0102030405
IBM FlashSystem 5045
product description
IBM FlashSystem 5045: Safeguarding data with enhanced cyber resilience and recovery
The IBM FlashSystem 5045 data resilience and cyber security capabilities include:
- NEW Safeguarded Copy – Protects your data from cyberattacks with immutable and isolated copies that are hidden, non-addressable, and cannot be altered, encrypted, or deleted. In the event of an attack, these copies can be quickly restored to support recovery.
- Multi-factor authentication – Adds multiple layers of authentication before authorization is given to any IBM system.
- Two-Person Integrity – Gives administrators the ability to determine what features require two independent users to execute critical functions such as deletion, encryption, or copying of data.
- Role-based access control – An extra layer of protection that allows a subset of authorized users access to specific data on your FlashSystem storage arrays.
- Additionally, the FlashSystem 5045 includes IBM’s recently added in-line threat detection capabilities to Storage Virtualize, to identify data changes that might indicate a potential cyber-attack.
Technical specifications
| Overall dimensions | 2U rack-mounted |
| Controller configuration | Dual controllers, active-active mode (inferred based on product line positioning) |
| Maximum IOPS | 12 million IOPS |
| Maximum bandwidth | 12 GB/s |
| Delay | 70 microseconds |
| Maximum expanded original capacity | After connecting the expansion cabinet, it can reach up to 7.74 PB (using 504 13.6TB drives) |
| Host interface | Supports 10/25Gb iSCSI, 16Gb Fibre Channel, and 12Gb SAS |
| Protocol support | Block storage (based on interface inference) |
| Core data protection | Safeguarded Copy (SGC) |
| Security and management functions | including multi-factor authentication (MFA), Role-based access control (RBAC), and two-person integrity approval |
| Standard software functions | The license includes snapshots, copying (FlashCopy/ remote mirroring), Easy Tier, static data encryption, etc |
| Threat detection integration | It can be integrated with IBM Storage Sentinel/Cyber Vault for AI-driven anomaly scanning |
| Service support | includes IBM Storage Expert Care after-sales service support |







