IBM Support

Detecting Cyber-Attacks with IBM Spectrum Sentinel



When designing a cyber-resilient infrastructure, many critical layers of security software and resilient storage must be implemented. However, what happens if malware successfully infects your environment and is not detected in time to prevent data corruption? In the past, data corruption was often detected because data was quickly found to be inaccessible or unusable. However, as malware has grown in sophistication, the infection has become more difficult to detect immediately and lies hidden until a later time.

IBM Spectrum Sentinel can detect corruption hidden within data sources, such as databases. For example, immutable snapshots of Epic Cache or Iris databases can be scanned, and potential corruption identified. With an accurate detection rate above 99%, Spectrum Sentinel can analyze the internal data structures of the database to detect corruption that would otherwise stay hidden.

Please join the IBM Advanced Technology Group for an introduction and demonstration of Spectrum Sentinel as well as the Safeguarded Copy of IBM FlashSystems.


Date:  Tuesday, September 13th, 2022

Speakers:  Dan Thompson, Senior Storage Technical Specialist and Dan Zehnpfennig, Senior Storage Technical Specialist both from the Advanced Technology Group


[{"Type":"MASTER","Line of Business":{"code":"LOB26","label":"Storage"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Product":{"code":"SSOYD7","label":"IBM Spectrum Sentinel"},"ARM Category":[],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"All Versions"}]

Document Information

Modified date:
15 September 2022