Cyber resiliency with IBM Storage Sentinel and IBM Storage Safeguarded Copy:
IBM Storage Sentinel is a cyber resiliency solution for SAP HANA, Oracle, and Epic healthcare systems, designed to help organizations enhance ransomware detection and incident recovery. IBM Storage Sentinel automates the creation of immutable backup copies of your data, then uses machine learning to...
Gespeichert in:
Beteiligte Personen: | , , , , , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Poughkeepsie, NY
IBM Redbooks
[2023]
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780738461359/?ar |
Zusammenfassung: | IBM Storage Sentinel is a cyber resiliency solution for SAP HANA, Oracle, and Epic healthcare systems, designed to help organizations enhance ransomware detection and incident recovery. IBM Storage Sentinel automates the creation of immutable backup copies of your data, then uses machine learning to detect signs of possible corruption and generate forensic reports that help you quickly diagnose and identify the source of the attack. Because IBM Storage Sentinel can intelligently isolate infected backups, your organization can identify the most recent verified and validated backup copies, greatly accelerating your time to recovery. This IBM Redbooks publication explains how to implement a cyber resiliency solution for SAP HANA, Oracle, and Epic healthcare systems using IBM Storage Sentinel and IBM Storage Safeguarded Copy. Target audience of this document is cyber security and storage specialists. |
Umfang: | 1 Online-Ressource (108 Seiten) illustrations |
ISBN: | 9780738461359 0738461350 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-097096156 | ||
003 | DE-627-1 | ||
005 | 20240228122058.0 | ||
007 | cr uuu---uuuuu | ||
008 | 231030s2023 xx |||||o 00| ||eng c | ||
020 | |a 9780738461359 |c electronic bk. |9 978-0-7384-6135-9 | ||
020 | |a 0738461350 |c electronic bk. |9 0-7384-6135-0 | ||
035 | |a (DE-627-1)097096156 | ||
035 | |a (DE-599)KEP097096156 | ||
035 | |a (ORHE)9780738461359 | ||
035 | |a (DE-627-1)097096156 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20231024 | |
100 | 1 | |a Boyacioglu, Nezih |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cyber resiliency with IBM Storage Sentinel and IBM Storage Safeguarded Copy |c Nezih Boyacioglu, Gerd Franke, Thomas Gerisch, David Green, Vasfi Gucer, Guillaume Legmar, Markus Standau, Daniel Thompson, Christopher Vollmar, Axel Westphal |
250 | |a [First edition]. | ||
264 | 1 | |a Poughkeepsie, NY |b IBM Redbooks |c [2023] | |
300 | |a 1 Online-Ressource (108 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a IBM Storage Sentinel is a cyber resiliency solution for SAP HANA, Oracle, and Epic healthcare systems, designed to help organizations enhance ransomware detection and incident recovery. IBM Storage Sentinel automates the creation of immutable backup copies of your data, then uses machine learning to detect signs of possible corruption and generate forensic reports that help you quickly diagnose and identify the source of the attack. Because IBM Storage Sentinel can intelligently isolate infected backups, your organization can identify the most recent verified and validated backup copies, greatly accelerating your time to recovery. This IBM Redbooks publication explains how to implement a cyber resiliency solution for SAP HANA, Oracle, and Epic healthcare systems using IBM Storage Sentinel and IBM Storage Safeguarded Copy. Target audience of this document is cyber security and storage specialists. | ||
650 | 0 | |a Cyber intelligence (Computer security) | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Internet |x Security measures | |
650 | 4 | |a Surveillance des menaces informatiques | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Internet ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Security measures |0 (OCoLC)fst00872341 | |
650 | 4 | |a Cyber intelligence (Computer security) |0 (OCoLC)fst01893401 | |
650 | 4 | |a Internet ; Security measures |0 (OCoLC)fst01751426 | |
700 | 1 | |a Franke, Gerd |e VerfasserIn |4 aut | |
700 | 1 | |a Gerisch, Thomas |e VerfasserIn |4 aut | |
700 | 1 | |a Green, David |e VerfasserIn |4 aut | |
700 | 1 | |a Gucer, Vasfi |e VerfasserIn |4 aut | |
700 | 1 | |a Legmar, Guillaume |e VerfasserIn |4 aut | |
700 | 1 | |a Standau, Markus |e VerfasserIn |4 aut | |
700 | 1 | |a Thompson, Daniel |e VerfasserIn |4 aut | |
700 | 1 | |a Vollmar, Christopher |e VerfasserIn |4 aut | |
700 | 1 | |a Westphal, Axel |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780738461359/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-097096156 |
---|---|
_version_ | 1821494936951848961 |
adam_text | |
any_adam_object | |
author | Boyacioglu, Nezih Franke, Gerd Gerisch, Thomas Green, David Gucer, Vasfi Legmar, Guillaume Standau, Markus Thompson, Daniel Vollmar, Christopher Westphal, Axel |
author_facet | Boyacioglu, Nezih Franke, Gerd Gerisch, Thomas Green, David Gucer, Vasfi Legmar, Guillaume Standau, Markus Thompson, Daniel Vollmar, Christopher Westphal, Axel |
author_role | aut aut aut aut aut aut aut aut aut aut |
author_sort | Boyacioglu, Nezih |
author_variant | n b nb g f gf t g tg d g dg v g vg g l gl m s ms d t dt c v cv a w aw |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)097096156 (DE-599)KEP097096156 (ORHE)9780738461359 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03203cam a22005532 4500</leader><controlfield tag="001">ZDB-30-ORH-097096156</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228122058.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">231030s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738461359</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-7384-6135-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738461350</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-7384-6135-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)097096156</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP097096156</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738461359</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)097096156</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20231024</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Boyacioglu, Nezih</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber resiliency with IBM Storage Sentinel and IBM Storage Safeguarded Copy</subfield><subfield code="c">Nezih Boyacioglu, Gerd Franke, Thomas Gerisch, David Green, Vasfi Gucer, Guillaume Legmar, Markus Standau, Daniel Thompson, Christopher Vollmar, Axel Westphal</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Poughkeepsie, NY</subfield><subfield code="b">IBM Redbooks</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (108 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">IBM Storage Sentinel is a cyber resiliency solution for SAP HANA, Oracle, and Epic healthcare systems, designed to help organizations enhance ransomware detection and incident recovery. IBM Storage Sentinel automates the creation of immutable backup copies of your data, then uses machine learning to detect signs of possible corruption and generate forensic reports that help you quickly diagnose and identify the source of the attack. Because IBM Storage Sentinel can intelligently isolate infected backups, your organization can identify the most recent verified and validated backup copies, greatly accelerating your time to recovery. This IBM Redbooks publication explains how to implement a cyber resiliency solution for SAP HANA, Oracle, and Epic healthcare systems using IBM Storage Sentinel and IBM Storage Safeguarded Copy. Target audience of this document is cyber security and storage specialists.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Surveillance des menaces informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield><subfield code="0">(OCoLC)fst00872341</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield><subfield code="0">(OCoLC)fst01893401</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Security measures</subfield><subfield code="0">(OCoLC)fst01751426</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Franke, Gerd</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gerisch, Thomas</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Green, David</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gucer, Vasfi</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Legmar, Guillaume</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Standau, Markus</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thompson, Daniel</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vollmar, Christopher</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Westphal, Axel</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738461359/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-097096156 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:22:18Z |
institution | BVB |
isbn | 9780738461359 0738461350 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (108 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | IBM Redbooks |
record_format | marc |
spelling | Boyacioglu, Nezih VerfasserIn aut Cyber resiliency with IBM Storage Sentinel and IBM Storage Safeguarded Copy Nezih Boyacioglu, Gerd Franke, Thomas Gerisch, David Green, Vasfi Gucer, Guillaume Legmar, Markus Standau, Daniel Thompson, Christopher Vollmar, Axel Westphal [First edition]. Poughkeepsie, NY IBM Redbooks [2023] 1 Online-Ressource (108 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier IBM Storage Sentinel is a cyber resiliency solution for SAP HANA, Oracle, and Epic healthcare systems, designed to help organizations enhance ransomware detection and incident recovery. IBM Storage Sentinel automates the creation of immutable backup copies of your data, then uses machine learning to detect signs of possible corruption and generate forensic reports that help you quickly diagnose and identify the source of the attack. Because IBM Storage Sentinel can intelligently isolate infected backups, your organization can identify the most recent verified and validated backup copies, greatly accelerating your time to recovery. This IBM Redbooks publication explains how to implement a cyber resiliency solution for SAP HANA, Oracle, and Epic healthcare systems using IBM Storage Sentinel and IBM Storage Safeguarded Copy. Target audience of this document is cyber security and storage specialists. Cyber intelligence (Computer security) Computer networks Security measures Internet Security measures Surveillance des menaces informatiques Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures Computer networks ; Security measures (OCoLC)fst00872341 Cyber intelligence (Computer security) (OCoLC)fst01893401 Internet ; Security measures (OCoLC)fst01751426 Franke, Gerd VerfasserIn aut Gerisch, Thomas VerfasserIn aut Green, David VerfasserIn aut Gucer, Vasfi VerfasserIn aut Legmar, Guillaume VerfasserIn aut Standau, Markus VerfasserIn aut Thompson, Daniel VerfasserIn aut Vollmar, Christopher VerfasserIn aut Westphal, Axel VerfasserIn aut |
spellingShingle | Boyacioglu, Nezih Franke, Gerd Gerisch, Thomas Green, David Gucer, Vasfi Legmar, Guillaume Standau, Markus Thompson, Daniel Vollmar, Christopher Westphal, Axel Cyber resiliency with IBM Storage Sentinel and IBM Storage Safeguarded Copy Cyber intelligence (Computer security) Computer networks Security measures Internet Security measures Surveillance des menaces informatiques Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures Computer networks ; Security measures (OCoLC)fst00872341 Cyber intelligence (Computer security) (OCoLC)fst01893401 Internet ; Security measures (OCoLC)fst01751426 |
subject_GND | (OCoLC)fst00872341 (OCoLC)fst01893401 (OCoLC)fst01751426 |
title | Cyber resiliency with IBM Storage Sentinel and IBM Storage Safeguarded Copy |
title_auth | Cyber resiliency with IBM Storage Sentinel and IBM Storage Safeguarded Copy |
title_exact_search | Cyber resiliency with IBM Storage Sentinel and IBM Storage Safeguarded Copy |
title_full | Cyber resiliency with IBM Storage Sentinel and IBM Storage Safeguarded Copy Nezih Boyacioglu, Gerd Franke, Thomas Gerisch, David Green, Vasfi Gucer, Guillaume Legmar, Markus Standau, Daniel Thompson, Christopher Vollmar, Axel Westphal |
title_fullStr | Cyber resiliency with IBM Storage Sentinel and IBM Storage Safeguarded Copy Nezih Boyacioglu, Gerd Franke, Thomas Gerisch, David Green, Vasfi Gucer, Guillaume Legmar, Markus Standau, Daniel Thompson, Christopher Vollmar, Axel Westphal |
title_full_unstemmed | Cyber resiliency with IBM Storage Sentinel and IBM Storage Safeguarded Copy Nezih Boyacioglu, Gerd Franke, Thomas Gerisch, David Green, Vasfi Gucer, Guillaume Legmar, Markus Standau, Daniel Thompson, Christopher Vollmar, Axel Westphal |
title_short | Cyber resiliency with IBM Storage Sentinel and IBM Storage Safeguarded Copy |
title_sort | cyber resiliency with ibm storage sentinel and ibm storage safeguarded copy |
topic | Cyber intelligence (Computer security) Computer networks Security measures Internet Security measures Surveillance des menaces informatiques Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures Computer networks ; Security measures (OCoLC)fst00872341 Cyber intelligence (Computer security) (OCoLC)fst01893401 Internet ; Security measures (OCoLC)fst01751426 |
topic_facet | Cyber intelligence (Computer security) Computer networks Security measures Internet Security measures Surveillance des menaces informatiques Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures Computer networks ; Security measures Internet ; Security measures |
work_keys_str_mv | AT boyacioglunezih cyberresiliencywithibmstoragesentinelandibmstoragesafeguardedcopy AT frankegerd cyberresiliencywithibmstoragesentinelandibmstoragesafeguardedcopy AT gerischthomas cyberresiliencywithibmstoragesentinelandibmstoragesafeguardedcopy AT greendavid cyberresiliencywithibmstoragesentinelandibmstoragesafeguardedcopy AT gucervasfi cyberresiliencywithibmstoragesentinelandibmstoragesafeguardedcopy AT legmarguillaume cyberresiliencywithibmstoragesentinelandibmstoragesafeguardedcopy AT standaumarkus cyberresiliencywithibmstoragesentinelandibmstoragesafeguardedcopy AT thompsondaniel cyberresiliencywithibmstoragesentinelandibmstoragesafeguardedcopy AT vollmarchristopher cyberresiliencywithibmstoragesentinelandibmstoragesafeguardedcopy AT westphalaxel cyberresiliencywithibmstoragesentinelandibmstoragesafeguardedcopy |