Menu

IBM Doubles Down on AI-Powered Storage Security

IBM Doubles Down on AI-Powered Storage Security

The News: IBM announces new AI-enhanced versions of its FlashCore Module (FCM) technology available inside new IBM Storage FlashSystem products, and a new version of IBM Storage Defender software, to help organizations better detect and respond to cyberattacks. Additional information is available in IBM’s blog.

IBM Doubles Down on AI-Powered Storage Security

Analyst Take: IBM’s FlashCore Modules are a family of high-performance flash drives that are used in IBM Storage FlashSystem offerings. To-date, the technology has been able to scan incoming data for anomalies that could indicate nefarious activity to the block level of granularity. The new, fourth generation FCM (FCM4) are even more granular, with the ability to monitor every I/O. According to IBM, this can allow anomalies to be detected in less than a minute – in turn allowing the organization to respond to and recover from an attack more quickly. A host of factors including compression and entropy are measured via machine learning and are then sent to IBM Storage Insights to alert administrators.

Perhaps even more notably in my opinion, the anomaly detection occurs in-line without an impact to write performance. This is because the FCM offloads these functions from the storage controller. This frees the processor in the controller to focus on core storage management services.

When an attack is detected, recovery can occur from immutable data copies that reside on the IBM Storage FlashSystem itself due to the IBM Safeguarded Copies feature in IBM Spectrum Virtualize software.

In conjunction with the FCM4 updates, IBM has also enhanced Storage Defender, its cyber resiliency solution that pulls from a number of its offerings including IBM Storage Protect, IBM Storage Protect for Cloud, IBM Storage Virtualize, and IBM Storage Sentinel. The solution integrates with IBM FlashSystem for more comprehensive capabilities spanning not only early detection but also streamlined recovery, as well as primary and protection environments.

To Storage Defender, IBM has enhanced AI-based threat detection capabilities for the protection data copies that are used for cyber-recovery. It also added workload and storage inventory management capabilities, to enhance organizations’ visibility into their data and applications. This is particularly important to mitigating blind spots that attackers may compromise, and when it comes to establishing the business continuity plan and what is critical to recover immediately following a cyber-attack. IBM presents this as a concept of “minimum viable recovery,” and I note that this is critical for IT operations teams when it comes to prioritizing efforts and mitigating downtime of critical business services, following an attack. Last but certainly not least, IBM has added the ability to orchestrate and automate the recovery of VMware applications, to reduce recovery times and better guarantee recovery.

I view IBM’s announcement as a response to the fact that attack vectors are continuing to evolve, especially as attackers find new fuel and innovation in the form of generative AI. Against this backdrop, early detection is critical – but so is the ability to then take swift action in the form of response and recovery. The ability to be more proactive is a growing requirement that we are seeing, and that IBM is addressing by bringing capabilities ranging from production storage to protection software and augmenting them with new capabilities including AI. It is notable that, in addition to addressing both production and protection environments, IBM’s approach also addresses complex hybrid multi-cloud environments that have become the norm for most enterprises.

As a final concluding point, I note the promise that AI offers for enhancing cyber-resiliency, but we also note that its effectiveness relies heavily on the quality of data that is used to train the models. As noted, IBM is tying visibility and detection robustly across the storage environment. This viewpoint, alongside responsible access to subsequent insights, are important for customers to consider as they evaluate such solutions.

Disclosure: The Futurum Group is a research and advisory firm that engages or has engaged in research, analysis, and advisory services with many technology companies, including those mentioned in this article. The author does not hold any equity positions with any company mentioned in this article.

Analysis and opinions expressed herein are specific to the analyst individually and data and other information that might have been provided for validation, not those of The Futurum Group as a whole.

Other Insights from The Futurum Group:

IBM Augments its Cyber Resiliency Stack with IBM Storage Defender, in Collaboration with Cohesity

IBM Announces New Quantum Processor and IBM Quantum System Two

IBM Security’s Program for Service Providers & Innovative Solutions – The Six Five on the Road at AWS re:Invent 2023

Author Information

Krista Case

Krista Case brings over 15 years of experience providing research and advisory services and creating thought leadership content. Her vantage point spans technology and vendor portfolio developments; customer buying behavior trends; and vendor ecosystems, go-to-market positioning, and business models. Her work has appeared in major publications including eWeek, TechTarget and The Register.

Related Insights
Snowflake Acquires Observe Operationalizing the Data Cloud
January 26, 2026

Snowflake Acquires Observe: Operationalizing the Data Cloud

Brad Shimmin, VP & Practice Lead at Futurum, examines Snowflake’s intent to acquire Observe and integrate AI-powered observability into the AI Data Cloud....
As CrowdStrike Buys Seraphic, Is Browser Security Destined to Be Just a Feature
January 15, 2026

As CrowdStrike Buys Seraphic, Is Browser Security Destined to Be Just a Feature?

Fernando Montenegro, VP at Futurum, analyzes CrowdStrike's acquisition of Seraphic Security, a strategic move to secure the browser "blind spot" and extend Falcon's visibility to unmanaged devices....
Can CrowdStrike Tackle Standing Privileges with $740M SGNL Acquisition
January 9, 2026

Can CrowdStrike Tackle Standing Privileges with $740M SGNL Acquisition?

Fernando Montenegro, VP at Futurum, analyzes CrowdStrike’s acquisition of SGNL to bring real-time, zero-standing-privilege access control to the Falcon platform....
CIO Take Smartsheet's Intelligent Work Management as a Strategic Execution Platform
December 22, 2025

CIO Take: Smartsheet’s Intelligent Work Management as a Strategic Execution Platform

Dion Hinchcliffe analyzes Smartsheet’s Intelligent Work Management announcements from a CIO lens—what’s real about agentic AI for execution at scale, what’s risky, and what to validate before standardizing....
NVIDIA Bolsters AI/HPC Ecosystem with Nemotron 3 Models and SchedMD Buy
December 16, 2025

NVIDIA Bolsters AI/HPC Ecosystem with Nemotron 3 Models and SchedMD Buy

Nick Patience, AI Platforms Practice Lead at Futurum, shares his insights on NVIDIA's release of its Nemotron 3 family of open-source models and the acquisition of SchedMD, the developer of...
Oracle Q2 FY 2026 Cloud Grows; Capex Rises for AI Buildout
December 12, 2025

Oracle Q2 FY 2026: Cloud Grows; Capex Rises for AI Buildout

Futurum Research analyzes Oracle’s Q2 FY 2026 earnings, highlighting cloud infrastructure momentum, record RPO, rising AI-focused capex, and multicloud database traction driving workload growth across OCI and partner clouds....

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.