Threats can be both internal and external to the organisation
Consider scenarios like a disgruntled employee or a malicious hacking organisation. While many prioritise external threats, protecting against internal risks is equally crucial. To ensure comprehensive storage protection, organisations must take every precaution to safeguard their data actively. IBM FlashSystem provides standard features, but incorporating additional IBM software can further enhance your cyber resiliency.
IBM Flash System Security Features:
Active Treat Detection
Actively monitor your FlashSystem to detect suspicious and unusual behaviors using machine learning. This proactive approach enables you to potentially identify a ransom attack before it fully executes. For instance, you may notice a spike in disk utilisation caused by the encryption aspect of a ransomware attack.
Encryption of Data at Rest (EDAR)
Ensuring that your FlashSystem is encrypted will prevent the physical theft of data as the disks will only be able to be read by a device that has the associated encryption key.
IBM Sageguarded Copy
Protected copies facilitate the capture of immutable snapshots of your storage, which you can automatically schedule at regular intervals. Consequently, in the event of a cyber attack or data corruption, you can quarantine, test, and restore these snapshots, significantly reducing downtime and data loss associated with ransomware attacks. On average, organisations take three weeks to recover from a cyber attack, with only 95% of the data recovered.
Multifactor Authentication (MFA)
The use of MFA reduces the risk of compromise by 99% according to a study conducted by Microsoft.
Role-Based Access Control (RBAC)
Users can be assigned to a group on the system, each group can have roles associated with it. These roles have different features of the system enabled on them. This allows for users to only have access to features that are required.
Object-Based Access Control (OBAC)
You can implement restrictions on a per-user group basis, limiting the objects users can view, manage, and configure. These objects include hosts, volumes, port sets, user groups, child pools, and more.
Disabling Login Interfaces
Access to the graphical user interface (GUI), command-line interface (CLI) and Representational State Transfer (REST) interface can be disabled. Reducing the interfaces that the FlashSystem can be access via, you greatly reduce the potential access points in a malicious attack.
IBM Storage Defender
IBM Storage Defender consists of a collection of software products that you can apply to your storage, providing additional functionality. You don’t need to purchase all features upfront, as licensing allows you to use different features as required.
Find out more about Meridian IT
Interested by our Security? Why not find out more about Meridian IT and what we offer. Meridian IT UK, a leading provider with 30 years of experience in IT Managed Services, Cyber Security, and Cloud solutions, boasts a strong partnership with IBM as a Platinum Partner.