Book description
Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management software for deep inspection, detection, and prioritization of threats has become a necessity of any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, combined with the log analysis, deep inspection, and detection of threats provided by IBM QRadar®, helps reduce the impact of incidents on business data. Such integration provides an excellent platform for hosting unstructured business data that is subject to regulatory compliance requirements.
This paper describes how IBM Spectrum Scale file audit logging can be integrated with IBM QRadar. Using QRadar, an administrator can monitor, inspect, detect, and derive insights for identifying potential threats to the data stored on IBM Spectrum Scale. When the threats are identified, you can quickly act on them to mitigate or reduce the impact of incidents.
This paper is intended for chief technology officers, solution engineers, security architects, and systems administrators.
NOTE: This paper assumes a basic understanding of IBM Spectrum Scale, IBM QRadar, and their administration.
Table of contents
- Front cover
-
IBM Spectrum Scale and IBM QRadar
- Introduction to IBM Spectrum Scale
- Introduction to IBM QRadar
- IBM QRadar with IBM Spectrum Scale: Identify threats to data and take action on potential incidents
- IBM Spectrum Scale cluster configuration
- Conclusion
- Related Publications
- Authors
- Now you can become a published author, too
- Stay connected to IBM Redbooks
- Notices
- Back cover
Product information
- Title: Enhanced Cyber Security with IBM Spectrum Scale and IBM QRadar
- Author(s):
- Release date: September 2019
- Publisher(s): IBM Redbooks
- ISBN: 9780738458014
You might also like
book
Enhanced Cyber Resilience Threat Detection with IBM FlashSystem Safeguarded Copy and IBM QRadar
The focus of this document is to demonstrate an early threat detection by using IBM® QRadar® …
book
Early Threat Detection and Safeguarding Data with IBM QRadar and IBM Copy Services Manager on IBM DS8000
The focus of this blueprint is to highlight early threat detection by IBM® QRadar® and to …
book
IBM QRadar Version 7.3 Planning and Installation Guide
Abstract With the advances of technology and the reoccurrence of data leaks, cyber security is a …
book
Building a Next-Gen SOC with IBM QRadar
Discover how different QRadar components fit together and explore its features and implementations based on your …