IBM and CMTG cyber resiliency: building an automated, VMware Aware safeguarded copy solution to provide data resilience
This IBM Blueprint outlines how CMTG and IBM have partnered to provide cyber resilient services to their clients. CMTG is one of Australia's leading private cloud providers based in Perth, Western Australia. The solution is based on IBM Storage FlashSystem, IBM Safeguarded Copy and IBM Storage...
Saved in:
Main Authors: | , , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
[Place of publication not identified]
IBM Redbooks
2024
|
Edition: | [First edition]. |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9780738461489/?ar |
Summary: | This IBM Blueprint outlines how CMTG and IBM have partnered to provide cyber resilient services to their clients. CMTG is one of Australia's leading private cloud providers based in Perth, Western Australia. The solution is based on IBM Storage FlashSystem, IBM Safeguarded Copy and IBM Storage Copy Data Management. The target audience for this Blueprint is IBM Storage technical specialists and storage admins. |
Physical Description: | 1 Online-Ressource (22 Seiten) illustrations |
ISBN: | 9780738461489 0738461482 |
Staff View
MARC
LEADER | 00000nam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-100860400 | ||
003 | DE-627-1 | ||
005 | 20240227122214.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240227s2024 xx |||||o 00| ||eng c | ||
020 | |a 9780738461489 |c electronic bk. |9 978-0-7384-6148-9 | ||
020 | |a 0738461482 |c electronic bk. |9 0-7384-6148-2 | ||
035 | |a (DE-627-1)100860400 | ||
035 | |a (DE-599)KEP100860400 | ||
035 | |a (ORHE)9780738461489 | ||
035 | |a (DE-627-1)100860400 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20240213 | |
100 | 1 | |a Morris, Neil |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a IBM and CMTG cyber resiliency |b building an automated, VMware Aware safeguarded copy solution to provide data resilience |c Neil Morris, Stephen Doney, Barry Whyte |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b IBM Redbooks |c 2024 | |
300 | |a 1 Online-Ressource (22 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a This IBM Blueprint outlines how CMTG and IBM have partnered to provide cyber resilient services to their clients. CMTG is one of Australia's leading private cloud providers based in Perth, Western Australia. The solution is based on IBM Storage FlashSystem, IBM Safeguarded Copy and IBM Storage Copy Data Management. The target audience for this Blueprint is IBM Storage technical specialists and storage admins. | ||
650 | 0 | |a Cyber intelligence (Computer security) | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Internet |x Security measures | |
700 | 1 | |a Doney, Stephen |e VerfasserIn |4 aut | |
700 | 1 | |a Whyte, Barry |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780738461489/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-100860400 |
---|---|
_version_ | 1829007840520437760 |
adam_text | |
any_adam_object | |
author | Morris, Neil Doney, Stephen Whyte, Barry |
author_facet | Morris, Neil Doney, Stephen Whyte, Barry |
author_role | aut aut aut |
author_sort | Morris, Neil |
author_variant | n m nm s d sd b w bw |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)100860400 (DE-599)KEP100860400 (ORHE)9780738461489 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01908nam a22003972c 4500</leader><controlfield tag="001">ZDB-30-ORH-100860400</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240227122214.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240227s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738461489</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-7384-6148-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738461482</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-7384-6148-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100860400</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP100860400</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738461489</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100860400</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240213</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Morris, Neil</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IBM and CMTG cyber resiliency</subfield><subfield code="b">building an automated, VMware Aware safeguarded copy solution to provide data resilience</subfield><subfield code="c">Neil Morris, Stephen Doney, Barry Whyte</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">IBM Redbooks</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (22 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This IBM Blueprint outlines how CMTG and IBM have partnered to provide cyber resilient services to their clients. CMTG is one of Australia's leading private cloud providers based in Perth, Western Australia. The solution is based on IBM Storage FlashSystem, IBM Safeguarded Copy and IBM Storage Copy Data Management. The target audience for this Blueprint is IBM Storage technical specialists and storage admins.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Doney, Stephen</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Whyte, Barry</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738461489/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-100860400 |
illustrated | Illustrated |
indexdate | 2025-04-10T09:36:41Z |
institution | BVB |
isbn | 9780738461489 0738461482 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (22 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IBM Redbooks |
record_format | marc |
spelling | Morris, Neil VerfasserIn aut IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience Neil Morris, Stephen Doney, Barry Whyte [First edition]. [Place of publication not identified] IBM Redbooks 2024 1 Online-Ressource (22 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier This IBM Blueprint outlines how CMTG and IBM have partnered to provide cyber resilient services to their clients. CMTG is one of Australia's leading private cloud providers based in Perth, Western Australia. The solution is based on IBM Storage FlashSystem, IBM Safeguarded Copy and IBM Storage Copy Data Management. The target audience for this Blueprint is IBM Storage technical specialists and storage admins. Cyber intelligence (Computer security) Computer networks Security measures Internet Security measures Doney, Stephen VerfasserIn aut Whyte, Barry VerfasserIn aut |
spellingShingle | Morris, Neil Doney, Stephen Whyte, Barry IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience Cyber intelligence (Computer security) Computer networks Security measures Internet Security measures |
title | IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience |
title_auth | IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience |
title_exact_search | IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience |
title_full | IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience Neil Morris, Stephen Doney, Barry Whyte |
title_fullStr | IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience Neil Morris, Stephen Doney, Barry Whyte |
title_full_unstemmed | IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience Neil Morris, Stephen Doney, Barry Whyte |
title_short | IBM and CMTG cyber resiliency |
title_sort | ibm and cmtg cyber resiliency building an automated vmware aware safeguarded copy solution to provide data resilience |
title_sub | building an automated, VMware Aware safeguarded copy solution to provide data resilience |
topic | Cyber intelligence (Computer security) Computer networks Security measures Internet Security measures |
topic_facet | Cyber intelligence (Computer security) Computer networks Security measures Internet Security measures |
work_keys_str_mv | AT morrisneil ibmandcmtgcyberresiliencybuildinganautomatedvmwareawaresafeguardedcopysolutiontoprovidedataresilience AT doneystephen ibmandcmtgcyberresiliencybuildinganautomatedvmwareawaresafeguardedcopysolutiontoprovidedataresilience AT whytebarry ibmandcmtgcyberresiliencybuildinganautomatedvmwareawaresafeguardedcopysolutiontoprovidedataresilience |