Webcasts
Abstract
Cyber-attacks are becoming more sophisticated and challenging to detect. As the attackers begin using different attack vectors and types, it is critical that a broad set of detection technologies be implemented. This can include real-time corruption detection via primary storage, via sensors running within a machine, deep analysis of data structures on protected data for many application types and monitoring for suspicious activity (including automatically triggering deeper analysis if such activity is detected).
The IBM Storage Defender family offers many cyber resilient features such as high-performance recovery points using air-gapped and immutable backups, but this session will focus on one of the most critical aspects of cyber resilience: Detecting different types of attacks as quickly as possible. This session will cover the different types of detection, why such sophisticated detection capabilities are required, and a demonstration of the underlying technology.
Content
Audience: Clients, IBM Business Partners and IBMers
Date: Tuesday, March 31st, 2026
Time: 12:00 PM ET, 11:00 AM CT, 5:00 PM London, 6:00 PM Paris
Duration: 60-minutes
Speaker: Dan Thompson, Senior Storage Technical Specialist, Advanced Technology Group (ATG)
Register @ https://ibm.biz/BdpsjV or Scan this QR Code to quickly register! After registering you will receive an email confirming your registration with information you need to join the Webinar.
Join our Accelerate mailing list: Receive notifications of upcoming webinars by sending an email to Accelerate-join@hursley.ibm.com
Was this topic helpful?
Document Information
Modified date:
20 February 2026
UID
ibm17261413