IBM Cloud Global

 View Only

Protecting Data with IBM Cloud Object Storage

By Mark Seaborn posted Tue August 22, 2023 12:41 PM

  
IBM TXC

    Today’s enterprise systems require vast amounts of data analysis to create high enterprise business IQ. To protect and build trust in your data you need a platform that can assure data protection, durability, and integrity. Your storage platform must also manage the lifecycle of your data while keeping pace with constantly changing compliance requirements. IBM’s Cloud can help speed you on your journey to agile business practices by leveraging IBM’s Cloud Object Storage (ICOS) to create a data lake capable of storing all your relevant business data and using Watson AI to gain clarity of your business strengths and needs.

    Not only can ICOS speed you on your journey to the cloud, but it can also help you protect your data from numerous cyber-security threats prevalent in today’s global environment. As an IBM Security Architect I constantly focus on developing features that enhance the security posture of our storage platform. These features can protect against the ever-increasing number of adversaries looking to profit from your valuable data. I have collected a set of recommendations that can help protect you using out of the box features in the ICOS platform. 

    In this year’s TechXchange conference, my esteemed colleagues Nataraj Nagaratnam (IBM Fellow) and Pierre Carlson (ICOS Operations Architect) will host a session where they will present these recommendations and explain how the concepts in these recommendations can be implemented today in IBM’s storage platform. In this session they will discuss some common attack vectors and how ICOS can be used to mitigate the threats and thwart adversaries in this space. They will discuss several features that can reduce the likelihood of successful attacks by adversaries, as well as minimize the blast radius of an exploit. The discussion topics will include Protected Buckets, Context Based Restrictions, Activity Tracker, Usage Monitoring, Lifecycle Management Policy, Versioning, Immutable Objects and Object Lock. Each of these controls will be discussed in the context of the attack vector that is either mitigated or prevented by the control.

Session: 5302

Related blog.:

https://www.ibm.com/blog/ransomware-protection-with-object-lock/?c=storage

Don’t miss this opportunity; register now for TechXchange Conference from Sept 11-Sept 14th in Las Vegas.


#TechXchangeSession
#Cloud
0 comments
20 views

Permalink