• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IBM Thwarts Ransomware in FlashSystem with New Data Safeguard

    July 26, 2021 Alex Woodie

    The steep uptick in ransomware attacks this summer has gained the full attention of business and tech leaders at businesses of all sizes. It also has the attention of IT vendors, including IBM, which last week added a new data protection mechanism to FlashSystem intended to help thwart ransomware attacks.

    Ransomware, which has been simmering on the security backburner for years, has roared to life this summer, thanks to several high-profile attacks that caused severe business disruptions, including Colonial Pipeline, JBS, and Scripps Health, among others. While the attacks on these large companies were headline-grabbing, they bely the full extent of the ransomware problem, particularly among smaller organizations that fly below the radar.

    It feels like ransomware attacks are up, and the data actually backs that up. According to the cybersecurity firm SonicWall, ransomware attacks grew by 62 percent in 2020, which it attributes to the business disruptions caused by COVID-19. There were 304.6 million individual ransomware attacks last year, according to the 2021 SonicWall Cyber Threat Report, and through the first five months of 2021, the group detected 226.3 million ransomware attacks, a 116 percent increase.

    While the IBM i server is protected from most traditional forms of malware, the server has a major vulnerability when it comes to ransomware. Data housed in the Db2 database is considered safe, but any data stored in the IFS is susceptible to being encrypted during a ransomware attack.

    Now IBM is responding to the ransomware threat with an update to its FlashSystem family of all-flash storage arrays. Last week, the company announced that it has added a mechanism that automatically protects data stored on the arrays and makes it less likely that it will be encrypted during a ransomware attack.

    IBM adapted the Safeguarded Copy feature from the DS8000 line for its FlashSystem array. (Image source: IBM DS8000 Safeguarded Copy Redbook)

    The feature is called Safeguarded Copy. It works by creating an immutable snapshot of a customer’s data, which is then stowed in an isolated part of the system. These snapshots “cannot be accessed or altered by unauthorized users,” IBM says. If a ransomware attack occurs, or if there’s a security event or a natural disaster, the customer can recover their system using the copy of the data that has been safeguarded in the FlashSystem array.

    IBM borrowed Safeguarded Copy from the high-end DS8000 arrays, which got the new feature with the release of IBM Copy Services Manager version 6.2.3 earlier this year. A key element of the technology is the mechanism that makes the snapshots immutable. According to IBM, once the data is in a Safeguarded “pool,” changes can be made to it only after it has been recovered, which eliminates the risk of data tampering or deletion.

    Safeguarded Copy can be used in tandem with other data and application protection mechanisms, including FlashCopy and high availability setups. IBM recommends using Safeguarded Copies to take many frequent copies of a production environment, such as on an hourly or even 30-minute schedule, while leveraging FlashCopy for smaller number of less frequent copies, such as weekly backups.

    There are also several ways Safeguarded Copy can be used with Metro Mirror and Global Mirror high availability solutions to facilitate rapid recovery of business data in the event of a ransomware attack. IBM describes various setups in the IBM DS8000 Safeguarded Copy Redbook (the 6.3 MB PDF file can be found here).

    At the end of the day, there is no silver bullet to deal with the ransomware problem, which crosses IT disciplines, including security and DR. Training users not to click on malicious URLs that appear in emails and texts is perhaps the best way to guarantee that ransomware never enters your networks and servers. But humans, of course, are fallible, and even tech-savvy experts can be tricked into clicking on bad links by crafty cybercriminals.

    “Protecting against ransomware and other forms of malware requires a two-pronged approach to resiliency that involves automated protection and rapid recovery,” IBM Storage general manager Denis Kennelly said in a press release. “That’s why we’re standardizing our modern data protection software, Safeguarded Copy, across our portfolio, bringing even more cyber resiliency to IBM FlashSystem. Cyberattacks are on the rise, but data can be protected and restored when you are prepared.”

    RELATED STORIES

    Ransomware Attacks Hit Closer To Home

    Ransomware Epidemic Hits Epic Proportions, And IBM i Shops Take Notice

    Christmas for Ransomware: How COVID-19 Is Fueling Cybercrime

    Assessing The Ransomware Threat On IBM i

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: DB2, FlashCopy, FlashSystem, IBM i

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Time To Design – And Deliver – The Application System/360 Innovating And Thriving with IBM i

    Leave a Reply Cancel reply

TFH Volume: 31 Issue: 48

This Issue Sponsored By

  • Fresche Solutions
  • Entrepid
  • RPG & DB2 Summit
  • ARCAD Software
  • Raz-Lee Security

Table of Contents

  • Awaiting The Power10 Rollout And The New Sales Cycle
  • Giving IBM i The Storage Of Last Resort
  • Guru: Getting Meaningful Audit Information from a Journal
  • Innovating And Thriving with IBM i
  • IBM Thwarts Ransomware in FlashSystem with New Data Safeguard

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Positive News From The Kyndryl Mainframe Modernization Report
  • NAViGATE, inPower 2025 On Tap for September 2025
  • Guru: WCA4i And Granite – Because You’ve Got Bigger Things To Build
  • As I See It: Digital Coup
  • IBM i PTF Guide, Volume 27, Number 37
  • AI Is Coming for ERP. How Will IBM i Respond?
  • The Power And Storage Price Wiggling Continues – Again
  • LaserVault Adds Multi-Path Support To ViTL
  • As I See It: Spacing Out
  • IBM i PTF Guide, Volume 27, Numbers 34, 35, And 36

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle