IBM's AI-powered storage protection technology detects ransomware and other cyber threats in less than a minute



IBM announced the fourth generation of IBM FlashCore module technology (FCM4), available in all-flash storage IBM FlashSystem. FCM scans data and counters cyber threats without affecting performance, but FCM4 is enhanced with AI and can detect threats such as ransomware within a minute.

IBM adds AI-enhanced data resilience capabilities to help combat ransomware and other threats with enhanced storage solutions

https://newsroom.ibm.com/blog-IBM-adds-AI-enhanced-data-resilience-capabilities-to-help-combat-ransomware-and-other-threats-with-enhanced-storage-solutions



IBM's new AI-enabled SSDs identify and eradicate ransomware in under a minute | Tom's Hardware

https://www.tomshardware.com/tech-industry/cyber-security/ibms-new-cloud-ai-enabled-ssds-identify-and-treat-ransomware-in-under-a-minute



In recent years, businesses and organizations have been threatened by ransomware, which has become one of the top five threats to survivability.

IBM announced FCM4 to help users detect these threats quickly and as accurately as possible.

FCM scans all incoming data with block granularity without impacting performance during writes. Detect anomalies that can trigger a cyber attack using inline data corruption detection software and cloud-based AI.

The new FCM4 uses machine learning models to continuously monitor statistics collected from all I/O and is designed to detect anomalies such as ransomware within a minute.

Also announced is a new IBM Storage Defender that works with FCM4, and by integrating FCM, it seems that AI detection and data manipulation recovery can be leveraged on both software and hardware.

Tom's Hardware, an IT news site, notes that while generative AI is the subject of debate over ethics and morality in fields such as art, music, and literature, in the security field even experienced experts are being attacked by ransomware. Since it is difficult to detect in one minute, he commented, ``This type of work may be more suitable for ever-evolving machine learning models.''

in Security, Posted by logc_nt