Close Menu
Alpha Leaders
  • Home
  • News
  • Leadership
  • Entrepreneurs
  • Business
  • Living
  • Innovation
  • More
    • Money & Finance
    • Web Stories
    • Global
    • Press Release
What's On
Trump sues BBC for  billion over January 6 video editing

Trump sues BBC for $10 billion over January 6 video editing

16 December 2025
A NIMBY revolt is turning voters in Republican strongholds against the AI data-center boom

A NIMBY revolt is turning voters in Republican strongholds against the AI data-center boom

16 December 2025
The job market is so bad, people in their 40s are resorting to going back to school instead of looking for work

The job market is so bad, people in their 40s are resorting to going back to school instead of looking for work

16 December 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Alpha Leaders
newsletter
  • Home
  • News
  • Leadership
  • Entrepreneurs
  • Business
  • Living
  • Innovation
  • More
    • Money & Finance
    • Web Stories
    • Global
    • Press Release
Alpha Leaders
Home » IBM Introduces Data Path Ransomware Detection In New FlashSystem
Innovation

IBM Introduces Data Path Ransomware Detection In New FlashSystem

Press RoomBy Press Room28 February 20246 Mins Read
Facebook Twitter Copy Link Pinterest LinkedIn Tumblr Email WhatsApp
IBM Introduces Data Path Ransomware Detection In New FlashSystem

IBM has introduced AI-enhanced capabilities within its new storage solutions to bolster data resilience against ransomware and other cyber threats. Given the persistent and escalating risks posed by cyberattacks, IBM’s enhancements come at a critical time.

The new cyber-protection capabilities center around IBM’s fourth generation FlashCore Module technology that, working in concert with a freshly updated IBM Storage Defender release, aims to improve threat detection and response by detecting anomalies directly in the data path.

To understand how all this works, you want to talk to the CTO for IBM Flash Storage, and IBM Fellow, Andy Walls. It’s his job to lay out the technical vision for IBM’s storage products, including the novel use of its FlashCore Module technology to solve challenging problems as close to the data as possible.

Thankfully, once a year, like Punxsutawney Phil on Groundhog Day, IBM releases Andy from what I like to imagine is a basement lab crammed with old RK07 disk packs scattered amid petri dishes of DNA storage prototypes so that he can tell the world about IBM’s latest advancements in storage technology.

This time around, Andy picked up right where he left off at the end of our last conversation, nearly a year ago, where he first described how IBM planned to use the computational storage capabilities of its FlashCore module to detect ransomware by looking at the entropy of data as it’s written to flash memory.

IBM’s FlashCore Module

Andy describes FlashCore as a computational storage device. This means that a FlashCore Module combines NAND flash for persistent storage, RAM for caching, and a compelling amount of on-device compute to deliver greater functionality than a traditional SSD could.

The FCM takes some of the array’s computationally heavy work, such as compression, from the storage controllers and performs that work directly on the drive. This leads to a variety of efficiencies. It’s also where the IBM FlashSystem now looks for data anomalies that might indicate the presence of ransomware.

Detecting Ransomware In the Data Path

IBM’s new ransomware detection capabilities enable real-time data monitoring at the I/O level, using machine learning models to detect anomalies indicative of ransomware in under a minute. Here’s how it works (for a more in-depth description, read our Research Note on the new capabilities):

IBM FlashSystem products scan all incoming data with block-level granularity as it’s written. This process involves inline data corruption detection software and cloud-based AI to identify anomalies that might signal the onset of a cyber-attack, including ransomware. This early detection mechanism allows for immediate response actions to mitigate the attack.

The fourth generation FCM technology enables AI capabilities within the IBM Storage FlashSystem family. Using machine learning models, it continuously monitors statistics gathered from every I/O operation.

IBM trained these models to detect anomalies that resemble ransomware behavior. IBM’s Zurich-based research team is helping maintain a database of ransomware I/O signatures that will keep the system current with the evolving threat landscape.

The FCM captures and summarizes detailed statistics about every I/O in real-time. Leveraging machine learning models, the system can distinguish between normal behavior and patterns indicative of ransomware or malware, allowing immediate corrective actions to protect the data.

The IBM FlashSystem analyzes parameters such as the data’s compressibility and randomness (entropy). This information is passed to IBM Storage Insights software, which can alert operators when a workload anomaly is detected. For instance, if ransomware begins to encrypt an application’s data, the system can detect this unusual behavior based on the change in data characteristics.

IBM Storage Defender Integration

Central to IBM’s overall data protection capabilities is its upgraded IBM Storage Defender software. The new release uses AI-powered sensors to integrate FlashSystem detection with broader threat detection capabilities across various IT environments, including VMs, databases, applications, and containers.

The new version also introduces workload and storage inventory management features to aid organizations in incorporating their assets into a business continuity plan for post-attack recovery. Integration with other IBM Storage and Security solutions and third-party data platforms provides end-to-end data resilience.

Key innovations include the ability for storage administrators to create protection groups for automatic backup and to restore or recover immutable data copies free from threat signatures to multiple locations. IBM has also integrated settings for creating Safeguarded Copy snapshots, which are cyber-resilient and isolated from production data, enabling quicker recovery after data loss events.

Analyst’s Take

IBM’s sophisticated approach enables its storage solutions to provide early warnings of cyber threats, allowing enterprises to recover faster and maintain the confidentiality and security of their data against ransomware and other cyber-attacks.

Data protection and cyber-resiliency features are quickly becoming standard offerings within enterprise storage solutions. Immutable snapshots, for example, are now part of solutions from nearly every top-tier storage vendor. Scanning snapshots using entropy calculations like those used by IBM for anomalies is also becoming popular.

The challenge with the approaches taken by most storage solutions is that detection often happens after the fact. Once a snapshot is found to be corrupt, it may be too late. You have to work backward in time to find good data to restore.

IBM’s approach closes that gap, alerting the user nearly instantly when an anomaly is detected. This happens long before the corrupted data is written to a snapshot. That’s precisely the kind of protection you want in your enterprise.

IBM isn’t the only storage provider building this level of real-time anomaly detection directly into its storage arrays. NetApp’s Autonomous Ransomware Detection feature in its ONTAP products also looks at entropy to detect anomalies and raise alerts.

Unlike IBM, NetApp performs the computation on its storage controllers, not within the underlying drives. NetApp’s approach also doesn’t detect ransomware using signatures; instead, it relies on entropy, file extensions, and the amount of file write activity. IBM is currently alone in delivering this level of storage-based threat detection.

While most of the storage industry spends R&D budget coaxing enterprise-class storage out of commodity server-class hardware, IBM is one of only a small handful of technology providers continuing to innovate storage with a full-stack view of the platform.

IBM’s storage solutions remain among the most technologically advanced on the market, making them ideal to protect critical enterprise data. The new ransomware detection features only solidify that position.

Disclosure: Steve McDowell is an industry analyst, and NAND Research is an industry analyst firm that engages in, or has engaged in, research, analysis and advisory services with many technology companies, including those mentioned in this article. Mr. McDowell does not hold any equity positions with any company mentioned in this article.

computational storage cybersecurity data protection FCM FlashCore Module IBM IBM Storage Ransomware
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link

Related Articles

China’s Open-Source AI Leap Is Quietly Rewriting The Global Playbook

China’s Open-Source AI Leap Is Quietly Rewriting The Global Playbook

16 December 2025
New York Approves Casino Sites—With Trump And Billionaire Steve Cohen Standing To Gain

New York Approves Casino Sites—With Trump And Billionaire Steve Cohen Standing To Gain

15 December 2025
Chaos At The FDA Benefits America’s Rivals—At The Expense Of America’s Patients

Chaos At The FDA Benefits America’s Rivals—At The Expense Of America’s Patients

15 December 2025
‘Completely Deactivate Wi-Fi’—Cyber Agency Warns iPhone And Android Users

‘Completely Deactivate Wi-Fi’—Cyber Agency Warns iPhone And Android Users

14 December 2025
GravaStar’s Reveals The New V60 Pro HE Is A Magnetic Switch Keyboard For Elite Gaming

GravaStar’s Reveals The New V60 Pro HE Is A Magnetic Switch Keyboard For Elite Gaming

14 December 2025
AI (or AI People) Are Time’s Person Of The Year

AI (or AI People) Are Time’s Person Of The Year

14 December 2025
Don't Miss
Unwrap Christmas Sustainably: How To Handle Gifts You Don’t Want

Unwrap Christmas Sustainably: How To Handle Gifts You Don’t Want

By Press Room27 December 2024

Every year, millions of people unwrap Christmas gifts that they do not love, need, or…

Walmart dominated, while Target spiraled: the winners and losers of retail in 2024

Walmart dominated, while Target spiraled: the winners and losers of retail in 2024

30 December 2024
John Summit went from working 9 a.m. to 9 p.m. in a ,000 job to a multimillionaire DJ—‘I make more in one show than I would in my entire accounting career’

John Summit went from working 9 a.m. to 9 p.m. in a $65,000 job to a multimillionaire DJ—‘I make more in one show than I would in my entire accounting career’

18 October 2025
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Latest Articles
Ford writes down .5 billion as it pivots electric Lighting line of vehicles

Ford writes down $19.5 billion as it pivots electric Lighting line of vehicles

16 December 20250 Views
Female libido pill gets expanded approval for menopause by FDA

Female libido pill gets expanded approval for menopause by FDA

16 December 20253 Views
Gavin Newsom hires former CDC officials to work as public health consultants for state of California

Gavin Newsom hires former CDC officials to work as public health consultants for state of California

16 December 20250 Views
Down Arrow Button Icon

Down Arrow Button Icon

16 December 20251 Views
About Us
About Us

Alpha Leaders is your one-stop website for the latest Entrepreneurs and Leaders news and updates, follow us now to get the news that matters to you.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks
Trump sues BBC for  billion over January 6 video editing

Trump sues BBC for $10 billion over January 6 video editing

16 December 2025
A NIMBY revolt is turning voters in Republican strongholds against the AI data-center boom

A NIMBY revolt is turning voters in Republican strongholds against the AI data-center boom

16 December 2025
The job market is so bad, people in their 40s are resorting to going back to school instead of looking for work

The job market is so bad, people in their 40s are resorting to going back to school instead of looking for work

16 December 2025
Most Popular
China’s Open-Source AI Leap Is Quietly Rewriting The Global Playbook

China’s Open-Source AI Leap Is Quietly Rewriting The Global Playbook

16 December 20250 Views
Ford writes down .5 billion as it pivots electric Lighting line of vehicles

Ford writes down $19.5 billion as it pivots electric Lighting line of vehicles

16 December 20250 Views
Female libido pill gets expanded approval for menopause by FDA

Female libido pill gets expanded approval for menopause by FDA

16 December 20253 Views
© 2025 Alpha Leaders. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.