Boudhayan Patil, Sandeep Shingornikar, Shashank Kothekar, Ashish Mujumdar, Praphullachandra Raut, Smita Ukirde, Digvijay Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar an Enhanced Cyber Resiliency Solution |
title | Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar an Enhanced Cyber Resiliency Solution |
title_auth | Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar an Enhanced Cyber Resiliency Solution |
title_exact_search | Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar an Enhanced Cyber Resiliency Solution |
title_full | Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar an Enhanced Cyber Resiliency Solution Chakrabarty, Boudhayan |
title_fullStr | Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar an Enhanced Cyber Resiliency Solution Chakrabarty, Boudhayan |
title_full_unstemmed | Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar an Enhanced Cyber Resiliency Solution Chakrabarty, Boudhayan |
title_short | Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar |
title_sort | securing data on threat detection by using ibm spectrum scale and ibm qradar an enhanced cyber resiliency solution |
title_sub | an Enhanced Cyber Resiliency Solution |
work_keys_str_mv | AT chakrabartyboudhayan securingdataonthreatdetectionbyusingibmspectrumscaleandibmqradaranenhancedcyberresiliencysolution AT patilsandeep securingdataonthreatdetectionbyusingibmspectrumscaleandibmqradaranenhancedcyberresiliencysolution AT shingornikarshashank securingdataonthreatdetectionbyusingibmspectrumscaleandibmqradaranenhancedcyberresiliencysolution AT kothekarashish securingdataonthreatdetectionbyusingibmspectrumscaleandibmqradaranenhancedcyberresiliencysolution AT mujumdarpraphullachandra securingdataonthreatdetectionbyusingibmspectrumscaleandibmqradaranenhancedcyberresiliencysolution AT rautsmita securingdataonthreatdetectionbyusingibmspectrumscaleandibmqradaranenhancedcyberresiliencysolution AT ukirdedigvijay securingdataonthreatdetectionbyusingibmspectrumscaleandibmqradaranenhancedcyberresiliencysolution AT safarianoreillymediacompany securingdataonthreatdetectionbyusingibmspectrumscaleandibmqradaranenhancedcyberresiliencysolution |