Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Chakrabarty, Boudhayan, author.

Title Enhanced cyber security with IBM Spectrum Scale and IBM QRadar : accurately detecting and prioritizing threats to your data / Boudhayan Chakrabarty [and three others]. [O'Reilly electronic resource]

Edition First edition.
Publication Info. [Poughkeepsie, New York] : IBM Corporation, IBM Redbooks, [2019]
QR Code
Description 1 online resource (1 volume) : illustrations
Series IBM redpaper
IBM redpaper.
Note Date of publication from resource description page.
Number on back cover: REDP-5560-00.
"In partnership with IBM Academy of Technology."
"Security. Storage."
Bibliography Includes bibliographical references.
Summary Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management software for deep inspection, detection, and prioritization of threats has become a necessity of any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, combined with the log analysis, deep inspection, and detection of threats provided by IBM QRadar®, helps reduce the impact of incidents on business data. Such integration provides an excellent platform for hosting unstructured business data that is subject to regulatory compliance requirements. This paper describes how IBM Spectrum Scale file audit logging can be integrated with IBM QRadar. Using QRadar, an administrator can monitor, inspect, detect, and derive insights for identifying potential threats to the data stored on IBM Spectrum Scale. When the threats are identified, you can quickly act on them to mitigate or reduce the impact of incidents. This paper is intended for chief technology officers, solution engineers, security architects, and systems administrators. NOTE: This paper assumes a basic understanding of IBM Spectrum Scale, IBM QRadar, and their administration.
Subject Business enterprises -- Computer networks -- Security measures.
Computer security.
Cyber intelligence (Computer security)
Information technology -- Management.
Information technology -- Security measures.
Sécurité informatique.
Surveillance des menaces informatiques.
Technologie de l'information -- Gestion.
Technologie de l'information -- Sécurité -- Mesures.
Business enterprises -- Computer networks -- Security measures
Computer security
Cyber intelligence (Computer security)
Information technology -- Management
Information technology -- Security measures
Added Author International Business Machines Corporation. International Technical Support Organization, issuing body.
Patron reviews: add a review
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information