Guardium Fundamentals Level 1 Seller Presentation
Guardium Fundamentals Level 1 Seller Presentation
Fundamentals
Seller Presentation
Domenick DeCarlo
WW Technology Sales Enablement
[email protected]
Seller Slides in this presentation marked as
"IBM and Business Partner
References in this presentation to IBM
products, programs, or services do not
and legal
and should not be shared with clients Product release dates and/or
or anyone else outside of IBM or the capabilities referenced in this
Business Partners’ company. presentation may change at any time
Understand the
solution
– Offerings within the
portfolio
– Use case examples
– Competitive
landscape
Understand
the
opportunity
Covered in this section
– Market trends
and opportunity
– Analyst report
Hybrid cloud
environments
exacerbate key
data security Stop threats before Achieve regulatory Keep up with the
challenges for they disrupt business compliance sprawl of data
organizations
280 days
Average time to detect
(207)
and contain (73) a data
breach
Market Market opportunity Key value
opportunity
$3.9 billion Risk
– Secure and protect high-value data stores
– Identify risk and provide prompt remediation
Protection
– Protect sensitive data dynamically, on-premises and in the
cloud, from unauthorized access, theft, or changes
– Enable digital transformation by providing consistent
protection as the data environment evolves
Market landscape
Trend 1 Trend 2
As orgs grow, the rate of new data, Orgs are embracing hybrid multicloud to
applications and users being added gain agility, competitive advantage and
to the ecosystem is increasing drive their organizations forward
However However
OVERALL
LEADER
Key findings
FOLLOWER
leadership in all categories DELPHIX THALES
AXIOMATICS IBM
from last year’s report
– Market leader ORACLE
IMPERVA
DATASUNRISE SECUPI
– Product leader
AWS
– Innovation leader
Figure 1: The Overall Leadership rating for the Database and Big Data Security market segment
Understand
the client
Covered in this section
– Who are the buyers
and influences their
specific pain points
– Conversation starters
Buyers
Buyer They want to secure IBM is a perennial market IBM Security™ Guardium®
CISO, CIO, their sensitive or regulated leader that can help any helps organizations achieve
VP of Security and IT, data and meet compliance size businesses transform their data security and
Line-of-business manager with regulations the way they support compliance goals through
users, apps, content, and its broad portfolio of robust
data across essentially encryption, data activity
Influencer
every type of device with monitoring, data threat
CDO, CRO, CPO
ease and affordability analysis, and compliance
Line-of-business owners
reporting tools
Database administrators
Data security analysts
Identifying a Guardium
portfolio opportunity
Discovery questions
Regulatory compliance
Conversation starters
– How are you meeting challenges around long-term data storage
requirements for compliance mandates, such as the General
Data Protection Regulation (GDPR), Health Insurance Portability
and Accountability Act (HIPAA) or Sarbanes-Oxley (SOX)?
Conversation starters
Conversation starters
– What are the main challenges or business drivers you’re
trying to solve in sensitive data discovery and classification?
Conversation starters
– How are you using data encryption today? Do you use
native encryption options? What is your strategy for
protecting data-at-rest?
– Guardium offering
descriptions
– Pricing
– Use cases
IBM Guardium portfolio
IBM Guardium Data Protection IBM Guardium Data Security Center
Real-time data activity monitoring, Powerful data security platform with common
IBM Guardium offers protection, compliance reporting shared services and integration between modules
a comprehensive
portfolio to protect IBM Guardium Data Protection IBM Guardium Data compliance
data across its
lifecycle IBM Guardium Vulnerability Assessment IBM Guardium DDR (Data Detection and Response)
Shared experiences
Shared experiences bring
intelligence and workflows
together across modules:
– Sharing data, events and
insights between modules
– Contributing and consuming
data, events and insights
between modules and the
platform
Guardium Data Security Center
$4.88M
GCP. response. Generative AI assistant to
streamline risk
Detection SOC integration Average cost of a data investigation (case
Use AI and configurable Pushing just the actionable summarization, translation
breach, up 9.2% from
rules to identify threats, intelligence into your SOC 20231 of SQL statements into
from singular events to
reduces noise, analyst natural language), SOC
complex orchestrated
attacks, while reducing response times and costs integration
noise. for SIEM and SOAR
licenses.
Guardium Data Security Center
Vulnerabilities
Remediation 1 in 3 Rapidly find shadow data
in structured and
Use automated tools like breaches found to involve unstructured cloud data,
Highlight risks like open S3 Terraform and console SaaS, and
elements of shadow data1
buckets, regulated data in
scripts that give you ready- DBaaS environments; gain
insecure log files or third
to-execute fixes for many visibility into actual data
parties with access to PII,
and raise them for action. types of vulnerabilities. flow; and detect
vulnerabilities
such as data leakage and
third-party risks.
Guardium Data Security Center
Guardium AI Security
Protect AI data, models and applications
across many deployment platforms
76%
Drill down and monitor Govern with watsonx Discover shadow AI models
Analyze training data, Import discovered AI into in cloud, map
understand classification watsonx.governance to of current Gen AI projects vulnerabilities to OWASP
and sensitivities, and Top 10 for LLMs and govern
fully manage the lifecycle are not secured 1
monitor ongoing access
of the model, including with watsonx.governance.
and entitlements to data
that’s supporting AI bias, drift, tolerance and
models. more.
Guardium Data Security Center
Cloud key
management File and
CipherTrust database
CM
Manager encryption
Batch data
transformation
Teradata Application
Guardium for encryption encryption
tokenization
Guardium portfolio
Sample
scenario
Automatically Review suggested Adjust policies
open a case remediation based on and
for predetermine business configurations
investigation risk as needed
Incident of Review correlated data Remediate risk in a cross- Deliver reports and
compromise activity and user team collaborative dashboard views,
access manner, sharing case and store audit and
to compromised data information compliance data
Use Case Benefits Challenges Solutions
Sample
scenario
Detect data, Track consent
understand its and other data
history, and tag subject
appropriately requests
Sample
scenario
Database is located, along Data is de-
with risk and compliance identified for safe
context about the data sharing and
limiting risk
Client-Managed
IBM IBM
(on-prem) Guardium Guardium
Software Data Vulnerability
Package Protection Assessment
SaaS only SaaS only
1 Orderable
Package
RUs can be used Legend
across all Guardium Data Security Center
capabilities modules
SaaS Package Available for hybrid delivery via single
1 Orderable UI, common services, shared
Package experiences
RUs can be used coming soon Try before you buy available
across all Guardium portfolio products
capabilities
Available as stand-alone installation
General Availability: Nov 13, 2024 RUs compatible with client-managed
(on-prem software) package only
Guardium Pricing and packaging
Data Security Available via 2 deployment models:
Center pricing • client-managed software
• software as a service (SaaS)
model
– Simplifies the purchase process
Guardium Data Security Center is a platform that secures and protects
– Protects the client investment as on-premise and cloud data sources. Pricing is based on the number of
data sources that we will be protecting (called assets).
workloads and IT infrastructure shift to
cloud
Single part number includes access to all the modules and products in
– Enables flexible adoption of capabilities each deployment model:
based on use cases • Guardium Data Compliance
• Guardium DDR
• Guardium Quantum Safe
• Guardium AI Security
• Guardium DSPM
• Guardium Data Protection
• Guardium Vulnerability Assessment
RU Calculator on Seismic –
link
Step 1
Guardium Data Module / Product RU Ratio
Monthly
Perpet Subscrip
Client use case Resourc Client Environment ual tion
(module/product) e metric Ratio Size Total RU License License
Prices in USD and are for reference only; please use IBM Quoting tools for latest pricing
RU Calculator on Seismic –
link
Step 1
Guardium Data Module RU Ratio
100 deployed AI
Guardium AI Security Asset 400 46000
models
– Per unit pricing for GDE is built into the SASC tool
Strength A modern, comprehensive data security Fairly comprehensive portfolio and can support Embedded into the data sources from their
suite to support the entire end-to-end agentless deployment via jSonar respective vendors, immediately
data security lifecycle compatible
Weakness Often a lengthy deployment depending Made up of point solutions that do not interoperate Gives fragmented visibility as monitoring
on the solutions selected by the client well. tools for Azure cannot monitor AWS.
Often requires clients to learn specialized coding Similarly, these tools typically just generate
languages log data that data security teams then
to create reports and integrate with other tools need to analyze themselves
How we win Highlight ease of use, automation for Highlight the fact that even with one vendor it creates Guardium can centralize data security and
compliance policy and audit reporting, new siloes and requires additional time and resources normalize datasets across sources, saving
advanced analytics, security and IT to support something as simple as compliance time and enriching analysis. Guardium Data
integration, depth of data protection reporting Protection also partners with AWS to
support security in AWS cloud
1. Containerized, modernized architecture allows us to tell an effective hybrid multicloud deployment, scaling, and maintenance story. New offerings available as Software
as a Service (SaaS).
3. Agent-based and agentless support for major data sources natively and streaming support for any data source through Guardium Universal Connector
Common objections
You don’t really need agents for data security: One-size fits all and Flexibility is essential when it comes to monitoring, and it’s
agentless monitoring is sufficient important
to understand your use cases before selecting a monitoring
mechanism. You should go with the vendor that provides the
Guardium doesn’t really provide support for agentless monitoring most choice
Guardium has been providing an array of monitoring options for
years – from agentless API streaming advanced agents. In 2020,
we introduced the Universal Connector Framework to help support
agentless monitoring for more sources
Guardium is complex to set up and difficult to use Guardium introduced a new GUI that allows for easy operations and
automated deployments and upgrades with Guardium Install
Manager
Guardium perpetual licenses are too expensive versus Only IBM offers perpetual licenses; a better value for long-term
Imperva low-cost term license project like data monitoring
Guardium’s architecture is overly complicated – you don’t Guardium Data Security Center’s modernized architecture
need that much flexibility allows clients the flexibility to deploy on premise or in public or
private clouds – and to shift as their needs change
Guardium Data Security Center has barely been in market. It’s IBM is investing heavily in data security. Guardium Data Security
immature and can’t compete with jSonar’s maturity who has been Center provides a fully functional data security hub today in
in the market for 5 years which clients can retain data, create reports in seconds, perform
advanced analytics, deliver risk-based scoring, and more
IBM Security Guardium
differentiators
Key assets
Data Security Homepage on Seismic
Analyst Reports
2023 Forrester Total Economic Impact Report