General Page
Modern enterprises face an evolving threat landscape where cyberattacks are increasingly sophisticated, targeted, and disruptive. Traditional backup and disaster recovery solutions were not designed to handle the stealth and persistence of today’s cyber threats, leaving organizations vulnerable to prolonged outages and data loss. Key challenges include:
- Inadequate detection of logical data corruption
- Replication of compromised data across HA/DR environments
- Lack of isolated recovery environments
- Slow recovery times impacting business continuity
- Difficulty validating trusted backup copies
Ransomware Statistics from 2025
- 92% - of industries recognized ransomware as a primary threat7
- 30% - increase in victims, compared to 20248
- ~7,458 victims publicly listed on ransomware leak sites in 2025 (record high)7
- 4,701 attacks (Jan-Sept 2025) vs 3,219 in same period 20249
- A ransomware attack occurs roughly every ~19 seconds globally10
- 2025 is widely considered the most active ransomware year on record
| Traditional Resiliency for HA/DR | What's required for Cyber Resiliency | |
| Replication | Data replicated continuously but logical errors are also replicated instantaneously | Scheduled point in time copies stored in an isolated, secure location |
| Error Detection | Immediate detection of system and application outages | Regular data analytics on point in time copies to validate data consistency |
| Recover Points | Single recovery point that likely will be compromised | Multiple recovery points |
| Isolation | All systems, storage and tape pools participate in the same logical system structure | Air gapped systems and storage so that logical errors and malicious intruders can not propagate |
| Recovery Scope | Continuous availability and disaster recovery | Forensic, surgical or catastrophic recovery capabilities |
| Data Protection | Early Threat Detection | Clean Room Response | Safe Recovery |
|---|---|---|---|
| Periodic scheduled backups of production volumes created with IBM Safeguarded Copy (SGC) | Flash system inline detection with detection at on-set of a cyberattack | Automated response to attacks | Results provided on corrupted and the newest clean copies found |
| Ad hoc backup created of a LPAR's production volumes when a potential threat is detected on LPAR | Threats detected with PowerSC Tools like Real Time Compliance | Granular response policy can be configured taking into account the endpoint and threat type | Recovery to production environment initiated by administrator |
| Supports customers' RPO (Recovery Point Objective) requirements | Threats detected with non-PowerSC tools like IBM Zero Trust Execution for AIX (ZTEA) | Copy Services Manager creates clones of Cyber Vault images for test in the clean room environment | |
| Supports customers' Recovery Time Objective (RTO) requirements | All threats detected are received by the PowerSC GUI Server, which will forward the event messages to the IBM Power Cyber Vault Ansible Control Node | T1, T2, and T3 Integrity Checks are run in the clean room (including ZTEA and platform specific checks) | |
| Automatic, immutable, and isolated Images stored in the Power Cyber Vault to protect clients' snapshots and backups | PowerSC GUI Server can forward event messages to a Security Information and Event Management (SIEM) server | ||
| PowerSC Custom Events provide the ability to integrate additional customized security measures for additional threat detection |

Videos
The following page provides several videos for learning about IBM Power Cyber Vault:
IBM Power Cyber Vault - Videos
Frequently Asked Questions
The following page lists numerous common frequently asked questions:
IBM Power Cyber Vault - FAQs
Requirements
The IBM Power Cyber Vault - FAQs provide information about requirements; however, a dedicated page detailing requirements is under construction:
Coming soon: IBM Power Cyber Vault - Requirements
Getting Started with IBM Power Cyber Vault
The following page provides options and information for how your organization can get started with IBM Power Cyber Vault:
IBM Power Cyber Vault - Getting Started
Ransomware Statistics from 2024
- 59% - Organizations were hit by ransomware in the last year 1
- 94% - Victims said the attackers targeted their backups 1
- 70% - Attacks resulted in data encryption 1
- 78% - Organizations took more than 100 days to recover 2
- 56% - Pay ransom to get data back 1
- $4.88M USD - Average cost of a breach 2
Worldwide Regulations Mandating Cyber Resiliency
United States
- Interagency paper 'Sound Practices to Strengthen Operational Resilience'
- National Cybersecurity Strategy
- SEC Proposed Ruling for Cybersecurity Risk Management Rule 10
Brazil
- Brazilian General Data Protection Law ("Lei Geral de Protecao de Dados" or "LGPD")
- Resolution 4.502/2016
- Central Bank of Brazil ('BACEN') Resolution 4.893/2021
Europe
- Digital Operation Resilience Act (DORA)
United Kingdom
- FCA PS21/3 Building operational resilience policy statement
- Bank of England Operational resilience Statement of policy
India
- (RBI) Master Direction son Cyber Resilience and Digital Payment security Controls
South Africa
- South African Reserve Bank Prudential Authority 'Principles for operational resilience'
Singapore
- Monetary Authorizy of Singapore 'Guidelines on Risk Management Practices - Operational Risk'
Australia
- Prudential Standar CPS 230 - Operational Risk Management
Understanding Cyber Security & Cyber Resiliency
Definitions
- Cyber Security - 'The ability to protect or defend the use of cyberspace from cyber attacks.'3
- Cyber Resiliency - 'the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources' 4
More about Cyber Security & Cyber Resiliency
- Cyber Resiliency incorporates Cyber Security:
'Cyber-resilient systems are systems that have security measures or safeguards “built in” as a foundational part of the architecture and design and that display a high level of resiliency.'6 - In Cost of a Data Breach Report 2025, cyber resiliency is described as, 'On a long enough timeline, data breaches are inevitable. They happen despite strong preventative measures. While it's important to try to block threats, it can't be an organization's only focus. They must also focus on, and plan for, minimizing damage once an attack gets through and a breach occurs.'5
- 'Cyber resiliency is essentially about ensuring continued mission operations despite the fact that an adversary has established a foothold in the organization's systems and cyber infrastructure'6
- 'Cyber-resilient systems operate like the human body. The human body has an effective immune system that can readily absorb a continuous barrage of environmental hazards and provides the necessary defense mechanisms to maintain a healthy state. The body also has self-repair systems to recover from illnesses and injuries when defenses are breached. But cyber-resilient systems, like the human body, cannot defend against all hazards at all times. While the body cannot always recover to the same state of health as before an injury or illness, it can adapt. Similarly, cyber-resilient systems can recover minimal essential functionality (e.g., functionality to meet critical mission needs). Understanding the limitations of individuals, organizations, and systems is fundamental to managing risk.' 6
Summary
In summary, both cyber security and cyber resiliency are needed by organizations. Cyber security provides protection and defense against attacks to prevent cyber incidents. But if an incident occurs, cyber resiliency is needed to recover from the cyber incident.
NIST Computer Security Resource Center Glossary - Cyber Security
NIST Computer Security Resource Center Glossary - cyber resiliency
TotalAssure - Ransomware Statistics by Year: 2025 Comprehensive Report
For requests for this website, please contact Stephen Dominguez at email
Was this topic helpful?
Document Information
Modified date:
25 March 2026
UID
ibm17248605