Threats can be both internal and external to the organisation

Consider scenarios like a disgruntled employee or a malicious hacking organisation. While many prioritise external threats, protecting against internal risks is equally crucial. To ensure comprehensive storage protection, organisations must take every precaution to safeguard their data actively. IBM FlashSystem provides standard features, but incorporating additional IBM software can further enhance your cyber resiliency.

IBM Flash System Security Features:

Active Treat Detection

Actively monitor your FlashSystem to detect suspicious and unusual behaviors using machine learning. This proactive approach enables you to potentially identify a ransom attack before it fully executes. For instance, you may notice a spike in disk utilisation caused by the encryption aspect of a ransomware attack.

Encryption of Data at Rest (EDAR)

Ensuring that your FlashSystem is encrypted will prevent the physical theft of data as the disks will only be able to be read by a device that has the associated encryption key.

IBM Sageguarded Copy

Protected copies facilitate the capture of immutable snapshots of your storage, which you can automatically schedule at regular intervals. Consequently, in the event of a cyber attack or data corruption, you can quarantine, test, and restore these snapshots, significantly reducing downtime and data loss associated with ransomware attacks. On average, organisations take three weeks to recover from a cyber attack, with only 95% of the data recovered.

Multifactor Authentication (MFA)

The use of MFA reduces the risk of compromise by 99% according to a study conducted by Microsoft.

Role-Based Access Control (RBAC)

Users can be assigned to a group on the system, each group can have roles associated with it. These roles have different features of the system enabled on them. This allows for users to only have access to features that are required.

Object-Based Access Control (OBAC)

You can implement restrictions on a per-user group basis, limiting the objects users can view, manage, and configure. These objects include hosts, volumes, port sets, user groups, child pools, and more.

Disabling Login Interfaces

Access to the graphical user interface (GUI), command-line interface (CLI) and Representational State Transfer (REST) interface can be disabled. Reducing the interfaces that the FlashSystem can be access via, you greatly reduce the potential access points in a malicious attack.

IBM Storage Defender

IBM Storage Defender consists of a collection of software products that you can apply to your storage, providing additional functionality. You don’t need to purchase all features upfront, as licensing allows you to use different features as required.

Automated data movement, high-availability configurations, synchronous and asynchronous copy services, isolated and immutable copies, encryption, storage tiering, and data reduction technologies.

Early detection of malicious activity within your data using full content analysis and machine learning. Reduce false positives and negatives through continuous ML and AI training on your data set by analysing for anomalies at the storage level.

Data protection on physical tape and giving a graphical interface to manage data stored on tape using a linear file system. Allows devices to access tape files like any network storage location, simplifying access and management, whilst freeing capacity on your FlashSystem for more frequently used data.

Powerful dashboard for operation and management using SaaS. Simplifying your day-to-day management and giving insights into your storage systems in a single dashboard.

Backup and recovery of physical, virtual, cloud and container environments. Simplifying your backup infrastructure by giving the ability to backup your entire environment with a single system.

Find out more about Meridian IT

Interested by our Security? Why not find out more about Meridian IT and what we offer. Meridian IT UK, a leading provider with 30 years of experience in IT Managed Services, Cyber Security, and Cloud solutions, boasts a strong partnership with IBM as a Platinum Partner.

Take a look at our LinkedIn to discover more about us!