We're back with our series IBM Storage Rocks 🚀 highlighting all of the great content, events, and announcements in IBM Storage. Enjoy our curated content to stay informed and in the loop!
📣 Announcements & Highlights
@Matthew Kelm showcases how IBM Fusion for Red Hat AI unifies data, inference, and operations into a single, sovereign on‑premises platform in the blog Unlocking Dark Data at the Speed of Inference: IBM Fusion for Red Hat AI
@Shelly Howrigon walks through how SVC enables organizations to modernize at their own pace-without sacrificing uptime, without increasing complexity, and without constantly retraining teams on new tools in the blog Why IBM SAN Volume Controller Still Matters in Modern Storage Architecture
🛡️IBM Storage Defender Product Release Updates
📌IBM Storage Defender Copy Defender Management
Modern enterprises rely heavily on consistent, rapid, and application‑aware data protection capabilities to meet demanding RPO/RTO expectations. For customers running applications like Microsoft SQL Server, Oracle, InterSystems Iris, SAP-HANA on VMware with Dell PowerMax as the underlying storage, IBM Storage Defender Copy Data Management (CDM) offers an orchestrated, automated, and fully governed approach to snapshot creation, recovery, and lifecycle management.
Read more in @Pranit Reke's blog Behind the Scenes: IBM Storage Defender CDM's Snapshot & Recovery orchestration for DB Applications on VMware with Dell PowerMax
📌Upcoming ATG Webinar Sessions:
📆 Accelerate with ATG: IBM Storage Defender Data Resiliency Service (DRS): Introduction and Updates – 3/12/26 at 12:00 PM ET
Cyber Attacks require a smarter approach to data resiliency beyond simply implementing backups and other types of data protection. We need to be able to detect attacks of various types as quickly as possible, including validating that recovery points are clean. We need to catalog all viable recovery points and be able to validate that the necessary levels of protection have been provided. We need to periodically orchestrate recovery tests so that we know for certain that recovery from different scenarios is possible. The IBM Storage Defender Data Resiliency Service allows an organization to set up governance profiles that dictate the level of data resiliency any application requires, report upon compliance to those governance rules, organize critical assets into groups needed for a given application, detect cyber attacks in real time and via deep analysis and then be able to test recoveries of those application groups. The Data Resiliency Service allows lines of business and Security Operations personnel the ability to see, at a glance, that the data resiliency service required for all critical applications is being provided, including orchestrated recovery testing. Register today!
📆 Accelerate with ATG: IBM FlashSystem/FCM: The Next Generation and 9.1.2 Technical Update – 3/24/26 at 12:00 PM ET
Come join us as we explore the next generation of IBM FlashSystems and the FlashCore module that powers them: the FCM5. We will also explore the software updates in the 9.1.2 NonLTS release of Storage Virtualize. Also learn about how IBM is using agentic AI to transform the way storage administrators work. Register today!
📆 Accelerate with ATG: Improve Your Cyber Resiliency with Solutions from IBM which adhere to the NIST Data Resiliency Framework – 3/26/26 at 12:00 PM ET
By 2028, Gartner predicts that 50% of CISOs will rebrand their cybersecurity programs to be cyber resiliency programs. In this session, we'll discuss the NIST framework for cyber resiliency and how complimentary IBM products/solutions Z Cyber Vault, IBM Z Backup Resiliency (IZBR), and IBM Threat Detection for z/OS (TDz) can elevate a client's cyber resiliency program to new heights. Come learn how IBM can help make your or your client's z/OS environments more cyber resilient. Register today!
📆 Accelerate with ATG: Detecting Cyber Attacks with IBM Storage Defender – 3/31/26 at 12:00 PM ET
Cyber-attacks are becoming more sophisticated and challenging to detect. As the attackers begin using different attack vectors and types, it is critical that a broad set of detection technologies be implemented. This can include real-time corruption detection via primary storage, via sensors running within a machine, deep analysis of data structures on protected data for many application types and monitoring for suspicious activity (including automatically triggering deeper analysis if such activity is detected). The IBM Storage Defender family offers many cyber resilient features such as high-performance recovery points using air-gapped and immutable backups, but this session will focus on one of the most critical aspects of cyber resilience: Detecting different types of attacks as quickly as possible. This session will cover the different types of detection, why such sophisticated detection capabilities are required, and a demonstration of the underlying technology. Register today!
đź“–New IBM Redbooks
📌IBM TS7700 R5.4 Guide: This IBM® Redbooks® publication covers IBM TS7700 R5.4 and R5.4 PGA1. The IBM TS7700 is part of a family of IBM Enterprise tape products. This book is intended for system architects and storage administrators who want to integrate their storage systems for optimal operation. This publication explains features and concepts that are specific to the IBM TS7700 as of release R5.3. The R5.3 microcode level provides IBM TS7700 Cloud Storage Tier enhancements, IBM DS8000 Object Storage enhancements, Management Interface dual control security, and other smaller enhancements. The R5.3 microcode level can be installed on the IBM TS7770 and IBM TS7760 models only.
📌IBM DS8000 Copy Services: Updated for IBM DS8000 Release 10.1: IBM DS8000 Copy Services: Updated for IBM DS8000 Release 10.1: This IBM Redbooks® publication provides comprehensive guidance to plan, install, configure, and manage IBM Copy Services on IBM DS8000® systems in both IBM Z® and Open Systems environments.
It is designed to help you accomplish the following tasks.
- Design and implement a new Copy Services solution or migrate from an existing configuration.
- Apply best practices, hints, and tips to maximize the effectiveness of your implementation.
- Use tools and automation products that simplify and streamline Copy Services operations.
📌Best Practices for IBM DS8000 and IBM z/OS HyperSwap with IBM Copy Services Manager: Updated for IBM DS8000 Release 10.1: IBM® z/OS® customers often require 24x7 application availability to meet high availability (HA), disaster recovery (DR), and business continuity needs. IBM HyperSwap® technology provides an industry-standard solution for automated storage failover, offering multiple implementation options for IBM System z® and z/OS environments. This book is intended for system programmers, storage administrators, disaster recovery specialists, and IT architects responsible for designing and managing high-availability and disaster recovery solutions in IBM z/OS environments.
đź’¬ Trending Discussions
Check out these discussions in IBM Storage and share your expertise:
👉How long from End of Marketing until End of Support in the SAN world? posted in the Global Storage Forum
👉IBM Storage Protect Backup/Archive Client and Defender posted in IBM Storage Defender
👉Cyber resilient consistent safeguarded copy for IBM Storage Protect on IBM Storage Scale posted in the Global Storage Forum
👉Looking for a process to Replace an SVC enhanced stretch cluster configuration based on 2xIOGs 2145 SA2 with 2xIOG of SV3 posted in IBM FlashSystem
📆 Events
12 March | ATG Webcast - IBM Storage Defender Data Resiliency Service (DRS): Introduction and Updates
16 - 19 March | San Jose, California - NVIDIA GTC
24 March | ATG Webcast - IBM FlashSystem/FCM: The Next Generation and 9.1.2 Technical Update
24 - 25 March | London, United Kingdom - Storage Strategy Event
🚀 IBM Storage Corner
Julien Demeulenaere shares details and photos from the recent IBM UKI Tape Roadshow where the S3 Deep Archive roadmap highlighted the latest in Tape technology!
------------------------------
IBM TechXchange Community Team
------------------------------