IBM Defender continues to evolve, offering robust features designed to fortify your cybersecurity posture. The latest updates focus on refining asset grouping, enhancing DRS app awareness, bolstering IBM Fusion integration, and improving the Defender sensors. These enhancements are pivotal in helping you group assets effectively, ensuring comprehensive protection and swift recovery of critical infrastructure.
One significant enhancement is the utilization of metadata from IBM Storage Protect and Data Protect to automatically group assets into applications or recovery groups. Previously, Defender relied heavily on VMware's vCenter, limiting its potential. Now, with the introduction of 2.0.12, Defender leverages metadata from backup sources, not the actual data, to suggest groups, particularly around Oracle and SAP HANA from IBM Data Protect. This shift underscores Defender's commitment to harnessing every available data point for more accurate and confident asset grouping.
Defender has also expanded its database inventory capabilities. Alongside Oracle and SAP HANA, clients can now gather inventory for Active Directory and Db2 instances. This progression highlights IBM's dedication to covering a broad spectrum of asset types, enhancing overall resilience against cyber threats.
Recognizing the growing significance of container-based environments, IBM Defender has initiated DRS support for IBM Fusion. In this release, users can access container inventories from Fusion instances, marking a crucial step towards holistic protection across diverse technological landscapes.
Furthermore, Recovery of Virtual Machines through Storage Protect is a game-changer. Earlier, Defender used Storage Protect for Virtual Environments data solely to understand protected assets. Now, clients can recover these assets via Storage Protect for Virtual Environments, streamlining the recovery process and minimizing downtime.
In our ongoing quest to provide top-tier cyber resilience solutions, we are thrilled to announce significant enhancements to our Defender Sensors. This update is a testament to IBM's commitment to staying ahead of evolving threats, especially in the realm of ransomware attacks. Ransomware, known for its malicious encryption of users' data, has continually adapted its tactics. One such tactic involves exploiting memory-mapped files, a technique that poses a formidable challenge as it operates at a low level within the system. However, IBM has risen to this challenge with the latest release of our Defender Sensors.
Our new and improved Sensor now boasts the capability to detect and prevent ransomware attacks that employ memory-mapped files. This enhancement significantly strengthens our defense mechanism, ensuring comprehensive protection across your Linux systems.
To facilitate more efficient access management, Defender Resilience Service has introduced Resource-Based Access Control (RBAC) based on location. This feature allows grouping of assets by their geographical locations, accelerating user access processing and ensuring relevant personnel have timely access to critical resources.
Lastly, IBM Defender has removed all trial limitations, allowing users to experience the full suite of Defender features. This move ensures that users can fully evaluate Defender's value proposition before committing to it, fostering a risk-free evaluation process.
To find out more about this and past releases visit the What’s New section of the IBM Storage Defender documentation. To learn more about what is coming reach out to IBM Sales to talk futures and roadmap.
Stay tuned for more updates as we continue our mission to safeguard your digital world. In the meantime, rest assured that with IBM's Storage Defender you're equipped with a powerful ally in the battle to protect your business.