Where does IBM Storage Virtualize fit in the bigger picture of Data Resiliency?

Inline Data Corruption Detection

The information content, also called the surprisal or self-information, of an event E is a function which increases as the probability p ( E ) of an event decreases. When p ( E ) is close to 1, the surprisal of the event is low, but if p ( E ) {\displaystyle p(E)} is close to 0, the surprisal of the event is high.

Put simply, we are sampling the destage streams from the cache to determine the overall Shannon Entropy nature of that stream – which may be a signal that a ransomware or other data corruption event is taking place.

Now there could be many reasons for the entropy change, and Machine Learning (ML) is needed to understand this and therefore real-time report when we spot something unusual. This is not something we want to dedicate valuable Storage system cores to performing. The information is therefore being streamed to IBM Storage Insights where the ML and end reporting/alerting can be performed. The idea is that over time we build a data lake of signals and use ML to understand these over time, train models that can act in near real time to then alert you the end user, or more likely your SIEM.

This is just step one in the process, and of course is just one of the signals you will be using as your Cyber Resilience maturity increases – as Ian says in the video above, this can then be another input to your SIEM that can provide further evidence to allow your SOAR to take action when needed.

We have lots of ideas in this area, and more will be coming in subsequent software, and hardware updates over the coming months/years.

Leave a comment