SlideShare a Scribd company logo
1 of 6
Download to read offline
IBM Systems and Technology
Solution Brief




                                                                  IBM Storwize V7000
                                                                  Unified: Safeguarding your
                                                                  critical data
                                                                  Integration with Symantec or McAfee solutions for
                                                                  NAS delivers essential malware protection


                                                                  With today’s continuing explosive growth in information and data comes
                    Highlights                                    the need for storing data without the risk of compromising data integrity.
                                                                  On a smarter planet where instrumented, interconnected and intelligent
                Leverage scalable, high-performing
           ●● ● ●
                                                                  devices constantly gather, generate and process information to build com-
                scanning and repair services to ensure
                data integrity
                                                                  petitive advantages, organizations of all sizes not only need to improve
                                                                  their storage efficiency to meet growing business requirements, they also
                Capitalize on built-in storage technology
           ●● ● ●
                                                                  need to safeguard shared data from malware, viruses and other threats.
                for easy, tight integration with caching
                capabilities for faster processing
                                                                  What’s needed is a cost-effective, scalable, high-performance storage
                    Manage network traffic and proactively
                                                                  solution designed for optimal efficiency—one that easily integrates with
           ●● ● ●


                    handle damaged or infected files with
                    flexible deployment options                   industry-leading antivirus software for NAS to help protect your storage
                                                                  environment and prevent malware from infecting the enterprise. The
           ●● ● ●
                    Reduce implementation time and mitigate
                    risk with pre-qualified antivirus solutions
                                                                  IBM Storwize® V7000 Unified is a virtualized storage system designed
                    for network-attached storage (NAS)            to meet these requirements, seamlessly integrating with antivirus software
                                                                  for NAS from Symantec or McAfee to deliver a comprehensive solution
           ●● ● ●
                    Extend anti-malware protection with
                    high-availability and disaster-recovery       to safeguard your data from malicious threats. The Storwize V7000
                    functionality                                 Unified also consolidates block and file workloads into a single storage
                                                                  system for simplicity of management and reduced cost, and offers enter-
                Manage growing business needs with
           ●● ● ●


                ease while also consolidating NAS and             prise-level capabilities to enhance data protection and storage efficiency.
                SAN data on a single system

                                                                  Tight integration with leading antivirus
                                                                  solutions
                                                                  Virus scanning is an integral part of the Storwize V7000 Unified—the
                                                                  system requires no additional code installation or license for enablement.
                                                                  To ensure easy integration and deployment, the Storwize V7000 Unified
IBM Systems and Technology
Solution Brief




offers a built-in antivirus connector along with scan configura-       On-access scan
tion and management via either the system’s command line               The most effective approach for detecting malware before it
interface or its icon-driven GUI. The Storwize V7000 Unified           can compromise data is to check files when they are accessed or
has been thoroughly tested and qualified with Symantec                 copied. In an on-access scan, files are immediately scanned
AntiVirus for NAS and McAfee VirusScan Enterprise for                  when a user creates or attempts to access a file over the net-
Storage, confirming interoperability and compatibility to detect       work. Storwize V7000 Unified opens a connection with the
viruses, worms and Trojan horses in all Common Internet                server-based Symantec or McAfee scan engine and then sends
File System (CIFS) file types, including mobile code and               the file to the engine for real-time scanning. An uninfected file
compressed-file formats.                                               that passes the scan test is passed to the requesting user. If scan-
                                                                       ning discovers malware, the file is quarantined and repaired.
Symantec AntiVirus for NAS provides scalable, high-                    The clean file is then sent to the Storwize V7000 Unified where
performance virus scanning and repair services to protect              it replaces the infected file in storage before access is granted to
valuable data stored on NAS devices. The solution provides             users. Only the original uninfected or repaired file is made
increased scanning performance and improved detection capa-            available to the requesting user.
bilities for protection against multi-blended threats. It can be
installed on a variety of platforms and accessed by a variety of       On-access scanning ensures that the most current virus signa-
supported browsers.                                                    tures are used for scans in a manner that typically produces a
                                                                       negligible effect on system performance. The Storwize V7000
McAfee VirusScan Enterprise for Storage can be installed on            Unified connector caches antivirus scan attributes and time-
Microsoft Windows platforms to extend the proven technology            stamps for each file to be used later in determining whether the
of award-winning McAfee Enterprise VirusScan to the data               file must be scanned or rescanned. If no new virus signatures
center by providing real-time threat protection to mission-            have been released since a file’s previous scanning, the system
critical NAS environments.                                             does not scan again, enhancing performance. When new antivi-
                                                                       rus definitions are received and updated, each requested file is
Flexible options for scanning and                                      rescanned before it is made available to the user.
repairing infected files
                                                                       Bulk scan
Storwize V7000 Unified works together with Symantec or
                                                                       This approach allows scanning of a subset of files on a file sys-
McAfee solutions to protect data, as well as the enterprise
                                                                       tem or a part of a file system. A bulk scan typically is scheduled
infrastructure from damaging malware, stopping it before ever
                                                                       to run daily overnight or at another low-usage time defined
reaching mission-critical files on the NAS system. The Storwize
                                                                       by the administrator to accommodate the time required for
V7000 Unified antivirus connector communicates with scan
                                                                       potentially lengthy scans and to avoid creating heavy network
engines from both Symantec and McAfee using the Internet
                                                                       traffic during peak processing times. Bulk scan eliminates the
Content Adaptation Protocol (ICAP). This enables two types of
                                                                       need to check individual files when they are accessed or copied.
scanning approaches along with additional configuration
                                                                       Even though new malware released between scans can escape
options to customize the deployment.
                                                                       detection and removal, bulk scanning remains a convenient
                                                                       solution for types of files that are less prone to malware attacks
                                                                       such as files that are static or created using the Network File
                                                                       System (NFS) protocol.




                                                                   2
IBM Systems and Technology
Solution Brief




Configuration options that make                                                      ●● ●
                                                                                            Load balancing and failover: The Storwize V7000 Unified
protection even more effective                                                              can be configured with multiple scan engines to distribute
Antivirus configurations on the Storwize V7000 Unified can be                               and balance the scan workload. If one scan engine becomes
defined and modified via the system’s easy-to-use graphical                                 unresponsive, the system’s antivirus connector automatically
interface or through its command line interface. Administrators                             directs the workload to the engines that remain operational.
can modify configurations dynamically, on the fly if needed,                                One scan engine can be configured to support multiple
without the need to shut down or restart antivirus scanning                                 Storwize V7000 Unified devices—or for robust failover,
services. Key configuration capabilities include:                                           multiple scan engines can be configured to scan a single
                                                                                            multi-terabyte storage device. A minimum of two scan
●● ●
       File processing strategy: The Storwize V7000 Unified can                             engines are recommended for high availability.
       be configured so that infected, non-repairable files can be
       quarantined and then manually or automatically deleted,
       notifying the user with the appropriate error message.




                                    File on-access scanning and infection repair


                              1 . File accessed                                    2 . Files transferred
                          on Storwize V7000 Unified                                    to scan engine

                                                                                                                                      3 . File scanned
                                                                                                                                       and infection
                                                                                                                                           repaired




                 User                                      IBM Storwize                                Symantec or McAfee
                                                           V7000 Unified                                   scan engine




          6. User                                            5. Infected file                     4 . Repaired file
          allowed                                            replaced with                    returned to Storwize
        access to file                                         repaired file                        V7000 Unified



When a user attempts to access a malware-infected file, the Storwize V7000 Unified solution configured for on-access scanning automatically invokes processes
for quarantine, repair and replacement before access is granted.




                                                                               3
IBM Systems and Technology
Solution Brief




Anti-malware solutions designed for                                       comprehensive set of built-in technologies to promote
mid-size and enterprise operations                                        business continuity and continuous access to NAS data.
Symantec and McAfee solutions for protecting NAS provide                  These enterprise-level data protection capabilities include:
real-time threat protection to mission-critical information
stored and accessed by Storwize V7000 Unified users. Their
                                                                          ●● ●
                                                                                 Asynchronous replication for site-to-site protection and
ability to detect virus-infected files and take action—repair,                   disaster recovery
isolate or delete as required—is built on advanced features
                                                                          ●● ●
                                                                                 File system and fileset level snapshots (up to 256 per file
designed for the needs of enterprise-level storage users and                     system)
includes:
                                                                          ●● ●
                                                                                 File level cloning for providing a full copy of a file at better
                                                                                 granularity
●● ●
       Advanced antivirus technology: Continuously blocks a wide
                                                                          ●● ●
                                                                                 IBM Tivoli® Storage Manager integration for extremely fast
       range of viruses and malicious code threats, including those              and efficient backup and restore processes, and for policy-
       hidden in compressed files                                                driven migration of files to an external disk or tape device
●● ●
       Detection of unwanted programs: Finds hidden spyware
                                                                          ●● ●
                                                                                 NDMP support to provide both full and incremental backup
       programs that open security holes                                         of files utilizing IBM and third-party storage management
●● ●
       Centralized management: Reduces overall cost and                          software
       provides ease of management
                                                                          ●● ●
                                                                                 RAID support and redundant components for high
●● ●
       Continuous protection: Automatically scans data when                      availability
       CIFS files are accessed or written to the Storwize V7000
       Unified, unlike traditional approaches that scan only at           Data protection capabilities leverage the IBM Active Cloud
       predetermined intervals                                            Engine™, which is integrated into the Storwize V7000 Unified
●● ●
       Cost effectiveness: Supports connection to more than one           and can provide a high-speed scan of the source file system to
       Storwize V7000 Unified device                                      determine files and directories that have been created, modified
●● ●
       Rapid notification: Sends notification whenever a virus is         or deleted. By quickly identifying candidates for backup or
       detected, enabling recipients to react instantly to a virus        disaster recovery, Active Cloud Engine can help improve data
       outbreak                                                           protection strategies.


Extending data protection with leading                                    Why IBM?
                                                                          IBM is committed to continuous improvement and seamless ap-
technologies
                                                                          plication integration to optimize business results and minimize
Beyond malware, organizations with rapidly growing volumes
                                                                          time-to-value. Storwize V7000 Unified deployed with Symantec
of unstructured data face a number of challenges to keeping
                                                                          AntiVirus for NAS or McAfee VirusScan Enterprise for Storage
that data protected and available. So in addition to antivirus
                                                                          provides enterprise-level data protection to meet today’s rapidly
software support, the Storwize V7000 Unified offers a




                                                                      4
IBM Systems and Technology
Solution Brief




                                                                                     high-availability features also ensure system operation without
                                                                                     interruption for business environments that need data quickly
                                                                                     and cannot tolerate data loss.

                                                                                     Features and capabilities built into Storwize V7000 Unified
                                                                                     such as the consolidation of SAN and NAS storage in one
                                                                                     system, a unified management GUI for both storage
                                                                                     approaches, and nondisruptive data migration to ensure ongo-
                                                                                     ing data protection, as the storage infrastructure grows, can
                                                                                     help organizations manage infrastructure expansion while
                                                                                     reducing IT complexity.

                                                                                     As a market leader in the storage industry, IBM can help you
                                                                                     handle storage challenges by providing innovative technology,
                                                                                     open standards, excellent performance, and a broad portfolio of
                                                                                     proven storage software, hardware and solutions offerings—all
                                                                                     backed by IBM’s world-class maintenance and support.

                                                                                     For more information
                                                                                     To learn more about IBM Storwize V7000 Unified, please
                                                                                     contact your IBM sales representative or IBM Business Partner,
                                                                                     or visit: ibm.com/systems/storage/disk/storwize_v7000
Designed for data protection and storage efficiency, the IBM Storwize V7000
Unified consolidates block and file workloads into a single storage system for
simplicity of management and reduced cost.                                           For a list of high-quality solutions with our partner
                                                                                     Independent Software Vendors (ISVs), including access
growing storage needs. Its single-management interface sup-                          to solution briefs and white papers, visit:
ports ease of use and management as its high-availability and                        ibm.com/systems/storage/solutions/isv
fault-tolerance features support continued operations even in
the face of a malware attack.                                                        Additionally, IBM Global Financing can help you acquire the
                                                                                     IT solutions that your business needs in the most cost-effective
Options for real-time, on-access scanning or off-peak bulk                           and strategic way possible. We’ll partner with credit-qualified
scanning help ensure continued safe operations, while the                            clients to customize an IT financing solution to suit your busi-
ability of Storwize V7000 Unified to scale nondisruptively as                        ness goals, enable effective cash management, and improve your
needed, eliminates impact on performance or data access during                       total cost of ownership. IBM Global Financing is your smartest
either capacity expansion or file scanning and repair. Built-in,                     choice to fund critical IT investments and propel your business
                                                                                     forward. For more information, visit: ibm.com/financing




                                                                                 5
Please Recycle




                 TSS03098-USEN-00

More Related Content

What's hot

Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase
 
New Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the CloudNew Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the CloudOnline Tech
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco Service Provider
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMLuigi Perrone
 
Salesforce Cloud Security
Salesforce Cloud SecuritySalesforce Cloud Security
Salesforce Cloud Securitywaubin
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentKaspersky
 
Wp defending-against-sql-injection
Wp defending-against-sql-injectionWp defending-against-sql-injection
Wp defending-against-sql-injectioncheinyeanlim
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Alexandru Catalin Cosoi
Alexandru Catalin CosoiAlexandru Catalin Cosoi
Alexandru Catalin Cosoiprincescorpio
 
Software defined security-framework_final
Software defined security-framework_finalSoftware defined security-framework_final
Software defined security-framework_finalLan & Wan Solutions
 
The Brooklyn Circus’ Secured Network
The Brooklyn Circus’ Secured NetworkThe Brooklyn Circus’ Secured Network
The Brooklyn Circus’ Secured Networkjeremywatkins57
 
Why the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureWhy the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureInnoTech
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentationShapeBlue
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationAriel Martin Beliera
 

What's hot (20)

Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic
 
New Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the CloudNew Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the Cloud
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
Salesforce Cloud Security
Salesforce Cloud SecuritySalesforce Cloud Security
Salesforce Cloud Security
 
NetWitness Overview
NetWitness OverviewNetWitness Overview
NetWitness Overview
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
 
Wp defending-against-sql-injection
Wp defending-against-sql-injectionWp defending-against-sql-injection
Wp defending-against-sql-injection
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Alexandru Catalin Cosoi
Alexandru Catalin CosoiAlexandru Catalin Cosoi
Alexandru Catalin Cosoi
 
Software defined security-framework_final
Software defined security-framework_finalSoftware defined security-framework_final
Software defined security-framework_final
 
The Brooklyn Circus’ Secured Network
The Brooklyn Circus’ Secured NetworkThe Brooklyn Circus’ Secured Network
The Brooklyn Circus’ Secured Network
 
Why the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureWhy the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and Secure
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 

Similar to IBM Storwize V7000 Unified: Safeguarding your critical data

Protect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemProtect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemSymantec
 
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicyTECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicySymantec
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide Lauren Bell
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfoliojclauer
 
Finjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheetFinjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheetElliott Lowe
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudInsight
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 
3529 v mware_solution_brochure_final
3529 v mware_solution_brochure_final3529 v mware_solution_brochure_final
3529 v mware_solution_brochure_finalVictor Diaz Campos
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer Englishcynapspro GmbH
 
NSX 9 Core Use Cases
NSX 9 Core Use CasesNSX 9 Core Use Cases
NSX 9 Core Use CasesKevin Groat
 
VIA - White Paper
VIA - White PaperVIA - White Paper
VIA - White Papertrulsjeppe
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
Dell app assure 5 datasheet
Dell app assure 5 datasheetDell app assure 5 datasheet
Dell app assure 5 datasheetSeth David
 
Discovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise WorldDiscovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise WorldTEWMAGAZINE
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMwareJJDiGeronimo
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
ApplicationPro Flyer English
ApplicationPro Flyer EnglishApplicationPro Flyer English
ApplicationPro Flyer Englishcynapspro GmbH
 
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Private Cloud
 

Similar to IBM Storwize V7000 Unified: Safeguarding your critical data (20)

Protect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemProtect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating System
 
move-anti-virus
move-anti-virusmove-anti-virus
move-anti-virus
 
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicyTECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfolio
 
Finjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheetFinjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheet
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public Cloud
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
3529 v mware_solution_brochure_final
3529 v mware_solution_brochure_final3529 v mware_solution_brochure_final
3529 v mware_solution_brochure_final
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
 
NSX 9 Core Use Cases
NSX 9 Core Use CasesNSX 9 Core Use Cases
NSX 9 Core Use Cases
 
VIA - White Paper
VIA - White PaperVIA - White Paper
VIA - White Paper
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Dell app assure 5 datasheet
Dell app assure 5 datasheetDell app assure 5 datasheet
Dell app assure 5 datasheet
 
Discovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise WorldDiscovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise World
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMware
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
ApplicationPro Flyer English
ApplicationPro Flyer EnglishApplicationPro Flyer English
ApplicationPro Flyer English
 
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
 

More from IBM India Smarter Computing

Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments IBM India Smarter Computing
 
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...IBM India Smarter Computing
 
A Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization PerformanceA Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization PerformanceIBM India Smarter Computing
 
IBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architectureIBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architectureIBM India Smarter Computing
 

More from IBM India Smarter Computing (20)

Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments
 
All-flash Needs End to End Storage Efficiency
All-flash Needs End to End Storage EfficiencyAll-flash Needs End to End Storage Efficiency
All-flash Needs End to End Storage Efficiency
 
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
 
IBM FlashSystem 840 Product Guide
IBM FlashSystem 840 Product GuideIBM FlashSystem 840 Product Guide
IBM FlashSystem 840 Product Guide
 
IBM System x3250 M5
IBM System x3250 M5IBM System x3250 M5
IBM System x3250 M5
 
IBM NeXtScale nx360 M4
IBM NeXtScale nx360 M4IBM NeXtScale nx360 M4
IBM NeXtScale nx360 M4
 
IBM System x3650 M4 HD
IBM System x3650 M4 HDIBM System x3650 M4 HD
IBM System x3650 M4 HD
 
IBM System x3300 M4
IBM System x3300 M4IBM System x3300 M4
IBM System x3300 M4
 
IBM System x iDataPlex dx360 M4
IBM System x iDataPlex dx360 M4IBM System x iDataPlex dx360 M4
IBM System x iDataPlex dx360 M4
 
IBM System x3500 M4
IBM System x3500 M4IBM System x3500 M4
IBM System x3500 M4
 
IBM System x3550 M4
IBM System x3550 M4IBM System x3550 M4
IBM System x3550 M4
 
IBM System x3650 M4
IBM System x3650 M4IBM System x3650 M4
IBM System x3650 M4
 
IBM System x3500 M3
IBM System x3500 M3IBM System x3500 M3
IBM System x3500 M3
 
IBM System x3400 M3
IBM System x3400 M3IBM System x3400 M3
IBM System x3400 M3
 
IBM System x3250 M3
IBM System x3250 M3IBM System x3250 M3
IBM System x3250 M3
 
IBM System x3200 M3
IBM System x3200 M3IBM System x3200 M3
IBM System x3200 M3
 
IBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and ConfigurationIBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and Configuration
 
A Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization PerformanceA Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization Performance
 
IBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architectureIBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architecture
 
X6: The sixth generation of EXA Technology
X6: The sixth generation of EXA TechnologyX6: The sixth generation of EXA Technology
X6: The sixth generation of EXA Technology
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

IBM Storwize V7000 Unified: Safeguarding your critical data

  • 1. IBM Systems and Technology Solution Brief IBM Storwize V7000 Unified: Safeguarding your critical data Integration with Symantec or McAfee solutions for NAS delivers essential malware protection With today’s continuing explosive growth in information and data comes Highlights the need for storing data without the risk of compromising data integrity. On a smarter planet where instrumented, interconnected and intelligent Leverage scalable, high-performing ●● ● ● devices constantly gather, generate and process information to build com- scanning and repair services to ensure data integrity petitive advantages, organizations of all sizes not only need to improve their storage efficiency to meet growing business requirements, they also Capitalize on built-in storage technology ●● ● ● need to safeguard shared data from malware, viruses and other threats. for easy, tight integration with caching capabilities for faster processing What’s needed is a cost-effective, scalable, high-performance storage Manage network traffic and proactively solution designed for optimal efficiency—one that easily integrates with ●● ● ● handle damaged or infected files with flexible deployment options industry-leading antivirus software for NAS to help protect your storage environment and prevent malware from infecting the enterprise. The ●● ● ● Reduce implementation time and mitigate risk with pre-qualified antivirus solutions IBM Storwize® V7000 Unified is a virtualized storage system designed for network-attached storage (NAS) to meet these requirements, seamlessly integrating with antivirus software for NAS from Symantec or McAfee to deliver a comprehensive solution ●● ● ● Extend anti-malware protection with high-availability and disaster-recovery to safeguard your data from malicious threats. The Storwize V7000 functionality Unified also consolidates block and file workloads into a single storage system for simplicity of management and reduced cost, and offers enter- Manage growing business needs with ●● ● ● ease while also consolidating NAS and prise-level capabilities to enhance data protection and storage efficiency. SAN data on a single system Tight integration with leading antivirus solutions Virus scanning is an integral part of the Storwize V7000 Unified—the system requires no additional code installation or license for enablement. To ensure easy integration and deployment, the Storwize V7000 Unified
  • 2. IBM Systems and Technology Solution Brief offers a built-in antivirus connector along with scan configura- On-access scan tion and management via either the system’s command line The most effective approach for detecting malware before it interface or its icon-driven GUI. The Storwize V7000 Unified can compromise data is to check files when they are accessed or has been thoroughly tested and qualified with Symantec copied. In an on-access scan, files are immediately scanned AntiVirus for NAS and McAfee VirusScan Enterprise for when a user creates or attempts to access a file over the net- Storage, confirming interoperability and compatibility to detect work. Storwize V7000 Unified opens a connection with the viruses, worms and Trojan horses in all Common Internet server-based Symantec or McAfee scan engine and then sends File System (CIFS) file types, including mobile code and the file to the engine for real-time scanning. An uninfected file compressed-file formats. that passes the scan test is passed to the requesting user. If scan- ning discovers malware, the file is quarantined and repaired. Symantec AntiVirus for NAS provides scalable, high- The clean file is then sent to the Storwize V7000 Unified where performance virus scanning and repair services to protect it replaces the infected file in storage before access is granted to valuable data stored on NAS devices. The solution provides users. Only the original uninfected or repaired file is made increased scanning performance and improved detection capa- available to the requesting user. bilities for protection against multi-blended threats. It can be installed on a variety of platforms and accessed by a variety of On-access scanning ensures that the most current virus signa- supported browsers. tures are used for scans in a manner that typically produces a negligible effect on system performance. The Storwize V7000 McAfee VirusScan Enterprise for Storage can be installed on Unified connector caches antivirus scan attributes and time- Microsoft Windows platforms to extend the proven technology stamps for each file to be used later in determining whether the of award-winning McAfee Enterprise VirusScan to the data file must be scanned or rescanned. If no new virus signatures center by providing real-time threat protection to mission- have been released since a file’s previous scanning, the system critical NAS environments. does not scan again, enhancing performance. When new antivi- rus definitions are received and updated, each requested file is Flexible options for scanning and rescanned before it is made available to the user. repairing infected files Bulk scan Storwize V7000 Unified works together with Symantec or This approach allows scanning of a subset of files on a file sys- McAfee solutions to protect data, as well as the enterprise tem or a part of a file system. A bulk scan typically is scheduled infrastructure from damaging malware, stopping it before ever to run daily overnight or at another low-usage time defined reaching mission-critical files on the NAS system. The Storwize by the administrator to accommodate the time required for V7000 Unified antivirus connector communicates with scan potentially lengthy scans and to avoid creating heavy network engines from both Symantec and McAfee using the Internet traffic during peak processing times. Bulk scan eliminates the Content Adaptation Protocol (ICAP). This enables two types of need to check individual files when they are accessed or copied. scanning approaches along with additional configuration Even though new malware released between scans can escape options to customize the deployment. detection and removal, bulk scanning remains a convenient solution for types of files that are less prone to malware attacks such as files that are static or created using the Network File System (NFS) protocol. 2
  • 3. IBM Systems and Technology Solution Brief Configuration options that make ●● ● Load balancing and failover: The Storwize V7000 Unified protection even more effective can be configured with multiple scan engines to distribute Antivirus configurations on the Storwize V7000 Unified can be and balance the scan workload. If one scan engine becomes defined and modified via the system’s easy-to-use graphical unresponsive, the system’s antivirus connector automatically interface or through its command line interface. Administrators directs the workload to the engines that remain operational. can modify configurations dynamically, on the fly if needed, One scan engine can be configured to support multiple without the need to shut down or restart antivirus scanning Storwize V7000 Unified devices—or for robust failover, services. Key configuration capabilities include: multiple scan engines can be configured to scan a single multi-terabyte storage device. A minimum of two scan ●● ● File processing strategy: The Storwize V7000 Unified can engines are recommended for high availability. be configured so that infected, non-repairable files can be quarantined and then manually or automatically deleted, notifying the user with the appropriate error message. File on-access scanning and infection repair 1 . File accessed 2 . Files transferred on Storwize V7000 Unified to scan engine 3 . File scanned and infection repaired User IBM Storwize Symantec or McAfee V7000 Unified scan engine 6. User 5. Infected file 4 . Repaired file allowed replaced with returned to Storwize access to file repaired file V7000 Unified When a user attempts to access a malware-infected file, the Storwize V7000 Unified solution configured for on-access scanning automatically invokes processes for quarantine, repair and replacement before access is granted. 3
  • 4. IBM Systems and Technology Solution Brief Anti-malware solutions designed for comprehensive set of built-in technologies to promote mid-size and enterprise operations business continuity and continuous access to NAS data. Symantec and McAfee solutions for protecting NAS provide These enterprise-level data protection capabilities include: real-time threat protection to mission-critical information stored and accessed by Storwize V7000 Unified users. Their ●● ● Asynchronous replication for site-to-site protection and ability to detect virus-infected files and take action—repair, disaster recovery isolate or delete as required—is built on advanced features ●● ● File system and fileset level snapshots (up to 256 per file designed for the needs of enterprise-level storage users and system) includes: ●● ● File level cloning for providing a full copy of a file at better granularity ●● ● Advanced antivirus technology: Continuously blocks a wide ●● ● IBM Tivoli® Storage Manager integration for extremely fast range of viruses and malicious code threats, including those and efficient backup and restore processes, and for policy- hidden in compressed files driven migration of files to an external disk or tape device ●● ● Detection of unwanted programs: Finds hidden spyware ●● ● NDMP support to provide both full and incremental backup programs that open security holes of files utilizing IBM and third-party storage management ●● ● Centralized management: Reduces overall cost and software provides ease of management ●● ● RAID support and redundant components for high ●● ● Continuous protection: Automatically scans data when availability CIFS files are accessed or written to the Storwize V7000 Unified, unlike traditional approaches that scan only at Data protection capabilities leverage the IBM Active Cloud predetermined intervals Engine™, which is integrated into the Storwize V7000 Unified ●● ● Cost effectiveness: Supports connection to more than one and can provide a high-speed scan of the source file system to Storwize V7000 Unified device determine files and directories that have been created, modified ●● ● Rapid notification: Sends notification whenever a virus is or deleted. By quickly identifying candidates for backup or detected, enabling recipients to react instantly to a virus disaster recovery, Active Cloud Engine can help improve data outbreak protection strategies. Extending data protection with leading Why IBM? IBM is committed to continuous improvement and seamless ap- technologies plication integration to optimize business results and minimize Beyond malware, organizations with rapidly growing volumes time-to-value. Storwize V7000 Unified deployed with Symantec of unstructured data face a number of challenges to keeping AntiVirus for NAS or McAfee VirusScan Enterprise for Storage that data protected and available. So in addition to antivirus provides enterprise-level data protection to meet today’s rapidly software support, the Storwize V7000 Unified offers a 4
  • 5. IBM Systems and Technology Solution Brief high-availability features also ensure system operation without interruption for business environments that need data quickly and cannot tolerate data loss. Features and capabilities built into Storwize V7000 Unified such as the consolidation of SAN and NAS storage in one system, a unified management GUI for both storage approaches, and nondisruptive data migration to ensure ongo- ing data protection, as the storage infrastructure grows, can help organizations manage infrastructure expansion while reducing IT complexity. As a market leader in the storage industry, IBM can help you handle storage challenges by providing innovative technology, open standards, excellent performance, and a broad portfolio of proven storage software, hardware and solutions offerings—all backed by IBM’s world-class maintenance and support. For more information To learn more about IBM Storwize V7000 Unified, please contact your IBM sales representative or IBM Business Partner, or visit: ibm.com/systems/storage/disk/storwize_v7000 Designed for data protection and storage efficiency, the IBM Storwize V7000 Unified consolidates block and file workloads into a single storage system for simplicity of management and reduced cost. For a list of high-quality solutions with our partner Independent Software Vendors (ISVs), including access growing storage needs. Its single-management interface sup- to solution briefs and white papers, visit: ports ease of use and management as its high-availability and ibm.com/systems/storage/solutions/isv fault-tolerance features support continued operations even in the face of a malware attack. Additionally, IBM Global Financing can help you acquire the IT solutions that your business needs in the most cost-effective Options for real-time, on-access scanning or off-peak bulk and strategic way possible. We’ll partner with credit-qualified scanning help ensure continued safe operations, while the clients to customize an IT financing solution to suit your busi- ability of Storwize V7000 Unified to scale nondisruptively as ness goals, enable effective cash management, and improve your needed, eliminates impact on performance or data access during total cost of ownership. IBM Global Financing is your smartest either capacity expansion or file scanning and repair. Built-in, choice to fund critical IT investments and propel your business forward. For more information, visit: ibm.com/financing 5
  • 6. Please Recycle TSS03098-USEN-00