Successful cyber-attacks - ransomware attacks in particular - can have a devastating impact to your business. Depending on the individual attack scenario, existing processes to maintain business continuity such as the implementation of GDPS using multiple physical sites may not be able to protect you from these attacks. In this session, we look at options to reduce a potential data loss and the downtime to restore your Db2 for z/OS production environment in the most efficient way to optimize both your Recovery Point Objective (RPO) and Recovery Time Objective (RTO) after a cyber attack.
About cookies on this siteOur websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising.For more information, please review your cookie preferences options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.