100% found this document useful (1 vote)
241 views2 pages

IBM Security Guardium Is A Comprehensive Data Security Platform That Provides A Full Range of Capabilities

IBM Security Guardium is a comprehensive data security platform that provides capabilities like discovery and classification of sensitive data, vulnerability assessment, and data activity monitoring to protect sensitive data across databases, big data, cloud, and file systems. Guardium monitors activities like SQL errors, logins, database queries, commands, and XML execution. It uses non-invasive host-based probes to provide real-time database monitoring with minimal performance impact. Guardium helps secure data and meet compliance needs across different environments and standards.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
241 views2 pages

IBM Security Guardium Is A Comprehensive Data Security Platform That Provides A Full Range of Capabilities

IBM Security Guardium is a comprehensive data security platform that provides capabilities like discovery and classification of sensitive data, vulnerability assessment, and data activity monitoring to protect sensitive data across databases, big data, cloud, and file systems. Guardium monitors activities like SQL errors, logins, database queries, commands, and XML execution. It uses non-invasive host-based probes to provide real-time database monitoring with minimal performance impact. Guardium helps secure data and meet compliance needs across different environments and standards.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

IBM Security Guardium is a comprehensive data security platform that provides a full range of

capabilities – from discovery and classification of sensitive data to vulnerability assessment to


data and file activity monitoring to masking, encryption, blocking, alerting and quarantining to
protect sensitive data. Guardium helps secure sensitive data across a full range of
environments – from databases to big data, cloud, file systems and more. Guardium also
provides automated analysis to quickly uncover internal and external risks to sensitive data

What does Guardium monitor?

 SQL Errors and failed logins


 DDL commands (Create/Drop/Alter Tables)
 SELECT queries
 DML commands (Insert, Update, Delete)
 DCL commands (Grant, Revoke)
 Procedural languages
 XML executed by database
 Returned results sets

Real-Time Database Monitoring with InfoSphere Guardium Host-based Probes (S-TAPs)


Collector

 Non-invasive architecture
 Outside database
 Minimal performance impact (2-3)
 No DBMS or application changes
 Cross-DBMS solution
 100 visibility including local DBA access

 Enforces separation of duties


 Does not rely on DBMS-resident logs that can
easily be erased by attackers, rogue insiders
 Granular, real-time policies auditing
 Who, what, when, how
 Automated compliance reporting, sign-offs
escalations (SOX, PCI, NIST, etc.)

How are most databases audited today?

 Reliance on native audit logs within DBMS


 Lacks visibility and granularity
 Privileged users difficult to monitor
 Tracing the real user of application is
difficult
 Level of audit detail is insufficient
 Inefficient and costly
 Impacts database performance
 Large log files provide little value
 Different methods for each DB type
 No segregation of duties
 DBAs manage monitoring system
 Privileged users can bypass the system
 Audit trail is unsecured

The Compliance Mandate

DDL Data Definition Language (aka schema


changes) DML Data Manipulation Language (data
value changes) DCL Data Control Language
Database Activity Monitoring Three Key Business Drivers

 Prevent data breaches


 Mitigate external and internal threats
 Ensure data integrity
 Prevent unauthorized changes to sensitive data
 Reduce cost of compliance
 Automate and centralize controls
 Across DBMS platforms and applications
 Across SOX, PCI, SAS70,
 Simplify processes

You might also like