Connect with Db2, Informix, Netezza, open source, and other data experts to gain value from your data, share insights, and solve problems.
Back to events
Using a cyber vault can enable you to reduce your recovery time from days to hours. But organizations also need to recover applications. And regulatory demands are forcing organizations to reduce their recovery point objectives.Join Anthony Ciabattoni, Db2 SWAT Team Lead, for a Db2 focused Cyber Vault overview focusing on the basic concepts, Db2 for z/OS involvement and data consistency validation. Learn all about the Cyber Vault, current functionality and various recovery techniques to reduce recovery time and loss of data in an event of a ransomware attack.Organizations need to be both cyber secure and cyber resilient. A cyber vault is built on regular point in time immutable copies of a production environment, stored in an isolated and secure location, on which organizations will run regular data analytics to identify data corruption. A validated cyber vault environment is housed in an air-gapped system to prevent contamination. In the event of a logical corruption, a cyber vault enables organizations to perform forensic analysis, surgical or catastrophic recoveries.Key speakersAnthony Ciabattoni, Executive IT Specialist - Db2 for z/OS SWAT Team Leader, IBM. Vince Rabat, Db 2 AI for z/OS Software Developer