SlideShare a Scribd company logo
Security
Data Sheet
IBM Security Guardium
Data Activity Monitor
Continuously monitor data access and protect sensitive
data across the enterprise
Highlights
●● ● ●
Uncover risks to sensitive data through
data discovery, classification, and privi-
leged access discovery to automatically
take action or report for compliance.
●● ● ●
Reduces data breach risk and extends
security intelligence with in-depth data
protection.
●● ● ●
Provides a streamlined and adaptable
solution for real-time monitoring access to
high-value databases, data warehouses,
files, cloud, and big data environments.
●● ● ●
Minimizes total cost of ownership with
robust scalability, simplification, automa-
tion, analytics, and transparency for a
range of deployments – whether they
are small, large, or enterprise-wide.
IBM® Security® Guardium® Data Activity Monitor provides the most
adoptable, adaptable, and scalable solution for assuring the security and
integrity of data in heterogeneous environments including databases,
data warehouses, files, file shares, cloud, and big data platforms such
as Hadoop and NoSQL databases.
The solution continuously monitors all data access operations in real
time to detect unauthorized actions, based on detailed contextual
information—the “who, what, where, when, and how” of each data
access. Guardium Data Activity Monitor reacts immediately to prevent
unauthorized or suspicious activities by privileged insiders and potential
hackers, and automates data security governance controls in heteroge-
neous enterprises.
Guardium Data Activity Monitor improves security and supports compli-
ance requirements through a set of core capabilities that also minimize
its total cost of ownership. These capabilities are available in four simple
adoptable offering levels: Express Data Activity Monitor, Standard Data
Activity Monitor, Advanced Data Activity Monitor, and Central Management
and Aggregation Pack.
2
Data Sheet
Security
Risk reduction
For any given chosen organization action or activity, there is the
potential risk of sensitive data exposure or loss. The probability
or threat of damage, liability, data loss or any other negative
occurrence that is caused by external or internal vulnerability
can be avoided through quick response, or better yet, preemp-
tive action. Guardium Data Activity Monitor reduces data
breach risk by providing real-time data security and intelligence
with features such as:
●● ●
Automatically Identify risky data or configurations—Uses
data discovery, classification, entitlement reports, and audit
records to identify data at risk, such as dormant sensitive data
or risky configurations such as dormant entitlement to data
and over-privilege.
●● ●
Real-time data activity monitoring with application
end-user translation—Provides 100 percent visibility and
granularity into all database, files, file share, data warehouse,
Hadoop and NoSQL transactions across all platforms and
protocols—with a secure, tamper-proof audit trail that
supports separation of duties; monitors and enforces wide
range of policies for sensitive-data access, privileged-user
actions, change control, application-user activities and
security exceptions; monitors all data transactions to create
a continuous, fine-grained audit trail of all data sources that
identifies the “who, what, when, where and how” of each
transaction, including execution of all SQL commands on
all database objects; audits all logins/logouts, security excep-
tions such as login failures and SQL errors and extrusion
detection (identifying sensitive data returned by queries);
creates a single, centralized audit repository for enterprise-
wide compliance reporting, performance optimization,
investigations and forensics.
●● ●
Real-time security alerts—Creates alerts in real time when
a security policy is violated - including alerts to enterprise-
wide Security Information and Event Management systems,
such as IBM Security QRadar - so you can take immediate
action.
●● ●
Real-time data masking (S-GATE)—Ensures that critical
data does not fall into the wrong hands. Guardium Data
Activity Monitoring looks at the data content leaving the
data sources and obfuscates non-authorized fields according
to the requestor privileges.
●● ●
Real-time blocking (S-GATE), including user quarantine
and firecall ids
– Establishes preventative controls across the enterprise.
Guardium Data Activity Monitor provides automated,
real-time controls that prevent privileged users from
performing unauthorized actions, such as: executing
queries on sensitive tables, changing sensitive data values,
adding or deleting critical tables (schema changes) outside
the change management process, and creating new user
accounts and modifying privileges.
– Reacts to suspicious activity by blocking activity or
quarantining the requestor.
– Implements firecall IDs that allow specified users to access
certain servers for a particular time period to accommodate
certain activities such as maintenance windows without
affecting DB security configuration.
●● ●
Custom report builder with drill-down capabilities—
Customizes and filters security reports to display the parame-
ters that are relevant to you. Some common reports include:
SQL errors, failed logins, terminated users and policy
violations.
●● ●
Best practice recommendations–predefined reports
and alerts—Provides a variety of predefined reports from
different views of entitlement data, enabling organizations to
quickly and easily identify security risks, such as: inappropri-
ately exposed objects, users with excessive rights, and unau-
thorized administrative actions. Examples of the numerous
predefined reports include: accounts with system privileges,
all system and administrator privileges shown by user and
role, object privileges by user, and all objects with PUBLIC
access. All entitlement information is stored in a forensically
secure and tamper-proof repository along with all data source
audit information. Custom reports can be built easily by way
of an intuitive drag-and-drop interface.
3
Data Sheet
Security
Streamlined management
IT organizations today are under high pressure to maximize the
use of their resources and time. Low-level security operations
or manual processes are increasingly regarded as wasteful for
such a critical environment. Not only do manual approaches
make the business inefficient, but they are risky and error-
prone. As your business data needs grow, the scope of the data
security and compliance projects increases. You need security
solutions to become more streamlined and adaptable as your
needs change. In the era of big data, where data is growing
exponentially, data security solutions should be optimized and
transparent accordingly, not just address status quo approaches.
Guardium Data Activity Monitor provides key capabilities to
help organizations streamline and adapt data protection and
security management without impacting data sources, networks,
or applications, such as:
●● ●
Dynamically adapting reports and policies to IT
environment changes and security events—Maximizes
the protection afforded by Guardium. With one click,
groups, policies, tests and other configurable parameters
can be updated to adapt to the constantly evolving nature of
the IT environment, database infrastructure, and associated
threats. Automated group management is used in audit
reports, alerts and real-time policies to facilitate the
maintenance—despite the constant change in the IT
environment. White lists or black lists can be generated
on any auditable item, for example, users, IP addresses,
table names and so forth. Group maintenance can be done
manually through the GUI or be automated with LDAP
integration. Populate groups from query, or GuardAPIs. You
can synch with user groups in Active Directory, IBM Tivoli®
DS, Novell, Open LDAP, SunOne, IBM z/OS® and more.
Handling policies, reporting and auditing indirectly through
groups helps to keep a consistent management process,
despite the constant change in the environment.
●● ●
Central console to manage and control the Guardium
deployment—Provides centralized management through a
single web-based console. The scalable multi-tier architecture
supports large and small environments with built-in health-
check dashboards. Software updates are handled centrally
and automatically without having to involve the change
management team or resource owners.
●● ●
Database discovery, data classification, and entitlement
reports—Discovers and classifies sensitive data. The discov-
ery process can be configured to probe specified network
segments on a schedule or on demand. Once instances of
interest are identified, the content is examined to identify
and classify sensitive data. Entitlement reports provide an
automatic risk assessment on who is configured to access
the sensitive data.
●● ●
Powerful analytic insights—centrally visualize and analyze
data activity from a heterogeneous data environment using a
single format. Apply leading-edge analytic tools to obtain
actionable insights on data access behavior with tools such
as Connection Profiling, Quick Search real-time forensics,
Outlier Detection algorithms, and Investigative Dashboard.
●● ●
Predefined security policies—Allows you to create and
manage your own data security policies based on audit data
or leverage out-of-the-box predefined policies. The policies
can be built to detect any threat scenario against the data
utilizing the most common audit constructs such as who,
from where, when, where to, on what, what action, and other
contextual information. Examples of security policies include:
– Access policies that identify anomalous behavior by contin-
uously comparing all data activity to a baseline of normal
behavior. An example of anomalous behavior would
be an SQL injection attack which typically exhibits
patterns of data access that are uncharacteristic of standard
line-of-business applications.
– Exception policies are based on definable thresholds, such
as an excessive number of failed logins or SQL errors.
– Extrusion policies that examine data leaving the data
repository for specific data value patterns such as credit
card numbers.
4
Data Sheet
Security
●● ●
Built-in customizable compliance workflow with preset
compliance accelerators (reports review, escalations,
sign-offs)—Centralizes and automates oversight processes
enterprise-wide, including report generation, distribution,
electronic sign-offs and escalations. It creates custom pro-
cesses by specifying your unique combination of workflow
steps, actions, and user and enables automated execution of
oversight processes on a report line-item basis, maximizing
process efficiency without sacrificing security. It ensures that
some team members see only data and tasks related to their
own roles and stores process results in a secure centralized
repository. Supports SOX, PCI, HIPAA and more with
pre-defined reports for top regulations. An easy-to-use
graphical user interface allows a wide variety of processes
to be created to match the unique needs of the tasks and
individuals involved. Many different audit tasks are sup-
ported, including reviewing the results of automatically
generated vulnerability assessments, asset discovery, and
data classification. Export reports in varying formats, which
include PDF, CSV, CEF, Syslog forwarding, SCAP or
custom schemas.
●● ●
Secure and self-sustained platform (self-monitoring,
internal audit, secure appliance)—Audits all operations,
including administration and configuration, to maintain
compliance controls, to maintain separation of duties,
and to meet common criteria certification and FIPS 140-2.
Performance
Business moves fast and clients demand continual access to data.
As a result, IT environments including databases, transactional
applications, analytics platforms, file systems, and emerging big
data applications are required to meet aggressive service level
agreements for availability, performance and responsiveness.
Compliance requirements need to be addressed and security
strategies implemented without impacting performance.
Guardium Data Activity Monitor can be implemented with
negligible performance impact—less than 1 percent overhead
in most cases—using key capabilities, such as:
●● ●
Operating System based agent—Provides full visibility on
data traffic while monitoring only what is required, such
as the data traffic already going from the OS to the data
source, and sending it out of band for analysis. As a result,
monitoring does not affect the performance of the data
source or application as in the case of native audit logging.
●● ●
Filtering of DB traffic—Avoids unnecessary DB audit
traffic.
●● ●
Centralized Load balancing for multi-tier architecture—
the Guardium agents (STAPs) can be automatically distrib-
uted and they will automatically find the most optimal
configuration to send their data activity traffic.
●● ●
Support for 64-bit architecture—provides the ability to
handle and store more data traffic data with fewer resources.
Scalability
Managing data security and compliance has become increas-
ingly challenging. Not only has the rate of cyber attacks
continued to grow, but the complexity and scope of the envi-
ronments has increased dramatically. Driven by a rapidly
changing business landscape that includes mergers, outsourcing,
cloud deployments, workforce adjustments and accelerating
business automation, data sources continue to proliferate over
geographical and organizational boundaries. In addition, data
is growing in terms of volume, variety and velocity introducing
new types of data stores, for example Hadoop and NoSQL
databases. Given the current resource-constrained IT outfits,
the complexity of environments to manage, and escalating
workloads, organizations are now seeking means to increase
automation in their data security and compliance operations.
5
Data Sheet
Security
Guardium Data Activity Monitor is equipped to seamlessly
scale from one data source to tens of thousands without
disrupting operations. Automation capabilities include:
●● ●
Automatically adapts to changes in the data center
(Grid)—Automatically balances the load and handles
changes or additions to the environment without impacting
performance or the availability of the data monitoring infra-
structure. Dynamically adds or drops data sources without
altering configurations. The Guardium Grid provides
elasticity for supporting large deployments in frequent
change. Load balancing scalability and performance benefits
help clients reduce management costs, minimize the need
to manage detailed configuration information (IP addresses
or hostnames) as data sources are added or removed, and
simplify data capacity expansion projects.
●● ●
Support for batch operations (GuardAPI)—Facilitates
integration of any IT process with Guardium Data Activity
Monitor. GuardAPI is a script-based CLI interface to
Guardium allowing any operation to be done remotely.
●● ●
Centralized Aggregation—Merges and normalizes audit
reports from multiple data sources to produce enterprise-
wide reports and a forensics source.
●● ●
Centralized Management—Controls operations and policy
setting from a central location including hands-off agent
updates, policy control, Guardium environment health,
and load balancing.
Integration
Most organizations have a diverse set of IT and Security solu-
tions in place today, such as Ticketing Systems or Security
Information and Event Management (SIEM) solutions. All of
these solutions eventually require interaction with data security.
Most existing security solutions lack the complete visibility
into data access patterns required by regulatory mandates.
Guardium Data Activity Monitor provides analytics-based,
in-depth insight while seamlessly integrating into existing
security solutions such as IBM Security QRadar® or HP
ArcSight. In addition, Guardium Data Activity Monitor
provides a modular integration model with existing IT systems
such as data management, ticketing, and archiving solutions.
The goal is to streamline IT and Security operations by com-
plementing and extending them with data security capabilities
such as in:
●● ●
Integration with IT operations—Exploits existing data
management environments. Built-in, ready-to-use support
for Oracle, IBM DB2®, Sybase, Microsoft SQL Server,
IBM Informix®, mySQL, Teradata, IBM PureSystems®,
Hadoop, IBM InfoSphere BigInsights, PostgreSQL,
NoSQL, Mongo DB, SAP HANA and more across all
major protocols including: HTTP, HTTPS, FTP, SAMBA
and IBM iSeries® connections to CSV text file data sources.
Also seamlessly share information with common IT opera-
tions tools, such as ticketing systems, where Guardium tracks
ticket ids within data access audit records.
●● ●
Integration with security systems and standards
(QRadar, HP Arcsight, Radius, LDAP)—Changes to
users, groups, roles and authentication to data sources and
applications can be updated automatically and directly from
directories like LDAP, Radius and Active Directory. You can
automatically handle any staff or user change while keeping
the policies and reports intact, avoiding the need to con-
stantly modify them. In addition, send alerts and all audit
information to a SIEM such as IBM Security QRadar for
correlation with other security events.
6
Data Sheet
Security
●● ●
Flexible, customizable integration platform (Universal
Feed, Enterprise Integrator)—Simplifies and automates
the integration of data from external data sources or text
files into the Guardium repository. With data housed in
the repository, the full array of Guardium policy, analysis,
reporting, and workflow tools can be leveraged. It allows
input data from other sources to participate in the correlation
analysis; creates unified audit reports, including external
information that enhances security, and improves operational
efficiency such as approved modifications from change
ticketing systems; imports descriptive information such as
full names and phone numbers corresponding to user names
to streamline investigation of exceptions; integrates informa-
tion from IAM systems, such as roles and departments, to
enable finer-grained security policies; and interfaces with
IBM Tivoli Storage Manager and EMC Centera to archive
audit data and oversight process results.
About IBM Security Guardium
Guardium is part of the IBM Security Systems Framework and
the IBM Data Security Privacy Platform. The Data Security
and Privacy Platform provides end-to-end data protection capa-
bilities to discover and analyze, protect, integrate and manage
the critical data in your environment. Guardium provides
all the building blocks you need for data protection – from
meeting compliance requirements all the way though to
broader data protection. The portfolio is modular, so you can
start anywhere and mix and match security software building
blocks with components from other vendors or choose to
deploy multiple building blocks together for increased accelera-
tion and value. The security platform is an enterprise-class
foundation for information-intensive projects providing the
performance, scalability, reliability and acceleration needed to
simplify difficult challenges and deliver trusted information
to your business faster.
About IBM Security
IBM Security offers one of the most advanced and integrated
portfolios of enterprise security products and services. The
portfolio, supported by world-renowned X-Force research
and development, provides security intelligence to help
organizations holistically protect their people, infrastructures,
data and applications, offering solutions for identity and access
management, database security, application development,
risk management, endpoint management, network security
and more. These solutions enable organizations to effectively
manage risk and implement integrated security for mobile,
cloud, social media and other enterprise business architectures.
IBM operates one of the world’s broadest security research,
development and delivery organizations, monitors 15 billion
security events per day in more than 130 countries, and holds
more than 3,000 security patents.
TCO Security Compliance
Risk Reduction
Automatically identify risky data or configurations X X
Real-time data activity monitoring with application end-user translation X X
Real-time security alerts X X
**Real-time data masking (S-GATE) X X
**Real-time blocking (S-GATE), including quarantine and fire ids X X
Custom report builder with drill-down capabilities X X X
Best practice recommendations – predefined reports and alerts X X X
7
Data Sheet
Security
TCO Security Compliance
Streamlined Management
Dynamically adapting reports and policies to IT environment changes
and security events
X X
Central console to manage and control the Guardium deployment X
Database discovery, data classification, and entitlement reports X X X
Powerful analytic insights (Quick Search, Outliner Detection, Connection
Profiling, Investigative Dashboard)
X X X
Predefined security policies X X X
Built-in customizable compliance workflow with preset compliance
accelerators (reports review, escalations, sign-offs)
X X
Secure and self-sustained platform (self-monitoring, internal audit, secure
appliance)
X X
Performance
Operating System based agent X X X
Filtering of DB traffic X
Centralized Load balancing for multi-tier architecture X
Support for 64-bit architecture X
Scalability
Automatically adapt to changes in the data center (Grid) X
Support to batch operation (GuardAPI) X
Centralized Aggregation and normalization of reports and audit logos X
Centralized Management for operational control X
Integration
Integration with IT operations X X X
Integration with security systems and standards (QRadar, HP Arcsight,
Radius, LDAP, etc)
X X X
Flexible, customizable integration platform (Universal Feed, Enterprise
Integrator)
X X X
Table 1. Guardium Data Activity Monitor minimizes total cost of ownership, improves security and supports compliance requirements through four simple Data
Activity Monitor offerings: Express, Standard, Advanced, and Central Management and Aggregation Pack.
­ ­
	
	
	
	
	
	
	
	
	
	
Please Recycle
For more information
To learn more about the Guardium, please contact your
IBM representative or IBM Business Partner, or visit the
following website: ibm.com/guardium
Additionally, IBM Global Financing can help you acquire
the IT solutions that your business needs in the most cost-
effective and strategic way possible. For credit-qualified
clients we can customize an IT financing solution to suit
your business requirements, enable effective cash management,
and improve your total cost of ownership. IBM Global
Financing is your smartest choice to fund critical IT invest-
ments and propel your business forward. For more information,
visit: ibm.com/financing
­
­
© Copyright IBM Corporation 2015
IBM Security
Route 100
Somers, NY 10589
Produced in the United States of America
July 2015
IBM, the IBM logo, ibm.com, z/OS, QRadar, PureSystems, and
Guardium are trademarks of International Business Machines Corp.,
registered in many jurisdictions worldwide. Other product and service
names might be trademarks of IBM or other companies. A current list of
IBM trademarks is available on the web at “Copyright and trademark
information” at ibm.com/legal/copytrade.shtml
This document is current as of the initial date of publication and may be
changed by IBM at any time. IBM Business Partners set their own prices,
which may vary.
The performance data discussed herein is presented as derived under
specific operating conditions. Actual results may vary. It is the user’s
responsibility to evaluate and verify the operation of any other products
or programs with IBM products and programs.
THE INFORMATION IN THIS DOCUMENT IS PROVIDED
“AS IS” WITHOUT ANY WARRANTY, EXPRESS OR
IMPLIED, INCLUDING WITHOUT ANY WARRANTIES
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE AND ANY WARRANTY OR CONDITION OF
NON-INFRINGEMENT. IBM products are warranted according to the
terms and conditions of the agreements under which they are provided.
The client is responsible for ensuring compliance with laws and regulations
applicable to it. IBM does not provide legal advice or represent or warrant
that its services or products will ensure that the client is in compliance with
any law or regulation.
Statements regarding IBM’s future direction and intent are subject to
change or withdrawal without notice, and represent goals and
objectives only.
Statement of Good Security Practices: IT system security involves
protecting systems and information through prevention, detection and
response to improper access from within and outside your enterprise.
Improper access can result in information being altered, destroyed,
misappropriated or misused or can result in damage to or misuse of your
systems, including for use in attacks on others. No IT system or product
should be considered completely secure and no single product, service or
security measure can be completely effective in preventing improper use
or access. IBM systems, products and services are designed to be part of a
lawful, comprehensive security approach, which will necessarily involve
additional operational procedures, and may require other systems, products
or services to be most effective. IBM DOES NOT WARRANT THAT
ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM,
OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
WGD03075-USEN-00

More Related Content

What's hot

Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
Prime Infoserv
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
Cisco Canada
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
Mahmoud Yassin
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
Andrew Wong
 
Sensitive data
Sensitive dataSensitive data
Sensitive data
S.M. Towhidul Islam
 
Siem ppt
Siem pptSiem ppt
Siem ppt
kmehul
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
Liwei Ren任力偉
 
[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...
[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...
[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...
CODE BLUE
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
Vishal Kumar
 
IT Infrastrucutre Security
IT Infrastrucutre SecurityIT Infrastrucutre Security
IT Infrastrucutre Security
S Periyakaruppan CISM,ISO31000,C-EH,ITILF
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Seccuris Inc.
 
IBM Qradar
IBM QradarIBM Qradar
IBM Qradar
Coenraad Smith
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
Nada G.Youssef
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and Mitigations
April Mardock CISSP
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
Symantec
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
Splunk
 
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
carlitocabana
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation finalRizwan S
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksTripwire
 

What's hot (20)

Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
Sensitive data
Sensitive dataSensitive data
Sensitive data
 
Siem ppt
Siem pptSiem ppt
Siem ppt
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...
[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...
[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
 
IT Infrastrucutre Security
IT Infrastrucutre SecurityIT Infrastrucutre Security
IT Infrastrucutre Security
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
IBM Qradar
IBM QradarIBM Qradar
IBM Qradar
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and Mitigations
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security Attacks
 

Viewers also liked

IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
Thierry Matusiak
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
Thierry Matusiak
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
Thierry Matusiak
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
Peter Tutty
 
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Alan Kan
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentation
tsteh
 
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Avirot Mitamura
 
Ibm portfolio piece
Ibm portfolio pieceIbm portfolio piece
Ibm portfolio piece
Colson Rice
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!
IBM Security
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSA
Jorge Sebastiao
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
Patrick Bouillaud
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
Camilo Fandiño Gómez
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
Casey Lucas
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
IBM Thailand Co Ltd
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
IBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
IBM Security
 

Viewers also liked (17)

IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
 
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentation
 
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10
 
Ibm portfolio piece
Ibm portfolio pieceIbm portfolio piece
Ibm portfolio piece
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSA
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 

Similar to Ibm security guardium

Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
Drew Madelung
 
Guardium Suite_seguridad de los datos...
Guardium Suite_seguridad de los datos...Guardium Suite_seguridad de los datos...
Guardium Suite_seguridad de los datos...
EdiverLadino
 
Executive Summary_2016
Executive Summary_2016Executive Summary_2016
Executive Summary_2016Annie Cute
 
Demystifying Cloud Security Compliance
Demystifying Cloud Security ComplianceDemystifying Cloud Security Compliance
Demystifying Cloud Security Compliance
Mirantis
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
TranVu383073
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
Adrian Dumitrescu
 
GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014Ravindran Vasu
 
Office 365 Dashboards - Analytical Reporting Tools
Office 365 Dashboards - Analytical Reporting ToolsOffice 365 Dashboards - Analytical Reporting Tools
Office 365 Dashboards - Analytical Reporting Tools
UnifyCloud
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
IBM Security
 
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools
SolarWinds
 
Cloud Data Protection-Reliable Solutions for Companies
Cloud Data Protection-Reliable Solutions for CompaniesCloud Data Protection-Reliable Solutions for Companies
Cloud Data Protection-Reliable Solutions for Companies
basilmph
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
Piyush Jain
 
2015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #22015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #2Harriet Schneider
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
 
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Konverge Technologies Pvt. Ltd.
 
Intelligence and investigation management
 Intelligence and investigation management Intelligence and investigation management
Intelligence and investigation management
Adeola Taiwo-Ogunbode
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | Seclore
Seclore
 
RSA-Pivotal Security Big Data Reference Architecture
RSA-Pivotal Security Big Data Reference ArchitectureRSA-Pivotal Security Big Data Reference Architecture
RSA-Pivotal Security Big Data Reference Architecture
EMC
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
Camilo Fandiño Gómez
 

Similar to Ibm security guardium (20)

Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Guardium Suite_seguridad de los datos...
Guardium Suite_seguridad de los datos...Guardium Suite_seguridad de los datos...
Guardium Suite_seguridad de los datos...
 
Executive Summary_2016
Executive Summary_2016Executive Summary_2016
Executive Summary_2016
 
Demystifying Cloud Security Compliance
Demystifying Cloud Security ComplianceDemystifying Cloud Security Compliance
Demystifying Cloud Security Compliance
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
AGSL brochure
AGSL brochureAGSL brochure
AGSL brochure
 
GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014
 
Office 365 Dashboards - Analytical Reporting Tools
Office 365 Dashboards - Analytical Reporting ToolsOffice 365 Dashboards - Analytical Reporting Tools
Office 365 Dashboards - Analytical Reporting Tools
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools
 
Cloud Data Protection-Reliable Solutions for Companies
Cloud Data Protection-Reliable Solutions for CompaniesCloud Data Protection-Reliable Solutions for Companies
Cloud Data Protection-Reliable Solutions for Companies
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
2015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #22015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #2
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
 
Intelligence and investigation management
 Intelligence and investigation management Intelligence and investigation management
Intelligence and investigation management
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | Seclore
 
RSA-Pivotal Security Big Data Reference Architecture
RSA-Pivotal Security Big Data Reference ArchitectureRSA-Pivotal Security Big Data Reference Architecture
RSA-Pivotal Security Big Data Reference Architecture
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
 

More from CMR WORLD TECH

Cyber Security
Cyber SecurityCyber Security
Cyber Security
CMR WORLD TECH
 
Cyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project PresentationCyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project Presentation
CMR WORLD TECH
 
CPQ Básico
CPQ BásicoCPQ Básico
CPQ Básico
CMR WORLD TECH
 
Cpq basics bycesaribeiro
Cpq basics bycesaribeiroCpq basics bycesaribeiro
Cpq basics bycesaribeiro
CMR WORLD TECH
 
Apexbasic
ApexbasicApexbasic
Apexbasic
CMR WORLD TECH
 
Questoes processautomation
Questoes processautomationQuestoes processautomation
Questoes processautomation
CMR WORLD TECH
 
Process automationppt
Process automationpptProcess automationppt
Process automationppt
CMR WORLD TECH
 
Transcript mva.cesar
Transcript mva.cesarTranscript mva.cesar
Transcript mva.cesar
CMR WORLD TECH
 
Aws migration-whitepaper-en
Aws migration-whitepaper-enAws migration-whitepaper-en
Aws migration-whitepaper-en
CMR WORLD TECH
 
Delivery readness for pick season and higth volume
Delivery readness for pick season and higth volumeDelivery readness for pick season and higth volume
Delivery readness for pick season and higth volume
CMR WORLD TECH
 
Why digital-will-become-the-primary-channel-for-b2 b-engagement
Why digital-will-become-the-primary-channel-for-b2 b-engagementWhy digital-will-become-the-primary-channel-for-b2 b-engagement
Why digital-will-become-the-primary-channel-for-b2 b-engagement
CMR WORLD TECH
 
Transcript Micrsosft Java Azure
Transcript Micrsosft Java Azure Transcript Micrsosft Java Azure
Transcript Micrsosft Java Azure
CMR WORLD TECH
 
Buisiness UK Trading Marketing Finance
Buisiness UK Trading Marketing Finance Buisiness UK Trading Marketing Finance
Buisiness UK Trading Marketing Finance
CMR WORLD TECH
 
Hyperledger arch wg_paper_1_consensus
Hyperledger arch wg_paper_1_consensusHyperledger arch wg_paper_1_consensus
Hyperledger arch wg_paper_1_consensus
CMR WORLD TECH
 
Master lob-e-book
Master lob-e-bookMaster lob-e-book
Master lob-e-book
CMR WORLD TECH
 
Apexand visualforcearchitecture
Apexand visualforcearchitectureApexand visualforcearchitecture
Apexand visualforcearchitecture
CMR WORLD TECH
 
Trailblazers guide-to-apps
Trailblazers guide-to-appsTrailblazers guide-to-apps
Trailblazers guide-to-apps
CMR WORLD TECH
 
Berkeley program on_data_science___analytics_1
Berkeley program on_data_science___analytics_1Berkeley program on_data_science___analytics_1
Berkeley program on_data_science___analytics_1
CMR WORLD TECH
 
Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_
Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_
Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_
CMR WORLD TECH
 
Salesforce voice-and-tone
Salesforce voice-and-toneSalesforce voice-and-tone
Salesforce voice-and-tone
CMR WORLD TECH
 

More from CMR WORLD TECH (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project PresentationCyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project Presentation
 
CPQ Básico
CPQ BásicoCPQ Básico
CPQ Básico
 
Cpq basics bycesaribeiro
Cpq basics bycesaribeiroCpq basics bycesaribeiro
Cpq basics bycesaribeiro
 
Apexbasic
ApexbasicApexbasic
Apexbasic
 
Questoes processautomation
Questoes processautomationQuestoes processautomation
Questoes processautomation
 
Process automationppt
Process automationpptProcess automationppt
Process automationppt
 
Transcript mva.cesar
Transcript mva.cesarTranscript mva.cesar
Transcript mva.cesar
 
Aws migration-whitepaper-en
Aws migration-whitepaper-enAws migration-whitepaper-en
Aws migration-whitepaper-en
 
Delivery readness for pick season and higth volume
Delivery readness for pick season and higth volumeDelivery readness for pick season and higth volume
Delivery readness for pick season and higth volume
 
Why digital-will-become-the-primary-channel-for-b2 b-engagement
Why digital-will-become-the-primary-channel-for-b2 b-engagementWhy digital-will-become-the-primary-channel-for-b2 b-engagement
Why digital-will-become-the-primary-channel-for-b2 b-engagement
 
Transcript Micrsosft Java Azure
Transcript Micrsosft Java Azure Transcript Micrsosft Java Azure
Transcript Micrsosft Java Azure
 
Buisiness UK Trading Marketing Finance
Buisiness UK Trading Marketing Finance Buisiness UK Trading Marketing Finance
Buisiness UK Trading Marketing Finance
 
Hyperledger arch wg_paper_1_consensus
Hyperledger arch wg_paper_1_consensusHyperledger arch wg_paper_1_consensus
Hyperledger arch wg_paper_1_consensus
 
Master lob-e-book
Master lob-e-bookMaster lob-e-book
Master lob-e-book
 
Apexand visualforcearchitecture
Apexand visualforcearchitectureApexand visualforcearchitecture
Apexand visualforcearchitecture
 
Trailblazers guide-to-apps
Trailblazers guide-to-appsTrailblazers guide-to-apps
Trailblazers guide-to-apps
 
Berkeley program on_data_science___analytics_1
Berkeley program on_data_science___analytics_1Berkeley program on_data_science___analytics_1
Berkeley program on_data_science___analytics_1
 
Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_
Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_
Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_
 
Salesforce voice-and-tone
Salesforce voice-and-toneSalesforce voice-and-tone
Salesforce voice-and-tone
 

Recently uploaded

Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptxData_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
AnirbanRoy608946
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
ocavb
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
AbhimanyuSinha9
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
ukgaet
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
ArpitMalhotra16
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
MaleehaSheikh2
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
Opendatabay
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
vcaxypu
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
u86oixdj
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
balafet
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Boston Institute of Analytics
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
pchutichetpong
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
ewymefz
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
oz8q3jxlp
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
vcaxypu
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
v3tuleee
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
NABLAS株式会社
 
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...
2023240532
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 

Recently uploaded (20)

Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptxData_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
 
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 

Ibm security guardium

  • 1. Security Data Sheet IBM Security Guardium Data Activity Monitor Continuously monitor data access and protect sensitive data across the enterprise Highlights ●● ● ● Uncover risks to sensitive data through data discovery, classification, and privi- leged access discovery to automatically take action or report for compliance. ●● ● ● Reduces data breach risk and extends security intelligence with in-depth data protection. ●● ● ● Provides a streamlined and adaptable solution for real-time monitoring access to high-value databases, data warehouses, files, cloud, and big data environments. ●● ● ● Minimizes total cost of ownership with robust scalability, simplification, automa- tion, analytics, and transparency for a range of deployments – whether they are small, large, or enterprise-wide. IBM® Security® Guardium® Data Activity Monitor provides the most adoptable, adaptable, and scalable solution for assuring the security and integrity of data in heterogeneous environments including databases, data warehouses, files, file shares, cloud, and big data platforms such as Hadoop and NoSQL databases. The solution continuously monitors all data access operations in real time to detect unauthorized actions, based on detailed contextual information—the “who, what, where, when, and how” of each data access. Guardium Data Activity Monitor reacts immediately to prevent unauthorized or suspicious activities by privileged insiders and potential hackers, and automates data security governance controls in heteroge- neous enterprises. Guardium Data Activity Monitor improves security and supports compli- ance requirements through a set of core capabilities that also minimize its total cost of ownership. These capabilities are available in four simple adoptable offering levels: Express Data Activity Monitor, Standard Data Activity Monitor, Advanced Data Activity Monitor, and Central Management and Aggregation Pack.
  • 2. 2 Data Sheet Security Risk reduction For any given chosen organization action or activity, there is the potential risk of sensitive data exposure or loss. The probability or threat of damage, liability, data loss or any other negative occurrence that is caused by external or internal vulnerability can be avoided through quick response, or better yet, preemp- tive action. Guardium Data Activity Monitor reduces data breach risk by providing real-time data security and intelligence with features such as: ●● ● Automatically Identify risky data or configurations—Uses data discovery, classification, entitlement reports, and audit records to identify data at risk, such as dormant sensitive data or risky configurations such as dormant entitlement to data and over-privilege. ●● ● Real-time data activity monitoring with application end-user translation—Provides 100 percent visibility and granularity into all database, files, file share, data warehouse, Hadoop and NoSQL transactions across all platforms and protocols—with a secure, tamper-proof audit trail that supports separation of duties; monitors and enforces wide range of policies for sensitive-data access, privileged-user actions, change control, application-user activities and security exceptions; monitors all data transactions to create a continuous, fine-grained audit trail of all data sources that identifies the “who, what, when, where and how” of each transaction, including execution of all SQL commands on all database objects; audits all logins/logouts, security excep- tions such as login failures and SQL errors and extrusion detection (identifying sensitive data returned by queries); creates a single, centralized audit repository for enterprise- wide compliance reporting, performance optimization, investigations and forensics. ●● ● Real-time security alerts—Creates alerts in real time when a security policy is violated - including alerts to enterprise- wide Security Information and Event Management systems, such as IBM Security QRadar - so you can take immediate action. ●● ● Real-time data masking (S-GATE)—Ensures that critical data does not fall into the wrong hands. Guardium Data Activity Monitoring looks at the data content leaving the data sources and obfuscates non-authorized fields according to the requestor privileges. ●● ● Real-time blocking (S-GATE), including user quarantine and firecall ids – Establishes preventative controls across the enterprise. Guardium Data Activity Monitor provides automated, real-time controls that prevent privileged users from performing unauthorized actions, such as: executing queries on sensitive tables, changing sensitive data values, adding or deleting critical tables (schema changes) outside the change management process, and creating new user accounts and modifying privileges. – Reacts to suspicious activity by blocking activity or quarantining the requestor. – Implements firecall IDs that allow specified users to access certain servers for a particular time period to accommodate certain activities such as maintenance windows without affecting DB security configuration. ●● ● Custom report builder with drill-down capabilities— Customizes and filters security reports to display the parame- ters that are relevant to you. Some common reports include: SQL errors, failed logins, terminated users and policy violations. ●● ● Best practice recommendations–predefined reports and alerts—Provides a variety of predefined reports from different views of entitlement data, enabling organizations to quickly and easily identify security risks, such as: inappropri- ately exposed objects, users with excessive rights, and unau- thorized administrative actions. Examples of the numerous predefined reports include: accounts with system privileges, all system and administrator privileges shown by user and role, object privileges by user, and all objects with PUBLIC access. All entitlement information is stored in a forensically secure and tamper-proof repository along with all data source audit information. Custom reports can be built easily by way of an intuitive drag-and-drop interface.
  • 3. 3 Data Sheet Security Streamlined management IT organizations today are under high pressure to maximize the use of their resources and time. Low-level security operations or manual processes are increasingly regarded as wasteful for such a critical environment. Not only do manual approaches make the business inefficient, but they are risky and error- prone. As your business data needs grow, the scope of the data security and compliance projects increases. You need security solutions to become more streamlined and adaptable as your needs change. In the era of big data, where data is growing exponentially, data security solutions should be optimized and transparent accordingly, not just address status quo approaches. Guardium Data Activity Monitor provides key capabilities to help organizations streamline and adapt data protection and security management without impacting data sources, networks, or applications, such as: ●● ● Dynamically adapting reports and policies to IT environment changes and security events—Maximizes the protection afforded by Guardium. With one click, groups, policies, tests and other configurable parameters can be updated to adapt to the constantly evolving nature of the IT environment, database infrastructure, and associated threats. Automated group management is used in audit reports, alerts and real-time policies to facilitate the maintenance—despite the constant change in the IT environment. White lists or black lists can be generated on any auditable item, for example, users, IP addresses, table names and so forth. Group maintenance can be done manually through the GUI or be automated with LDAP integration. Populate groups from query, or GuardAPIs. You can synch with user groups in Active Directory, IBM Tivoli® DS, Novell, Open LDAP, SunOne, IBM z/OS® and more. Handling policies, reporting and auditing indirectly through groups helps to keep a consistent management process, despite the constant change in the environment. ●● ● Central console to manage and control the Guardium deployment—Provides centralized management through a single web-based console. The scalable multi-tier architecture supports large and small environments with built-in health- check dashboards. Software updates are handled centrally and automatically without having to involve the change management team or resource owners. ●● ● Database discovery, data classification, and entitlement reports—Discovers and classifies sensitive data. The discov- ery process can be configured to probe specified network segments on a schedule or on demand. Once instances of interest are identified, the content is examined to identify and classify sensitive data. Entitlement reports provide an automatic risk assessment on who is configured to access the sensitive data. ●● ● Powerful analytic insights—centrally visualize and analyze data activity from a heterogeneous data environment using a single format. Apply leading-edge analytic tools to obtain actionable insights on data access behavior with tools such as Connection Profiling, Quick Search real-time forensics, Outlier Detection algorithms, and Investigative Dashboard. ●● ● Predefined security policies—Allows you to create and manage your own data security policies based on audit data or leverage out-of-the-box predefined policies. The policies can be built to detect any threat scenario against the data utilizing the most common audit constructs such as who, from where, when, where to, on what, what action, and other contextual information. Examples of security policies include: – Access policies that identify anomalous behavior by contin- uously comparing all data activity to a baseline of normal behavior. An example of anomalous behavior would be an SQL injection attack which typically exhibits patterns of data access that are uncharacteristic of standard line-of-business applications. – Exception policies are based on definable thresholds, such as an excessive number of failed logins or SQL errors. – Extrusion policies that examine data leaving the data repository for specific data value patterns such as credit card numbers.
  • 4. 4 Data Sheet Security ●● ● Built-in customizable compliance workflow with preset compliance accelerators (reports review, escalations, sign-offs)—Centralizes and automates oversight processes enterprise-wide, including report generation, distribution, electronic sign-offs and escalations. It creates custom pro- cesses by specifying your unique combination of workflow steps, actions, and user and enables automated execution of oversight processes on a report line-item basis, maximizing process efficiency without sacrificing security. It ensures that some team members see only data and tasks related to their own roles and stores process results in a secure centralized repository. Supports SOX, PCI, HIPAA and more with pre-defined reports for top regulations. An easy-to-use graphical user interface allows a wide variety of processes to be created to match the unique needs of the tasks and individuals involved. Many different audit tasks are sup- ported, including reviewing the results of automatically generated vulnerability assessments, asset discovery, and data classification. Export reports in varying formats, which include PDF, CSV, CEF, Syslog forwarding, SCAP or custom schemas. ●● ● Secure and self-sustained platform (self-monitoring, internal audit, secure appliance)—Audits all operations, including administration and configuration, to maintain compliance controls, to maintain separation of duties, and to meet common criteria certification and FIPS 140-2. Performance Business moves fast and clients demand continual access to data. As a result, IT environments including databases, transactional applications, analytics platforms, file systems, and emerging big data applications are required to meet aggressive service level agreements for availability, performance and responsiveness. Compliance requirements need to be addressed and security strategies implemented without impacting performance. Guardium Data Activity Monitor can be implemented with negligible performance impact—less than 1 percent overhead in most cases—using key capabilities, such as: ●● ● Operating System based agent—Provides full visibility on data traffic while monitoring only what is required, such as the data traffic already going from the OS to the data source, and sending it out of band for analysis. As a result, monitoring does not affect the performance of the data source or application as in the case of native audit logging. ●● ● Filtering of DB traffic—Avoids unnecessary DB audit traffic. ●● ● Centralized Load balancing for multi-tier architecture— the Guardium agents (STAPs) can be automatically distrib- uted and they will automatically find the most optimal configuration to send their data activity traffic. ●● ● Support for 64-bit architecture—provides the ability to handle and store more data traffic data with fewer resources. Scalability Managing data security and compliance has become increas- ingly challenging. Not only has the rate of cyber attacks continued to grow, but the complexity and scope of the envi- ronments has increased dramatically. Driven by a rapidly changing business landscape that includes mergers, outsourcing, cloud deployments, workforce adjustments and accelerating business automation, data sources continue to proliferate over geographical and organizational boundaries. In addition, data is growing in terms of volume, variety and velocity introducing new types of data stores, for example Hadoop and NoSQL databases. Given the current resource-constrained IT outfits, the complexity of environments to manage, and escalating workloads, organizations are now seeking means to increase automation in their data security and compliance operations.
  • 5. 5 Data Sheet Security Guardium Data Activity Monitor is equipped to seamlessly scale from one data source to tens of thousands without disrupting operations. Automation capabilities include: ●● ● Automatically adapts to changes in the data center (Grid)—Automatically balances the load and handles changes or additions to the environment without impacting performance or the availability of the data monitoring infra- structure. Dynamically adds or drops data sources without altering configurations. The Guardium Grid provides elasticity for supporting large deployments in frequent change. Load balancing scalability and performance benefits help clients reduce management costs, minimize the need to manage detailed configuration information (IP addresses or hostnames) as data sources are added or removed, and simplify data capacity expansion projects. ●● ● Support for batch operations (GuardAPI)—Facilitates integration of any IT process with Guardium Data Activity Monitor. GuardAPI is a script-based CLI interface to Guardium allowing any operation to be done remotely. ●● ● Centralized Aggregation—Merges and normalizes audit reports from multiple data sources to produce enterprise- wide reports and a forensics source. ●● ● Centralized Management—Controls operations and policy setting from a central location including hands-off agent updates, policy control, Guardium environment health, and load balancing. Integration Most organizations have a diverse set of IT and Security solu- tions in place today, such as Ticketing Systems or Security Information and Event Management (SIEM) solutions. All of these solutions eventually require interaction with data security. Most existing security solutions lack the complete visibility into data access patterns required by regulatory mandates. Guardium Data Activity Monitor provides analytics-based, in-depth insight while seamlessly integrating into existing security solutions such as IBM Security QRadar® or HP ArcSight. In addition, Guardium Data Activity Monitor provides a modular integration model with existing IT systems such as data management, ticketing, and archiving solutions. The goal is to streamline IT and Security operations by com- plementing and extending them with data security capabilities such as in: ●● ● Integration with IT operations—Exploits existing data management environments. Built-in, ready-to-use support for Oracle, IBM DB2®, Sybase, Microsoft SQL Server, IBM Informix®, mySQL, Teradata, IBM PureSystems®, Hadoop, IBM InfoSphere BigInsights, PostgreSQL, NoSQL, Mongo DB, SAP HANA and more across all major protocols including: HTTP, HTTPS, FTP, SAMBA and IBM iSeries® connections to CSV text file data sources. Also seamlessly share information with common IT opera- tions tools, such as ticketing systems, where Guardium tracks ticket ids within data access audit records. ●● ● Integration with security systems and standards (QRadar, HP Arcsight, Radius, LDAP)—Changes to users, groups, roles and authentication to data sources and applications can be updated automatically and directly from directories like LDAP, Radius and Active Directory. You can automatically handle any staff or user change while keeping the policies and reports intact, avoiding the need to con- stantly modify them. In addition, send alerts and all audit information to a SIEM such as IBM Security QRadar for correlation with other security events.
  • 6. 6 Data Sheet Security ●● ● Flexible, customizable integration platform (Universal Feed, Enterprise Integrator)—Simplifies and automates the integration of data from external data sources or text files into the Guardium repository. With data housed in the repository, the full array of Guardium policy, analysis, reporting, and workflow tools can be leveraged. It allows input data from other sources to participate in the correlation analysis; creates unified audit reports, including external information that enhances security, and improves operational efficiency such as approved modifications from change ticketing systems; imports descriptive information such as full names and phone numbers corresponding to user names to streamline investigation of exceptions; integrates informa- tion from IAM systems, such as roles and departments, to enable finer-grained security policies; and interfaces with IBM Tivoli Storage Manager and EMC Centera to archive audit data and oversight process results. About IBM Security Guardium Guardium is part of the IBM Security Systems Framework and the IBM Data Security Privacy Platform. The Data Security and Privacy Platform provides end-to-end data protection capa- bilities to discover and analyze, protect, integrate and manage the critical data in your environment. Guardium provides all the building blocks you need for data protection – from meeting compliance requirements all the way though to broader data protection. The portfolio is modular, so you can start anywhere and mix and match security software building blocks with components from other vendors or choose to deploy multiple building blocks together for increased accelera- tion and value. The security platform is an enterprise-class foundation for information-intensive projects providing the performance, scalability, reliability and acceleration needed to simplify difficult challenges and deliver trusted information to your business faster. About IBM Security IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research and development, provides security intelligence to help organizations holistically protect their people, infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents. TCO Security Compliance Risk Reduction Automatically identify risky data or configurations X X Real-time data activity monitoring with application end-user translation X X Real-time security alerts X X **Real-time data masking (S-GATE) X X **Real-time blocking (S-GATE), including quarantine and fire ids X X Custom report builder with drill-down capabilities X X X Best practice recommendations – predefined reports and alerts X X X
  • 7. 7 Data Sheet Security TCO Security Compliance Streamlined Management Dynamically adapting reports and policies to IT environment changes and security events X X Central console to manage and control the Guardium deployment X Database discovery, data classification, and entitlement reports X X X Powerful analytic insights (Quick Search, Outliner Detection, Connection Profiling, Investigative Dashboard) X X X Predefined security policies X X X Built-in customizable compliance workflow with preset compliance accelerators (reports review, escalations, sign-offs) X X Secure and self-sustained platform (self-monitoring, internal audit, secure appliance) X X Performance Operating System based agent X X X Filtering of DB traffic X Centralized Load balancing for multi-tier architecture X Support for 64-bit architecture X Scalability Automatically adapt to changes in the data center (Grid) X Support to batch operation (GuardAPI) X Centralized Aggregation and normalization of reports and audit logos X Centralized Management for operational control X Integration Integration with IT operations X X X Integration with security systems and standards (QRadar, HP Arcsight, Radius, LDAP, etc) X X X Flexible, customizable integration platform (Universal Feed, Enterprise Integrator) X X X Table 1. Guardium Data Activity Monitor minimizes total cost of ownership, improves security and supports compliance requirements through four simple Data Activity Monitor offerings: Express, Standard, Advanced, and Central Management and Aggregation Pack.
  • 8. ­ ­ Please Recycle For more information To learn more about the Guardium, please contact your IBM representative or IBM Business Partner, or visit the following website: ibm.com/guardium Additionally, IBM Global Financing can help you acquire the IT solutions that your business needs in the most cost- effective and strategic way possible. For credit-qualified clients we can customize an IT financing solution to suit your business requirements, enable effective cash management, and improve your total cost of ownership. IBM Global Financing is your smartest choice to fund critical IT invest- ments and propel your business forward. For more information, visit: ibm.com/financing ­ ­ © Copyright IBM Corporation 2015 IBM Security Route 100 Somers, NY 10589 Produced in the United States of America July 2015 IBM, the IBM logo, ibm.com, z/OS, QRadar, PureSystems, and Guardium are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml This document is current as of the initial date of publication and may be changed by IBM at any time. IBM Business Partners set their own prices, which may vary. The performance data discussed herein is presented as derived under specific operating conditions. Actual results may vary. It is the user’s responsibility to evaluate and verify the operation of any other products or programs with IBM products and programs. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. The client is responsible for ensuring compliance with laws and regulations applicable to it. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the client is in compliance with any law or regulation. Statements regarding IBM’s future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. WGD03075-USEN-00