How can Guardium Insights, a data security solution , help you (yes, you!) cut down on your SIEM costs? Before I explain, letโs set some context. In conversations with enterprise customers, many have reported that with other data security solutions, SIEM costsโtypically billed per number...
IBM Spectrum Scale requires SSH configuration across itโs cluster for its management and administration. Each administration node must be able to run administration commands without the use of a password and without producing any extraneous messages. Also, most of the administration commands...
In IBM Spectrum Scale 5.0.5, fileset auditing and skip fileset auditing are available. You can choose up to 20 filesets to apply fileset auditing to, which means that file system activity is only audited if it occurs in the specified filesets. Or, you can choose up to 20 filesets to skip fileset...
Acknowledgement to co-creators: Sandeep Patil, Prayas Gupta, Chetan Kulkarni, Prashant Sodhiya, Carl Zetie and Wayne Sawdon. IBM Spectrum Scale is a high performance file and object storage with security features covering from authentication of data to authorization of data to secure data at...
As a user of IBM Spectrum Scale, we need to be aware of the security on our Spectrum Scale cluster. Thatโs where security posture steps in. It gives us a graphical representation of IBM Spectrum Scale cluster's security aspects in Kibana. This enables IBM Spectrum Scale administrators to quickly...
IBM Spectrum Scale HDFS Transparency implementation integrates both the NameNodes and the DataNodes services and responds to the request as if it were HDFS on IBM Spectrum Scale file system (GPFS). In HDFS, DataNodes contains the local disk for the file system and in order to scale the storage...
Acknowledgement: Thanks to Asmahan Ali , Kumaran Rajaram, & Carl Zetie for their inputs. In an organization there can be different workloads requiring different security posture. As an example, one of the workloads is a high performance computing workload dealing with non-sensitive data...
Today, Artificial Intelligence (AI) & Analytics are ubiquitous across industry verticals. Healthcare & Life Science is one such industry where AI and analytics are being used for everything from drug discovery and personalized precision medicine, to predicting hospital walk in patients...
Threats from cyber attacks are at an all time high. These threat agents can be external, as well as internal, to an organization. Since 'data' is the new oil, most of these attacks are to directed to the data. It is either to illegitimately gain access to the data or to maliciously corrupt the...