SlideShare a Scribd company logo
1 of 76
Download to read offline
IBM InfoSphere Guardium
Enterprise-wide Database Protection and Compliance




                             Information Management


                                            © 2010 IBM Corporation
Database Servers Are The Primary Source of Breached Data


                 Source of Breached Records




                                                                                          “Although much angst androle in
                                                                                            SQL injection played a security
                                                                                             funding is given to …. mobile
                                                                                            79% of records compromised
                                                                                           devices and during
                                                                                                         end-user systems,
                                                                                              these assetsbreaches not
                                                                                                     2009 are simply
                                                                                           a major point of compromise.”



 2010 Data Breach Report from Verizon Business RISK Team
  http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf


              … up from 75% in 2009 Report


                                                                                                                 © 2010 IBM Corporation
Information Management


Perimeter defenses no longer sufficient


                                                                Insiders
                                                                (DBAs, developers,
                                                                outsourcers, etc.)

 Outsourcing
                                                                               Stolen Credentials
 Web-Facing Apps                                                               (Zeus, etc.)



             Employee Self-Service,
              Partners & Suppliers




               A fortress mentality will not work in cyber. We cannot retreat
               behind a Maginot Line of firewalls.
                                                      -- William J. Lynn III, U.S. Deputy Defense Secretary
                                                                                          © 2010 IBM Corporation
Information Management


 Typical home-grown solutions are costly and ineffective
    Native
    Database                                                                           Manual
    Logging                                                                            remediation
Native                                                                                 dispatch
Database                                                                               and tracking
Logging                    Pearl/Unix Scripts/C++
                           Scrape and parse the data
                           Move to central repository


    Native
    Database                                      Create                                  Manual
    Logging                                       reports                                 review


 Native
 Database
 Logging                  Significant labor cost to review data and maintain process
                          High performance impact on DBMS from native logging
                          Not real time
                          Does not meet auditor requirements for Separation of Duties
                          Audit trail is not secure
                          Inconsistent policies enterprise-wide
                                                                                   © 2010 IBM Corporation
Information Management


InfoSphere Guardium continues to demonstrate
its leadership …




                                                                                                                                                  2011




         Source: The Forrester Wave™: Database Auditing And Real-Time Protection, Q2 2011, May 6, 2011. The Forrester Wave is copyrighted by Forrester Research, Inc. Forrester
         and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed
         spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based
                                                on best available resources. Opinions reflect judgment at the time and are subject to change.                   © 2010 IBM Corporation
IBM Security Solutions


What We Offer?




            Database User Activity Monitoring
            - Auditing and reporting
            - Enforcing database user access
            - Prevention (blocking)

            Data Privacy
            - Masking non-production data
            - Encryption for production data
            - Redaction for documents

            Vulnerability Assessment



                                                © 2011 IBM Corporation
6
Information Management


 Real time database monitoring and protection with InfoSphere
 Guardium




Host-based
Probes (S-TAPs)                        Collector



   No DBMS or application changes                 Cross-DBMS solution
   Does not rely on DBMS-resident logs that can   Granular, real-time policies & auditing
   easily be erased by attackers, rogue insiders   –Who, what, when, how
   100% visibility including local DBA access     Automated compliance reporting, sign-
   Minimal performance impact                     offs and escalations (financial
                                                   regulations, PCI DSS, data privacy
                                                   regulations, etc.)
                                                                              © 2010 IBM Corporation
Information Management




                         © 2010 IBM Corporation
IBM InfoSphere Guardium
Architecture




                      Information Management


                                     © 2010 IBM Corporation
Information Management




                         © 2010 IBM Corporation
IBM Security Solutions


Scalable Multi-Tier Architecture
                                               Oracle on
                                               Linux for
                                               System z




                                   Integration with LDAP,
                                   IAM, SIEM, IBM TSM,
                                      BMC Remedy, …




                                       © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM InfoSphere Guardium
Installation




                      Information Management


                                     © 2010 IBM Corporation
Information Management




                         © 2010 IBM Corporation
Information Management




                         © 2010 IBM Corporation
Information Management




                         © 2010 IBM Corporation
IBM InfoSphere Guardium
Data Base Auto Discovery (DBAD)




                            Information Management


                                           © 2010 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM InfoSphere Guardium
Security Policy & Reporting




                              Information Management


                                             © 2010 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM InfoSphere Guardium
Classifier




                      Information Management


                                     © 2010 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM InfoSphere Guardium
Real Time & Correlation Alerts




                                 Information Management


                                                © 2010 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
IBM InfoSphere Guardium
S-GATE




                      Information Management


                                     © 2010 IBM Corporation
© 2010 IBM Corporation
© 2010 IBM Corporation
© 2010 IBM Corporation
© 2010 IBM Corporation
© 2010 IBM Corporation
IBM InfoSphere Guardium
Quarantine & Redact




                      Information Management


                                     © 2010 IBM Corporation
© 2010 IBM Corporation
© 2010 IBM Corporation
© 2010 IBM Corporation
© 2010 IBM Corporation
© 2010 IBM Corporation
IBM InfoSphere Guardium
Configuration Audit System (CAS)




                             Information Management


                                            © 2010 IBM Corporation
© 2010 IBM Corporation
IBM Security Solutions




                         © 2011 IBM Corporation
© 2010 IBM Corporation
© 2010 IBM Corporation
© 2010 IBM Corporation
IBM InfoSphere Guardium
Vulnerability Assesment




                          Information Management


                                         © 2010 IBM Corporation
© 2010 IBM Corporation
© 2010 IBM Corporation
IBM InfoSphere Guardium
Entitlement Reports




                      Information Management


                                     © 2010 IBM Corporation
© 2010 IBM Corporation
© 2010 IBM Corporation
IBM InfoSphere Guardium
Application User Identification




                                  Information Management


                                                 © 2010 IBM Corporation
© 2010 IBM Corporation
© 2010 IBM Corporation
© 2010 IBM Corporation
© 2010 IBM Corporation
© 2010 IBM Corporation
© 2010 IBM Corporation
IBM InfoSphere Guardium
Paldies par uzmanību!




                        Information Management


                                       © 2010 IBM Corporation

More Related Content

What's hot

F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introductionJimmy Saigon
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk OverviewSplunk
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)danb02
 
Security Automation and Orchestration
Security Automation and OrchestrationSecurity Automation and Orchestration
Security Automation and OrchestrationGreg Foss
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)hardik soni
 
IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - PowerpointThierry Matusiak
 
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudTrend Micro (EMEA) Limited
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMIftikhar Ali Iqbal
 
Introduction Network Monitoring and Management Solution
Introduction Network Monitoring and Management SolutionIntroduction Network Monitoring and Management Solution
Introduction Network Monitoring and Management SolutionTien Nguyen Duc
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIBM Security
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation finalRizwan S
 

What's hot (20)

F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 
SIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security ArsenalSIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security Arsenal
 
Security Automation and Orchestration
Security Automation and OrchestrationSecurity Automation and Orchestration
Security Automation and Orchestration
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
 
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
 
Introduction Network Monitoring and Management Solution
Introduction Network Monitoring and Management SolutionIntroduction Network Monitoring and Management Solution
Introduction Network Monitoring and Management Solution
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
 

Viewers also liked

IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)Peter Tutty
 
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Avirot Mitamura
 
Automating secure server baselines with Chef
Automating secure server baselines with ChefAutomating secure server baselines with Chef
Automating secure server baselines with ChefChef Software, Inc.
 
Guardium
GuardiumGuardium
Guardiumgigamon
 
Ibm portfolio piece
Ibm portfolio pieceIbm portfolio piece
Ibm portfolio pieceColson Rice
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!IBM Security
 
Hrvatska u doba carice marije terezije
Hrvatska u doba carice marije terezijeHrvatska u doba carice marije terezije
Hrvatska u doba carice marije terezijeStrukovnaskola
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerThierry Matusiak
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAJorge Sebastiao
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions Thierry Matusiak
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolioPatrick Bouillaud
 
Top 5 server performance problems and how to resolve them using OpManager
Top 5 server performance problems and how to resolve them using OpManagerTop 5 server performance problems and how to resolve them using OpManager
Top 5 server performance problems and how to resolve them using OpManagerManageEngine
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 
Top Issues For Microsoft Support For Windows Server
Top Issues For Microsoft Support For Windows ServerTop Issues For Microsoft Support For Windows Server
Top Issues For Microsoft Support For Windows ServerBlauge
 
Steve Jobs Inspirational Quotes
Steve Jobs Inspirational QuotesSteve Jobs Inspirational Quotes
Steve Jobs Inspirational QuotesInsideView
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksSlideShare
 

Viewers also liked (19)

IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
 
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10
 
IT Operations Management with OpManager
IT Operations Management with OpManagerIT Operations Management with OpManager
IT Operations Management with OpManager
 
Automating secure server baselines with Chef
Automating secure server baselines with ChefAutomating secure server baselines with Chef
Automating secure server baselines with Chef
 
Guardium
GuardiumGuardium
Guardium
 
Ibm portfolio piece
Ibm portfolio pieceIbm portfolio piece
Ibm portfolio piece
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!
 
Hrvatska u doba carice marije terezije
Hrvatska u doba carice marije terezijeHrvatska u doba carice marije terezije
Hrvatska u doba carice marije terezije
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSA
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
 
Top 5 server performance problems and how to resolve them using OpManager
Top 5 server performance problems and how to resolve them using OpManagerTop 5 server performance problems and how to resolve them using OpManager
Top 5 server performance problems and how to resolve them using OpManager
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Top Issues For Microsoft Support For Windows Server
Top Issues For Microsoft Support For Windows ServerTop Issues For Microsoft Support For Windows Server
Top Issues For Microsoft Support For Windows Server
 
Steve Jobs Inspirational Quotes
Steve Jobs Inspirational QuotesSteve Jobs Inspirational Quotes
Steve Jobs Inspirational Quotes
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 

Similar to IBM Infosphere Guardium - Database Security

How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...Agora Group
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Digicomp Academy AG
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceUNIT4 IT Solutions
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Anindya Ghosh,
 
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsMonitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsIBM India Smarter Computing
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youGlobal Business Events
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceAndris Soroka
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
Top 10 Database Threats
Top 10 Database ThreatsTop 10 Database Threats
Top 10 Database ThreatsImperva
 
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosNextel S.A.
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS UK
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf MattssonUlf Mattsson
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009apompliano
 

Similar to IBM Infosphere Guardium - Database Security (20)

How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsMonitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring Options
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Top 10 Database Threats
Top 10 Database ThreatsTop 10 Database Threats
Top 10 Database Threats
 
S series presentation
S series presentationS series presentation
S series presentation
 
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizados
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 

More from ebuc

What's Next for Your Industry and City?
What's Next for Your Industry and City? What's Next for Your Industry and City?
What's Next for Your Industry and City? ebuc
 
Top global mega trends
Top global mega trends Top global mega trends
Top global mega trends ebuc
 
Mobile biometric device trends joe hoerl
Mobile biometric device trends joe hoerlMobile biometric device trends joe hoerl
Mobile biometric device trends joe hoerlebuc
 
Launching great enterprise mobile apps that beat the competition
Launching great enterprise mobile apps that beat the competitionLaunching great enterprise mobile apps that beat the competition
Launching great enterprise mobile apps that beat the competitionebuc
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or notebuc
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or notebuc
 
IBM vision for aviation
IBM vision for aviationIBM vision for aviation
IBM vision for aviationebuc
 
CSDD case study
CSDD case studyCSDD case study
CSDD case studyebuc
 
Can you afford (not) moving to the cloud
Can you afford (not) moving to the cloudCan you afford (not) moving to the cloud
Can you afford (not) moving to the cloudebuc
 
Big data – ready for business
Big data – ready for businessBig data – ready for business
Big data – ready for businessebuc
 
Meistarklase efektīvam ikdienas darbam
Meistarklase efektīvam ikdienas darbamMeistarklase efektīvam ikdienas darbam
Meistarklase efektīvam ikdienas darbamebuc
 
Pieredzes stāsti
Pieredzes stāstiPieredzes stāsti
Pieredzes stāstiebuc
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiebuc
 
Smart business - is cloud part of the problem or part of the solution
Smart business - is cloud part of the problem or part of the solutionSmart business - is cloud part of the problem or part of the solution
Smart business - is cloud part of the problem or part of the solutionebuc
 
CITY UP iniciatīva
CITY UP iniciatīvaCITY UP iniciatīva
CITY UP iniciatīvaebuc
 
Programmatūras resursu pārvaldība un optimizācija
Programmatūras resursu pārvaldība un optimizācijaProgrammatūras resursu pārvaldība un optimizācija
Programmatūras resursu pārvaldība un optimizācijaebuc
 
Start up iniciatīva 2014
Start up iniciatīva 2014Start up iniciatīva 2014
Start up iniciatīva 2014ebuc
 
Microsoft Office 365
Microsoft Office 365Microsoft Office 365
Microsoft Office 365ebuc
 
Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.
Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.
Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.ebuc
 
Programmatūras licencēšana. Iespējas un izaicinājumi. SIA DPA
Programmatūras licencēšana. Iespējas un izaicinājumi. SIA DPAProgrammatūras licencēšana. Iespējas un izaicinājumi. SIA DPA
Programmatūras licencēšana. Iespējas un izaicinājumi. SIA DPAebuc
 

More from ebuc (20)

What's Next for Your Industry and City?
What's Next for Your Industry and City? What's Next for Your Industry and City?
What's Next for Your Industry and City?
 
Top global mega trends
Top global mega trends Top global mega trends
Top global mega trends
 
Mobile biometric device trends joe hoerl
Mobile biometric device trends joe hoerlMobile biometric device trends joe hoerl
Mobile biometric device trends joe hoerl
 
Launching great enterprise mobile apps that beat the competition
Launching great enterprise mobile apps that beat the competitionLaunching great enterprise mobile apps that beat the competition
Launching great enterprise mobile apps that beat the competition
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or not
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or not
 
IBM vision for aviation
IBM vision for aviationIBM vision for aviation
IBM vision for aviation
 
CSDD case study
CSDD case studyCSDD case study
CSDD case study
 
Can you afford (not) moving to the cloud
Can you afford (not) moving to the cloudCan you afford (not) moving to the cloud
Can you afford (not) moving to the cloud
 
Big data – ready for business
Big data – ready for businessBig data – ready for business
Big data – ready for business
 
Meistarklase efektīvam ikdienas darbam
Meistarklase efektīvam ikdienas darbamMeistarklase efektīvam ikdienas darbam
Meistarklase efektīvam ikdienas darbam
 
Pieredzes stāsti
Pieredzes stāstiPieredzes stāsti
Pieredzes stāsti
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
 
Smart business - is cloud part of the problem or part of the solution
Smart business - is cloud part of the problem or part of the solutionSmart business - is cloud part of the problem or part of the solution
Smart business - is cloud part of the problem or part of the solution
 
CITY UP iniciatīva
CITY UP iniciatīvaCITY UP iniciatīva
CITY UP iniciatīva
 
Programmatūras resursu pārvaldība un optimizācija
Programmatūras resursu pārvaldība un optimizācijaProgrammatūras resursu pārvaldība un optimizācija
Programmatūras resursu pārvaldība un optimizācija
 
Start up iniciatīva 2014
Start up iniciatīva 2014Start up iniciatīva 2014
Start up iniciatīva 2014
 
Microsoft Office 365
Microsoft Office 365Microsoft Office 365
Microsoft Office 365
 
Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.
Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.
Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.
 
Programmatūras licencēšana. Iespējas un izaicinājumi. SIA DPA
Programmatūras licencēšana. Iespējas un izaicinājumi. SIA DPAProgrammatūras licencēšana. Iespējas un izaicinājumi. SIA DPA
Programmatūras licencēšana. Iespējas un izaicinājumi. SIA DPA
 

Recently uploaded

Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 

Recently uploaded (20)

Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 

IBM Infosphere Guardium - Database Security