IBM Support

IBM Power Cyber Vault

General Page

Modern cyberattacks increasingly target backups, silently corrupt or encrypt data, and propagate rapidly across environments - often overwhelming traditional high availability and disaster recovery (HA/DR) solutions. IBM® Power® Cyber Vault is a cyber resiliency solution designed to address these threats by helping organizations anticipate, withstand, recover from, and adapt to cyber incidents affecting IBM AIX®, IBM i, and Linux® on Power systems . It integrates technologies such as IBM power, IBM Storage (FlashSystem/DS8000), IBM Safeguarded Copy, IBM Copy Services Manager, IBM PowerSC, IBM Storage Insights Pro, IBM Zero Trust Execution For AIX, and Red Hat Ansible Automation Platform to deliver a secure, automated, and IBM Power-focused cyber-resilient solution.
 
Business Challenges

Modern enterprises face an evolving threat landscape where cyberattacks are increasingly sophisticated, targeted, and disruptive. Traditional backup and disaster recovery solutions were not designed to handle the stealth and persistence of today’s cyber threats, leaving organizations vulnerable to prolonged outages and data loss. Key challenges include:

  • Inadequate detection of logical data corruption
  • Replication of compromised data across HA/DR environments
  • Lack of isolated recovery environments
  • Slow recovery times impacting business continuity
  • Difficulty validating trusted backup copies
 

Ransomware Statistics from 2025

  • 92% - of industries recognized ransomware as a primary threat7
  • 30% - increase in victims, compared to 20248
  • ~7,458 victims publicly listed on ransomware leak sites in 2025 (record high)7
  • 4,701 attacks (Jan-Sept 2025) vs 3,219 in same period 20249
  • A ransomware attack occurs roughly every ~19 seconds globally10
  • 2025 is widely considered the most active ransomware year on record
 
 
Traditional Resiliency Solutions Will Not Protect You from Cyber Attack
 Traditional Resiliency for HA/DRWhat's required for Cyber Resiliency
ReplicationData replicated continuously but logical errors are also replicated instantaneouslyScheduled point in time copies stored in an isolated, secure location
Error DetectionImmediate detection of system and application outagesRegular data analytics on point in time copies to validate data consistency
Recover PointsSingle recovery point that likely will be compromisedMultiple recovery points
IsolationAll systems, storage and tape pools participate in the same logical system structureAir gapped systems and storage so that logical errors and malicious intruders can not propagate
Recovery ScopeContinuous availability and disaster recoveryForensic, surgical or catastrophic recovery capabilities
 
 
 
IBM Power Cyber Vault Offering Overview
Data ProtectionEarly Threat DetectionClean Room ResponseSafe Recovery
Periodic scheduled backups of production volumes created with IBM Safeguarded Copy (SGC)Flash system inline detection with detection at on-set of a cyberattackAutomated response to attacksResults provided on corrupted and the newest clean copies found
Ad hoc backup created of a LPAR's production volumes when a potential threat is detected on LPARThreats detected with PowerSC Tools like Real Time ComplianceGranular response policy can be configured taking into account the endpoint and threat typeRecovery to production environment initiated by administrator
Supports customers' RPO (Recovery Point Objective) requirementsThreats detected with non-PowerSC tools like IBM Zero Trust Execution for AIX (ZTEA)Copy Services Manager creates clones of Cyber Vault images for test in the clean room environment 
Supports customers' Recovery Time Objective (RTO) requirementsAll threats detected are received by the PowerSC GUI Server, which will forward the event messages to the IBM Power Cyber Vault Ansible Control NodeT1, T2, and T3 Integrity Checks are run in the clean room (including ZTEA and platform specific checks) 
Automatic, immutable, and isolated Images stored in the Power Cyber Vault to protect clients' snapshots and backupsPowerSC GUI Server can forward event messages to a Security Information and Event Management (SIEM) server  
 PowerSC Custom Events provide the ability to integrate additional customized security measures for additional threat detection  

 

 
Reference Architecture
 

Videos

The following page provides several videos for learning about IBM Power Cyber Vault:
IBM Power Cyber Vault - Videos


Frequently Asked Questions

The following page lists numerous common frequently asked questions:
IBM Power Cyber Vault - FAQs


Requirements

The IBM Power Cyber Vault - FAQs provide information about requirements; however, a dedicated page detailing requirements is under construction:
Coming soon: IBM Power Cyber Vault - Requirements


Getting Started with IBM Power Cyber Vault

The following page provides options and information for how your organization can get started with IBM Power Cyber Vault:
IBM Power Cyber Vault - Getting Started

 

 

Ransomware Statistics from 2024

  • 59% - Organizations were hit by ransomware in the last year 1
  • 94% - Victims said the attackers targeted their backups 1
  • 70% - Attacks resulted in data encryption 1
  • 78% - Organizations took more than 100 days to recover 2
  • 56% - Pay ransom to get data back 1
  • $4.88M USD - Average cost of a breach 2
 

Worldwide Regulations Mandating Cyber Resiliency

United States

  • Interagency paper 'Sound Practices to Strengthen Operational Resilience'
  • National Cybersecurity Strategy
  • SEC Proposed Ruling for Cybersecurity Risk Management Rule 10

Brazil

  • Brazilian General Data Protection Law ("Lei Geral de Protecao de Dados" or "LGPD")
  • Resolution 4.502/2016
  • Central Bank of Brazil ('BACEN') Resolution 4.893/2021

Europe

  • Digital Operation Resilience Act (DORA)

United Kingdom

  • FCA PS21/3 Building operational resilience policy statement
  • Bank of England Operational resilience Statement of policy

India

  • (RBI) Master Direction son Cyber Resilience and Digital Payment security Controls

South Africa

  • South African Reserve Bank Prudential Authority 'Principles for operational resilience'

Singapore

  • Monetary Authorizy of Singapore 'Guidelines on Risk Management Practices - Operational Risk'

Australia

  • Prudential Standar CPS 230 - Operational Risk Management
 

Understanding Cyber Security & Cyber Resiliency

Definitions

  • Cyber Security - 'The ability to protect or defend the use of cyberspace from cyber attacks.'3
  • Cyber Resiliency - 'the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources' 4

More about Cyber Security & Cyber Resiliency 

  • Cyber Resiliency incorporates Cyber Security:
    'Cyber-resilient systems are systems that have security measures or safeguards “built in” as a foundational part of the architecture and design and that display a high level of resiliency.'6
  • In Cost of a Data Breach Report 2025, cyber resiliency is described as, 'On a long enough timeline, data breaches are inevitable. They happen despite strong preventative measures. While it's important to try to block threats, it can't be an organization's only focus. They must also focus on, and plan for, minimizing damage once an attack gets through and a breach occurs.'5
  • 'Cyber resiliency is essentially about ensuring continued mission operations despite the fact that an adversary has established a foothold in the organization's systems and cyber infrastructure'6
  • 'Cyber-resilient systems operate like the human body. The human body has an effective immune system that can readily absorb a continuous barrage of environmental hazards and provides the necessary defense mechanisms to maintain a healthy state. The body also has self-repair systems to recover from illnesses and injuries when defenses are breached. But cyber-resilient systems, like the human body, cannot defend against all hazards at all times. While the body cannot always recover to the same state of health as before an injury or illness, it can adapt. Similarly, cyber-resilient systems can recover minimal essential functionality (e.g., functionality to meet critical mission needs). Understanding the limitations of individuals, organizations, and systems is fundamental to managing risk.' 6

Summary

In summary, both cyber security and cyber resiliency are needed by organizations.  Cyber security provides protection and defense against attacks to prevent cyber incidents. But if an incident occurs, cyber resiliency is needed to recover from the cyber incident.

[{"Type":"MASTER","Line of Business":{"code":"LOB68","label":"Power HW"},"Business Unit":{"code":"BU070","label":"IBM Infrastructure"},"Product":{"code":"SSB2BD2","label":"IBM PowerSC"},"ARM Category":[{"code":"a8m3p000000UoK7AAK","label":"PowerSC Multi-factor Authentication (PMFA)"},{"code":"a8m3p000000UoK2AAK","label":"PowerSC Standard (PSC)"}],"Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"}],"Version":"2.0.0;2.1.0;2.2.0;2.3.0"}]

Document Information

Modified date:
25 March 2026

UID

ibm17248605