Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Record 7 of 26
Results Page:  Previous Next

Title Cyber resiliency with IBM QRadar and IBM Spectrum Virtualize for Public Cloud on Azure with IBM Copy Services Manager for Safeguarded Copy / IBM. [O'Reilly electronic resource]

Edition [First edition].
Publication Info. [Place of publication not identified] : IBM, 2022.
QR Code
Description 1 online resource (50 pages) : illustrations
Series IBM Redbooks
IBM redbooks.
Summary The focus of this Blueprint publication is to highlight the early threat detection capabilities of IBM® QRadar® and to show how to proactively start a cyber-resilience workflow in response to a cyberattack or malicious user actions. The workflow uses IBM's Copy Services Manager as orchestration software to start IBM Spectrum Virtualize for Public Cloud (SV4PC) Safeguarded Copy functions. The IBM SV4PC Safeguarded Copy function creates an immutable copy of the data in an air-gapped form on the same IBM SV4PC on Azure for isolation and eventual quick recovery. This document describes the steps that are involved to enable and forward IBM SV4PC audit logs to IBM QRadar. It also describes how to create various rules to determine a threat, and configure and start a suitable response to the detected threat in IBM QRadar. This document also explains how to register a storage system and create a scheduled task by using IBM Copy Services Manager. Finally, this document also describes deploying IBM QRadar and SV4PC on Azure. A use case for protecting the MS SQL database (DB) volume that was created on IBM SV4PC is included. Upon threat detection on a database volume, Safeguarded Copy is started for IBM SV4PC volume. The Safeguarded Copy creates an immutable copy of the data. The same data volume can be recovered or restored by using IBM's Copy Services Manager.
Subject Cyber intelligence (Computer security)
Computer networks -- Security measures.
Internet -- Security measures.
Surveillance des menaces informatiques.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Internet -- Sécurité -- Mesures.
Computer networks -- Security measures
Cyber intelligence (Computer security)
Internet -- Security measures
Added Author International Business Machines Corporation, issuing body.
ISBN 9780738460628 (electronic bk.)
0738460621 (electronic bk.)
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information