Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

Focusing on data security using IBM storage solutions

September 17, 2021

Focusing on data security using IBM storage solutions
powered by Sounder

According to a survey done by Fortune Magazine, the number one threat to a business cited by CEOs is cyberattacks.
With ransomware attacks increasing over the past few years, cybersecurity is a top priority for all segments, all industries, and even the government.
Shelby Skrhak speaks with Eric Herzog, VP of Business Development and Evangelism for IBM, about:
  • Why data security is so important
  • The move from traditional resilience to cyber resilience
  • The architecture approach to data resilience
  • Why administrative security is important

Data security

Cybersecurity has been an issue for a while. However, the digital transformation has intensified it.
“People are working remotely, the customers are remote, people are doing webinars to get information, not just in IT, but in every segment, business is being transacted over the internet,” Eric says. “The environment is ripe for ransomware and malware.”

IBM Security Division

To combat the cyberthreats, IBM has been imbuing their storage products with security technologies.
The company has built up a broad portfolio of storage solutions that include embedded cyber and data resilience which spans primary storage as well as secondary storage.

Cyber resilience

Traditional resilience refers to business continuity. Do you have a plan in place to keep your business running, if say, a hurricane or an earthquake hits?
Cyber resilience extends that philosophy to include cybercrime. With that comes a whole new set of questions.
“Are you doing air gapping, which allows you to separate to a different network or a different physical location as an example,” Eric says.

Architectural approach

IBM takes an architectural approach to data resilience.
Here’s what that looks like:

  • Profiling your data so you know what data is important, what is semi-important and what can just be archived
  • Looking at your budgets and determining what you want to spend
  • Evaluating your storage estate—IBM offers a free cyber resilience assessment covering all storage solutions
  • Architecting solutions that help you avoid malware and ransomware
  • Devising and practicing recovery processes for when a cyberattack does happen

 It’s important to think of security in two ways:

  • Keeping the bad guys out
  • Protecting yourself against internal threats
 That’s why it’s absolutely essential to include storage as part of your overall cybersecurity strategy.
IBM offers the Safeguarded Copy feature, which ensures that your storage is cyber and data resilient.

Administrative security

Another way to protect your company from internal threats is focusing on administrative security.
“Multiple administration is considered a good practice,” Eric says. “Some of our products have dual authentication, and in the case of Safeguarded Copy, we have three different admin levels.”
Additionally, Safeguarded Copy is immutable meaning it can’t be deleted or changed by any of the end users.
To learn more, contact Michel Mendez (michel.mendez@ingrammicro.com) or read Boost cyber resilience and more with IBM Storage.