Search for tag: "cyber"

What challenges do organizations face in achieving end-to-end data resilience across workloads?

Watch this 1 minute video from Tan Long, Advisory Storage Technical Specialist, IBMASEAN, to learn what challenges that organizations face to achieve end-to-end dataresilience.

From  chq_master_librarians

The IBM X-Force Cyber Range Experience

IBM X-Force Cyber Ranges immerse organizations into real-world cyber simulations that help them assess their security posture and maturity for a full-business response. These gamified simulations…

From  chq_master_librarians

Why Cyber Resilience is important?

Watch this 1 minute video from Anil Nayak, Technical Sales Leader, IBM Storage, India &South Asia, to learn why cyber resilience is important.

From  chq_master_librarians

Get back to prime time in no time with verified and validate restores in minutes

With the average cost of a cyber crime rising to $4.24 million and recovery spanning from daysto weeks, cybercrimes continue to be a major concern for organizations world over. It’s criticalto…

From  chq_master_librarians

End to end data resilience with IBM Storage Defender

In an exclusive interview with Tan Long Siau, Advisory Storage Technical Specialist, IBMASEANZK, shares his thoughts on challenges faced by organizations in ensuring end to end dataresilience across…

From  chq_master_librarians

Quick Demo of IBM Storage Flashsystem Cybervault with Anil Nayak

Here's a quick demo of IBM Flashsystem Cybervault with Anil Nayak, Technical SalesManager of India and South Asia, IBM Storage to understand how it can be leveraged byorganizations to minimize…

From  chq_master_librarians

In Conversation with Anil Nayak, Technical Sales Manager, IBM Storage and Shweta Modgli, ETCIO

Why cybersecurity alone is not enough for organizations to deal with cyberattacks? Why do they need to focus on building a cyber resilience strategy now? In an exclusive interaction, Anil K Nayak,…

From  chq_master_librarians

IBM LinuxONE 4: Sustainability without compromise

IBM® LinuxONE Emperor 4, launched in September 2022, can help reduce both energy consumption and data center floor space while delivering the scale, performance and security that your business…

From  55000AJF1R 55000AJF1R

Building cyber-resilient data storage with IBM Storage FlashSystem

IBM FlashSystem can achieve data resilience by improving performance, elasticity, visibility, storage optimization and most importantly handling backups and recovering from ransomware, malware and…

From  chq_master_librarians

theCube interview with Del Hoobler – Beyond Firewalls

In this video we take a practical approach to getting started on your cyber defense strategy. If you don’t do anything else, what should you do? What resources and frameworks should you follow?…

From  chq_master_librarians

theCube interview with Chris Vollmer & Jeff Crume – Beyond Firewalls

Not only do you need to protect and avoid the increasing threat from cybercrime, but also you need the ability to mitigate the impact and stop compromised activities in its track, being able to…

From  chq_master_librarians

Protect your business with IBM Z Cyber Vault - 11092023

Threats to your company’s data continue to rise and now come from many different sources that include cyberattacks and attacks from privileged insiders. Protecting your data from these…

From  2700070HPT 2700070HPT

Is Your Business Resilient? Time to Build your Cyber Resilience Strategy (India Webinar)

With the average cost of a cybercrime rising to $4.24 million and recovery spanning from days to weeks, cybercrimes continue to be a major concern for organizations the world over. Even with the best…

From  chq_master_librarians

Is Your Business Resilient? Time to Build your Cyber Resilience Strategy.

With the average cost of a cybercrime rising to $4.24 million and recovery spanning from days to weeks, cybercrimes continue to be a major concern for organizations the world over. Even with the best…

From  chq_master_librarians

Enterprise Storage: Still the Best Plan

Join long-time industry experts, AJ Casamento from Brocade and Brian Sherman from the IBM Advanced Technology Group, for an interesting (and entertaining) discussion into the intricacies of…

From  2700070HPT 2700070HPT

QRadar EDR: Reducing false positives

QRadar EDR features Cyber Assistant, an AI-powered alert management system that helps ease analyst workloads by reducing the number of false positives by 90% on average. See how Cyber Assistant…

From  chq_master_librarians