SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
IBM Systems and Technology
Solution Brief




                                                                  IBM Storwize V7000
                                                                  Unified: Safeguarding your
                                                                  critical data
                                                                  Integration with Symantec or McAfee solutions for
                                                                  NAS delivers essential malware protection


                                                                  With today’s continuing explosive growth in information and data comes
                    Highlights                                    the need for storing data without the risk of compromising data integrity.
                                                                  On a smarter planet where instrumented, interconnected and intelligent
                Leverage scalable, high-performing
           ●● ● ●
                                                                  devices constantly gather, generate and process information to build com-
                scanning and repair services to ensure
                data integrity
                                                                  petitive advantages, organizations of all sizes not only need to improve
                                                                  their storage efficiency to meet growing business requirements, they also
                Capitalize on built-in storage technology
           ●● ● ●
                                                                  need to safeguard shared data from malware, viruses and other threats.
                for easy, tight integration with caching
                capabilities for faster processing
                                                                  What’s needed is a cost-effective, scalable, high-performance storage
                    Manage network traffic and proactively
                                                                  solution designed for optimal efficiency—one that easily integrates with
           ●● ● ●


                    handle damaged or infected files with
                    flexible deployment options                   industry-leading antivirus software for NAS to help protect your storage
                                                                  environment and prevent malware from infecting the enterprise. The
           ●● ● ●
                    Reduce implementation time and mitigate
                    risk with pre-qualified antivirus solutions
                                                                  IBM Storwize® V7000 Unified is a virtualized storage system designed
                    for network-attached storage (NAS)            to meet these requirements, seamlessly integrating with antivirus software
                                                                  for NAS from Symantec or McAfee to deliver a comprehensive solution
           ●● ● ●
                    Extend anti-malware protection with
                    high-availability and disaster-recovery       to safeguard your data from malicious threats. The Storwize V7000
                    functionality                                 Unified also consolidates block and file workloads into a single storage
                                                                  system for simplicity of management and reduced cost, and offers enter-
                Manage growing business needs with
           ●● ● ●


                ease while also consolidating NAS and             prise-level capabilities to enhance data protection and storage efficiency.
                SAN data on a single system

                                                                  Tight integration with leading antivirus
                                                                  solutions
                                                                  Virus scanning is an integral part of the Storwize V7000 Unified—the
                                                                  system requires no additional code installation or license for enablement.
                                                                  To ensure easy integration and deployment, the Storwize V7000 Unified
IBM Systems and Technology
Solution Brief




offers a built-in antivirus connector along with scan configura-       On-access scan
tion and management via either the system’s command line               The most effective approach for detecting malware before it
interface or its icon-driven GUI. The Storwize V7000 Unified           can compromise data is to check files when they are accessed or
has been thoroughly tested and qualified with Symantec                 copied. In an on-access scan, files are immediately scanned
AntiVirus for NAS and McAfee VirusScan Enterprise for                  when a user creates or attempts to access a file over the net-
Storage, confirming interoperability and compatibility to detect       work. Storwize V7000 Unified opens a connection with the
viruses, worms and Trojan horses in all Common Internet                server-based Symantec or McAfee scan engine and then sends
File System (CIFS) file types, including mobile code and               the file to the engine for real-time scanning. An uninfected file
compressed-file formats.                                               that passes the scan test is passed to the requesting user. If scan-
                                                                       ning discovers malware, the file is quarantined and repaired.
Symantec AntiVirus for NAS provides scalable, high-                    The clean file is then sent to the Storwize V7000 Unified where
performance virus scanning and repair services to protect              it replaces the infected file in storage before access is granted to
valuable data stored on NAS devices. The solution provides             users. Only the original uninfected or repaired file is made
increased scanning performance and improved detection capa-            available to the requesting user.
bilities for protection against multi-blended threats. It can be
installed on a variety of platforms and accessed by a variety of       On-access scanning ensures that the most current virus signa-
supported browsers.                                                    tures are used for scans in a manner that typically produces a
                                                                       negligible effect on system performance. The Storwize V7000
McAfee VirusScan Enterprise for Storage can be installed on            Unified connector caches antivirus scan attributes and time-
Microsoft Windows platforms to extend the proven technology            stamps for each file to be used later in determining whether the
of award-winning McAfee Enterprise VirusScan to the data               file must be scanned or rescanned. If no new virus signatures
center by providing real-time threat protection to mission-            have been released since a file’s previous scanning, the system
critical NAS environments.                                             does not scan again, enhancing performance. When new antivi-
                                                                       rus definitions are received and updated, each requested file is
Flexible options for scanning and                                      rescanned before it is made available to the user.
repairing infected files
                                                                       Bulk scan
Storwize V7000 Unified works together with Symantec or
                                                                       This approach allows scanning of a subset of files on a file sys-
McAfee solutions to protect data, as well as the enterprise
                                                                       tem or a part of a file system. A bulk scan typically is scheduled
infrastructure from damaging malware, stopping it before ever
                                                                       to run daily overnight or at another low-usage time defined
reaching mission-critical files on the NAS system. The Storwize
                                                                       by the administrator to accommodate the time required for
V7000 Unified antivirus connector communicates with scan
                                                                       potentially lengthy scans and to avoid creating heavy network
engines from both Symantec and McAfee using the Internet
                                                                       traffic during peak processing times. Bulk scan eliminates the
Content Adaptation Protocol (ICAP). This enables two types of
                                                                       need to check individual files when they are accessed or copied.
scanning approaches along with additional configuration
                                                                       Even though new malware released between scans can escape
options to customize the deployment.
                                                                       detection and removal, bulk scanning remains a convenient
                                                                       solution for types of files that are less prone to malware attacks
                                                                       such as files that are static or created using the Network File
                                                                       System (NFS) protocol.




                                                                   2
IBM Systems and Technology
Solution Brief




Configuration options that make                                                      ●● ●
                                                                                            Load balancing and failover: The Storwize V7000 Unified
protection even more effective                                                              can be configured with multiple scan engines to distribute
Antivirus configurations on the Storwize V7000 Unified can be                               and balance the scan workload. If one scan engine becomes
defined and modified via the system’s easy-to-use graphical                                 unresponsive, the system’s antivirus connector automatically
interface or through its command line interface. Administrators                             directs the workload to the engines that remain operational.
can modify configurations dynamically, on the fly if needed,                                One scan engine can be configured to support multiple
without the need to shut down or restart antivirus scanning                                 Storwize V7000 Unified devices—or for robust failover,
services. Key configuration capabilities include:                                           multiple scan engines can be configured to scan a single
                                                                                            multi-terabyte storage device. A minimum of two scan
●● ●
       File processing strategy: The Storwize V7000 Unified can                             engines are recommended for high availability.
       be configured so that infected, non-repairable files can be
       quarantined and then manually or automatically deleted,
       notifying the user with the appropriate error message.




                                    File on-access scanning and infection repair


                              1 . File accessed                                    2 . Files transferred
                          on Storwize V7000 Unified                                    to scan engine

                                                                                                                                      3 . File scanned
                                                                                                                                       and infection
                                                                                                                                           repaired




                 User                                      IBM Storwize                                Symantec or McAfee
                                                           V7000 Unified                                   scan engine




          6. User                                            5. Infected file                     4 . Repaired file
          allowed                                            replaced with                    returned to Storwize
        access to file                                         repaired file                        V7000 Unified



When a user attempts to access a malware-infected file, the Storwize V7000 Unified solution configured for on-access scanning automatically invokes processes
for quarantine, repair and replacement before access is granted.




                                                                               3
IBM Systems and Technology
Solution Brief




Anti-malware solutions designed for                                       comprehensive set of built-in technologies to promote
mid-size and enterprise operations                                        business continuity and continuous access to NAS data.
Symantec and McAfee solutions for protecting NAS provide                  These enterprise-level data protection capabilities include:
real-time threat protection to mission-critical information
stored and accessed by Storwize V7000 Unified users. Their
                                                                          ●● ●
                                                                                 Asynchronous replication for site-to-site protection and
ability to detect virus-infected files and take action—repair,                   disaster recovery
isolate or delete as required—is built on advanced features
                                                                          ●● ●
                                                                                 File system and fileset level snapshots (up to 256 per file
designed for the needs of enterprise-level storage users and                     system)
includes:
                                                                          ●● ●
                                                                                 File level cloning for providing a full copy of a file at better
                                                                                 granularity
●● ●
       Advanced antivirus technology: Continuously blocks a wide
                                                                          ●● ●
                                                                                 IBM Tivoli® Storage Manager integration for extremely fast
       range of viruses and malicious code threats, including those              and efficient backup and restore processes, and for policy-
       hidden in compressed files                                                driven migration of files to an external disk or tape device
●● ●
       Detection of unwanted programs: Finds hidden spyware
                                                                          ●● ●
                                                                                 NDMP support to provide both full and incremental backup
       programs that open security holes                                         of files utilizing IBM and third-party storage management
●● ●
       Centralized management: Reduces overall cost and                          software
       provides ease of management
                                                                          ●● ●
                                                                                 RAID support and redundant components for high
●● ●
       Continuous protection: Automatically scans data when                      availability
       CIFS files are accessed or written to the Storwize V7000
       Unified, unlike traditional approaches that scan only at           Data protection capabilities leverage the IBM Active Cloud
       predetermined intervals                                            Engine™, which is integrated into the Storwize V7000 Unified
●● ●
       Cost effectiveness: Supports connection to more than one           and can provide a high-speed scan of the source file system to
       Storwize V7000 Unified device                                      determine files and directories that have been created, modified
●● ●
       Rapid notification: Sends notification whenever a virus is         or deleted. By quickly identifying candidates for backup or
       detected, enabling recipients to react instantly to a virus        disaster recovery, Active Cloud Engine can help improve data
       outbreak                                                           protection strategies.


Extending data protection with leading                                    Why IBM?
                                                                          IBM is committed to continuous improvement and seamless ap-
technologies
                                                                          plication integration to optimize business results and minimize
Beyond malware, organizations with rapidly growing volumes
                                                                          time-to-value. Storwize V7000 Unified deployed with Symantec
of unstructured data face a number of challenges to keeping
                                                                          AntiVirus for NAS or McAfee VirusScan Enterprise for Storage
that data protected and available. So in addition to antivirus
                                                                          provides enterprise-level data protection to meet today’s rapidly
software support, the Storwize V7000 Unified offers a




                                                                      4
IBM Systems and Technology
Solution Brief




                                                                                     high-availability features also ensure system operation without
                                                                                     interruption for business environments that need data quickly
                                                                                     and cannot tolerate data loss.

                                                                                     Features and capabilities built into Storwize V7000 Unified
                                                                                     such as the consolidation of SAN and NAS storage in one
                                                                                     system, a unified management GUI for both storage
                                                                                     approaches, and nondisruptive data migration to ensure ongo-
                                                                                     ing data protection, as the storage infrastructure grows, can
                                                                                     help organizations manage infrastructure expansion while
                                                                                     reducing IT complexity.

                                                                                     As a market leader in the storage industry, IBM can help you
                                                                                     handle storage challenges by providing innovative technology,
                                                                                     open standards, excellent performance, and a broad portfolio of
                                                                                     proven storage software, hardware and solutions offerings—all
                                                                                     backed by IBM’s world-class maintenance and support.

                                                                                     For more information
                                                                                     To learn more about IBM Storwize V7000 Unified, please
                                                                                     contact your IBM sales representative or IBM Business Partner,
                                                                                     or visit: ibm.com/systems/storage/disk/storwize_v7000
Designed for data protection and storage efficiency, the IBM Storwize V7000
Unified consolidates block and file workloads into a single storage system for
simplicity of management and reduced cost.                                           For a list of high-quality solutions with our partner
                                                                                     Independent Software Vendors (ISVs), including access
growing storage needs. Its single-management interface sup-                          to solution briefs and white papers, visit:
ports ease of use and management as its high-availability and                        ibm.com/systems/storage/solutions/isv
fault-tolerance features support continued operations even in
the face of a malware attack.                                                        Additionally, IBM Global Financing can help you acquire the
                                                                                     IT solutions that your business needs in the most cost-effective
Options for real-time, on-access scanning or off-peak bulk                           and strategic way possible. We’ll partner with credit-qualified
scanning help ensure continued safe operations, while the                            clients to customize an IT financing solution to suit your busi-
ability of Storwize V7000 Unified to scale nondisruptively as                        ness goals, enable effective cash management, and improve your
needed, eliminates impact on performance or data access during                       total cost of ownership. IBM Global Financing is your smartest
either capacity expansion or file scanning and repair. Built-in,                     choice to fund critical IT investments and propel your business
                                                                                     forward. For more information, visit: ibm.com/financing




                                                                                 5
Please Recycle




                 TSS03098-USEN-00

Más contenido relacionado

La actualidad más candente

Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco Service Provider
 
Wp defending-against-sql-injection
Wp defending-against-sql-injectionWp defending-against-sql-injection
Wp defending-against-sql-injection
cheinyeanlim
 
Alexandru Catalin Cosoi
Alexandru Catalin CosoiAlexandru Catalin Cosoi
Alexandru Catalin Cosoi
princescorpio
 
The Brooklyn Circus’ Secured Network
The Brooklyn Circus’ Secured NetworkThe Brooklyn Circus’ Secured Network
The Brooklyn Circus’ Secured Network
jeremywatkins57
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
Trend Micro
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
Ariel Martin Beliera
 

La actualidad más candente (20)

Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic
 
New Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the CloudNew Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the Cloud
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
Salesforce Cloud Security
Salesforce Cloud SecuritySalesforce Cloud Security
Salesforce Cloud Security
 
NetWitness Overview
NetWitness OverviewNetWitness Overview
NetWitness Overview
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
 
Wp defending-against-sql-injection
Wp defending-against-sql-injectionWp defending-against-sql-injection
Wp defending-against-sql-injection
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Alexandru Catalin Cosoi
Alexandru Catalin CosoiAlexandru Catalin Cosoi
Alexandru Catalin Cosoi
 
Software defined security-framework_final
Software defined security-framework_finalSoftware defined security-framework_final
Software defined security-framework_final
 
The Brooklyn Circus’ Secured Network
The Brooklyn Circus’ Secured NetworkThe Brooklyn Circus’ Secured Network
The Brooklyn Circus’ Secured Network
 
Why the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureWhy the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and Secure
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 

Similar a IBM Storwize V7000 Unified: Safeguarding your critical data

TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicyTECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
Symantec
 
Finjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheetFinjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheet
Elliott Lowe
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
Microsoft Singapore
 
Dell app assure 5 datasheet
Dell app assure 5 datasheetDell app assure 5 datasheet
Dell app assure 5 datasheet
Seth David
 
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Private Cloud
 

Similar a IBM Storwize V7000 Unified: Safeguarding your critical data (20)

Protect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemProtect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating System
 
move-anti-virus
move-anti-virusmove-anti-virus
move-anti-virus
 
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicyTECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfolio
 
Finjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheetFinjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheet
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public Cloud
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
3529 v mware_solution_brochure_final
3529 v mware_solution_brochure_final3529 v mware_solution_brochure_final
3529 v mware_solution_brochure_final
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
 
NSX 9 Core Use Cases
NSX 9 Core Use CasesNSX 9 Core Use Cases
NSX 9 Core Use Cases
 
VIA - White Paper
VIA - White PaperVIA - White Paper
VIA - White Paper
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Dell app assure 5 datasheet
Dell app assure 5 datasheetDell app assure 5 datasheet
Dell app assure 5 datasheet
 
Discovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise WorldDiscovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise World
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMware
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
ApplicationPro Flyer English
ApplicationPro Flyer EnglishApplicationPro Flyer English
ApplicationPro Flyer English
 
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
 

Más de IBM India Smarter Computing

Más de IBM India Smarter Computing (20)

Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments
 
All-flash Needs End to End Storage Efficiency
All-flash Needs End to End Storage EfficiencyAll-flash Needs End to End Storage Efficiency
All-flash Needs End to End Storage Efficiency
 
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
 
IBM FlashSystem 840 Product Guide
IBM FlashSystem 840 Product GuideIBM FlashSystem 840 Product Guide
IBM FlashSystem 840 Product Guide
 
IBM System x3250 M5
IBM System x3250 M5IBM System x3250 M5
IBM System x3250 M5
 
IBM NeXtScale nx360 M4
IBM NeXtScale nx360 M4IBM NeXtScale nx360 M4
IBM NeXtScale nx360 M4
 
IBM System x3650 M4 HD
IBM System x3650 M4 HDIBM System x3650 M4 HD
IBM System x3650 M4 HD
 
IBM System x3300 M4
IBM System x3300 M4IBM System x3300 M4
IBM System x3300 M4
 
IBM System x iDataPlex dx360 M4
IBM System x iDataPlex dx360 M4IBM System x iDataPlex dx360 M4
IBM System x iDataPlex dx360 M4
 
IBM System x3500 M4
IBM System x3500 M4IBM System x3500 M4
IBM System x3500 M4
 
IBM System x3550 M4
IBM System x3550 M4IBM System x3550 M4
IBM System x3550 M4
 
IBM System x3650 M4
IBM System x3650 M4IBM System x3650 M4
IBM System x3650 M4
 
IBM System x3500 M3
IBM System x3500 M3IBM System x3500 M3
IBM System x3500 M3
 
IBM System x3400 M3
IBM System x3400 M3IBM System x3400 M3
IBM System x3400 M3
 
IBM System x3250 M3
IBM System x3250 M3IBM System x3250 M3
IBM System x3250 M3
 
IBM System x3200 M3
IBM System x3200 M3IBM System x3200 M3
IBM System x3200 M3
 
IBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and ConfigurationIBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and Configuration
 
A Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization PerformanceA Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization Performance
 
IBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architectureIBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architecture
 
X6: The sixth generation of EXA Technology
X6: The sixth generation of EXA TechnologyX6: The sixth generation of EXA Technology
X6: The sixth generation of EXA Technology
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

IBM Storwize V7000 Unified: Safeguarding your critical data

  • 1. IBM Systems and Technology Solution Brief IBM Storwize V7000 Unified: Safeguarding your critical data Integration with Symantec or McAfee solutions for NAS delivers essential malware protection With today’s continuing explosive growth in information and data comes Highlights the need for storing data without the risk of compromising data integrity. On a smarter planet where instrumented, interconnected and intelligent Leverage scalable, high-performing ●● ● ● devices constantly gather, generate and process information to build com- scanning and repair services to ensure data integrity petitive advantages, organizations of all sizes not only need to improve their storage efficiency to meet growing business requirements, they also Capitalize on built-in storage technology ●● ● ● need to safeguard shared data from malware, viruses and other threats. for easy, tight integration with caching capabilities for faster processing What’s needed is a cost-effective, scalable, high-performance storage Manage network traffic and proactively solution designed for optimal efficiency—one that easily integrates with ●● ● ● handle damaged or infected files with flexible deployment options industry-leading antivirus software for NAS to help protect your storage environment and prevent malware from infecting the enterprise. The ●● ● ● Reduce implementation time and mitigate risk with pre-qualified antivirus solutions IBM Storwize® V7000 Unified is a virtualized storage system designed for network-attached storage (NAS) to meet these requirements, seamlessly integrating with antivirus software for NAS from Symantec or McAfee to deliver a comprehensive solution ●● ● ● Extend anti-malware protection with high-availability and disaster-recovery to safeguard your data from malicious threats. The Storwize V7000 functionality Unified also consolidates block and file workloads into a single storage system for simplicity of management and reduced cost, and offers enter- Manage growing business needs with ●● ● ● ease while also consolidating NAS and prise-level capabilities to enhance data protection and storage efficiency. SAN data on a single system Tight integration with leading antivirus solutions Virus scanning is an integral part of the Storwize V7000 Unified—the system requires no additional code installation or license for enablement. To ensure easy integration and deployment, the Storwize V7000 Unified
  • 2. IBM Systems and Technology Solution Brief offers a built-in antivirus connector along with scan configura- On-access scan tion and management via either the system’s command line The most effective approach for detecting malware before it interface or its icon-driven GUI. The Storwize V7000 Unified can compromise data is to check files when they are accessed or has been thoroughly tested and qualified with Symantec copied. In an on-access scan, files are immediately scanned AntiVirus for NAS and McAfee VirusScan Enterprise for when a user creates or attempts to access a file over the net- Storage, confirming interoperability and compatibility to detect work. Storwize V7000 Unified opens a connection with the viruses, worms and Trojan horses in all Common Internet server-based Symantec or McAfee scan engine and then sends File System (CIFS) file types, including mobile code and the file to the engine for real-time scanning. An uninfected file compressed-file formats. that passes the scan test is passed to the requesting user. If scan- ning discovers malware, the file is quarantined and repaired. Symantec AntiVirus for NAS provides scalable, high- The clean file is then sent to the Storwize V7000 Unified where performance virus scanning and repair services to protect it replaces the infected file in storage before access is granted to valuable data stored on NAS devices. The solution provides users. Only the original uninfected or repaired file is made increased scanning performance and improved detection capa- available to the requesting user. bilities for protection against multi-blended threats. It can be installed on a variety of platforms and accessed by a variety of On-access scanning ensures that the most current virus signa- supported browsers. tures are used for scans in a manner that typically produces a negligible effect on system performance. The Storwize V7000 McAfee VirusScan Enterprise for Storage can be installed on Unified connector caches antivirus scan attributes and time- Microsoft Windows platforms to extend the proven technology stamps for each file to be used later in determining whether the of award-winning McAfee Enterprise VirusScan to the data file must be scanned or rescanned. If no new virus signatures center by providing real-time threat protection to mission- have been released since a file’s previous scanning, the system critical NAS environments. does not scan again, enhancing performance. When new antivi- rus definitions are received and updated, each requested file is Flexible options for scanning and rescanned before it is made available to the user. repairing infected files Bulk scan Storwize V7000 Unified works together with Symantec or This approach allows scanning of a subset of files on a file sys- McAfee solutions to protect data, as well as the enterprise tem or a part of a file system. A bulk scan typically is scheduled infrastructure from damaging malware, stopping it before ever to run daily overnight or at another low-usage time defined reaching mission-critical files on the NAS system. The Storwize by the administrator to accommodate the time required for V7000 Unified antivirus connector communicates with scan potentially lengthy scans and to avoid creating heavy network engines from both Symantec and McAfee using the Internet traffic during peak processing times. Bulk scan eliminates the Content Adaptation Protocol (ICAP). This enables two types of need to check individual files when they are accessed or copied. scanning approaches along with additional configuration Even though new malware released between scans can escape options to customize the deployment. detection and removal, bulk scanning remains a convenient solution for types of files that are less prone to malware attacks such as files that are static or created using the Network File System (NFS) protocol. 2
  • 3. IBM Systems and Technology Solution Brief Configuration options that make ●● ● Load balancing and failover: The Storwize V7000 Unified protection even more effective can be configured with multiple scan engines to distribute Antivirus configurations on the Storwize V7000 Unified can be and balance the scan workload. If one scan engine becomes defined and modified via the system’s easy-to-use graphical unresponsive, the system’s antivirus connector automatically interface or through its command line interface. Administrators directs the workload to the engines that remain operational. can modify configurations dynamically, on the fly if needed, One scan engine can be configured to support multiple without the need to shut down or restart antivirus scanning Storwize V7000 Unified devices—or for robust failover, services. Key configuration capabilities include: multiple scan engines can be configured to scan a single multi-terabyte storage device. A minimum of two scan ●● ● File processing strategy: The Storwize V7000 Unified can engines are recommended for high availability. be configured so that infected, non-repairable files can be quarantined and then manually or automatically deleted, notifying the user with the appropriate error message. File on-access scanning and infection repair 1 . File accessed 2 . Files transferred on Storwize V7000 Unified to scan engine 3 . File scanned and infection repaired User IBM Storwize Symantec or McAfee V7000 Unified scan engine 6. User 5. Infected file 4 . Repaired file allowed replaced with returned to Storwize access to file repaired file V7000 Unified When a user attempts to access a malware-infected file, the Storwize V7000 Unified solution configured for on-access scanning automatically invokes processes for quarantine, repair and replacement before access is granted. 3
  • 4. IBM Systems and Technology Solution Brief Anti-malware solutions designed for comprehensive set of built-in technologies to promote mid-size and enterprise operations business continuity and continuous access to NAS data. Symantec and McAfee solutions for protecting NAS provide These enterprise-level data protection capabilities include: real-time threat protection to mission-critical information stored and accessed by Storwize V7000 Unified users. Their ●● ● Asynchronous replication for site-to-site protection and ability to detect virus-infected files and take action—repair, disaster recovery isolate or delete as required—is built on advanced features ●● ● File system and fileset level snapshots (up to 256 per file designed for the needs of enterprise-level storage users and system) includes: ●● ● File level cloning for providing a full copy of a file at better granularity ●● ● Advanced antivirus technology: Continuously blocks a wide ●● ● IBM Tivoli® Storage Manager integration for extremely fast range of viruses and malicious code threats, including those and efficient backup and restore processes, and for policy- hidden in compressed files driven migration of files to an external disk or tape device ●● ● Detection of unwanted programs: Finds hidden spyware ●● ● NDMP support to provide both full and incremental backup programs that open security holes of files utilizing IBM and third-party storage management ●● ● Centralized management: Reduces overall cost and software provides ease of management ●● ● RAID support and redundant components for high ●● ● Continuous protection: Automatically scans data when availability CIFS files are accessed or written to the Storwize V7000 Unified, unlike traditional approaches that scan only at Data protection capabilities leverage the IBM Active Cloud predetermined intervals Engine™, which is integrated into the Storwize V7000 Unified ●● ● Cost effectiveness: Supports connection to more than one and can provide a high-speed scan of the source file system to Storwize V7000 Unified device determine files and directories that have been created, modified ●● ● Rapid notification: Sends notification whenever a virus is or deleted. By quickly identifying candidates for backup or detected, enabling recipients to react instantly to a virus disaster recovery, Active Cloud Engine can help improve data outbreak protection strategies. Extending data protection with leading Why IBM? IBM is committed to continuous improvement and seamless ap- technologies plication integration to optimize business results and minimize Beyond malware, organizations with rapidly growing volumes time-to-value. Storwize V7000 Unified deployed with Symantec of unstructured data face a number of challenges to keeping AntiVirus for NAS or McAfee VirusScan Enterprise for Storage that data protected and available. So in addition to antivirus provides enterprise-level data protection to meet today’s rapidly software support, the Storwize V7000 Unified offers a 4
  • 5. IBM Systems and Technology Solution Brief high-availability features also ensure system operation without interruption for business environments that need data quickly and cannot tolerate data loss. Features and capabilities built into Storwize V7000 Unified such as the consolidation of SAN and NAS storage in one system, a unified management GUI for both storage approaches, and nondisruptive data migration to ensure ongo- ing data protection, as the storage infrastructure grows, can help organizations manage infrastructure expansion while reducing IT complexity. As a market leader in the storage industry, IBM can help you handle storage challenges by providing innovative technology, open standards, excellent performance, and a broad portfolio of proven storage software, hardware and solutions offerings—all backed by IBM’s world-class maintenance and support. For more information To learn more about IBM Storwize V7000 Unified, please contact your IBM sales representative or IBM Business Partner, or visit: ibm.com/systems/storage/disk/storwize_v7000 Designed for data protection and storage efficiency, the IBM Storwize V7000 Unified consolidates block and file workloads into a single storage system for simplicity of management and reduced cost. For a list of high-quality solutions with our partner Independent Software Vendors (ISVs), including access growing storage needs. Its single-management interface sup- to solution briefs and white papers, visit: ports ease of use and management as its high-availability and ibm.com/systems/storage/solutions/isv fault-tolerance features support continued operations even in the face of a malware attack. Additionally, IBM Global Financing can help you acquire the IT solutions that your business needs in the most cost-effective Options for real-time, on-access scanning or off-peak bulk and strategic way possible. We’ll partner with credit-qualified scanning help ensure continued safe operations, while the clients to customize an IT financing solution to suit your busi- ability of Storwize V7000 Unified to scale nondisruptively as ness goals, enable effective cash management, and improve your needed, eliminates impact on performance or data access during total cost of ownership. IBM Global Financing is your smartest either capacity expansion or file scanning and repair. Built-in, choice to fund critical IT investments and propel your business forward. For more information, visit: ibm.com/financing 5
  • 6. Please Recycle TSS03098-USEN-00