Skip to main content

InfoSphere Guardium Data Security Library

Analyst reports 

Gartner - Competitive Landscape: Database Audit and Protection

The database audit and protection (DAP) continues to evolve, expanding beyond the database, while concepts such as big data, behavioral attack detection and comprehensive database support expand.

Last updated: 30 Mar 2014


Gartner - Magic Quadrant for Data Masking Technology

IBM InfoSphere Optim is a leader in Gartner Inc's Magic Quadrant for Data Masking Technology. InfoSphere Optim received the best ranking in the ability to execute and completeness of vision categories compared to competitors

Last updated: 02 Jan 2014


Bloor Research: Managing data growth on System z

IBM Optim provides facilities that ensure that the data won't break and it offers a variety of mechanisms for accessing the data. In this paper, we will discuss breakage and access in more detail, and then briefly consider how IBM Optim works, particularly with respect to System z.

Last updated: 27 Aug 2013


Gartner - Apply the Nine Critical Capabilities of Database Audit and Protection

As organizations continue to increase the size and scope of databases, IT leaders are challenged to protect sensitive data, which has been condensed into many databases from different vendors. In this analyst report, Gartner Inc. has identified nine critical security capabilities that form part of a DAP solution.

Last updated: 07 Jun 2013


IBM X-Force 2012 Annual Trend and Risk Report

This document analyzes and explores security threats including vulnerabilities, malware, spam, phishing, and more.

Last updated: 30 Apr 2013


Hardening A Teradata Database: Best practices for access rights management

This joint IBM - Teradata white paper identifies the best practices for database access rights management and introduces the IBM InfoSphere Guardium Vulnerability Assessment.

Last updated: 26 Mar 2013


Current Analysis: Exposing the hidden costs of database security solutions

Organizations evaluating database security solutions must delve deeper than the upfront costs to meet compliance requirements and support new environments, like cloud and big data. Evaluating hidden costs and implementing best-in-class solutions delivers a much lower cost of ownership.

Last updated: 07 Feb 2013


Control and Protect Sensitive Information in the Era of Big Data, a Forrester Research report

As big data initiatives ingest more and more data, enterprises will face significant risks and threats to the repositories in which they keep that data. Learn how to control and properly protect sensitive information that is subject to global laws and regulations.

Last updated: 23 Jul 2012


Gartner: Database Activities You Should Be Monitoring

Gartner has compiled a list of 10 critical database activities and behaviors — segmented by four user profiles — that enterprises should be monitoring and auditing now

Last updated: 10 Mar 2012


2012 Business Case for Data Protection: What Senior Executives Think about Data Protection

Data breaches and attacks on sensitive and confidential information are making data protection a critical component of an organization’s leadership and governance strategy. The 2012 Business Case for Data Protection Ponemon study investigates what senior executives think about data protection.

Last updated: 16 Feb 2012


Look beyond database auditing to improve security, audit visibility and real time protection

Enterprise Database Auditing Solutions Offer The Best Option To Secure Databases And Save Time And Money

Last updated: 20 Jan 2011

Announcement letters 

IBM InfoSphere Guardium V9.0

Deliver real-time activity monitoring and automated compliance reporting for Big Data security

Last updated: 10 Sep 2012

Books 

Data security strategies for next generation data warehouses

Data warehouses deliver analytics with speed and simplicity to propel you ahead of the competition in the era of big data. Critical to any big data strategy is protecting the data warehouse to ensure that the data is secure. Learn strategies to protect your data warehouse in this ebook.

Last updated: 30 Sep 2013


NoSQL does not have to mean no security

This eBook provides a basic introduction into NoSQL, the security implications for NoSQL, and how IBM InfoSphere Guardium solutions can help speed the deployment of NoSQL by breaking down the inhibitors to meeting security and compliance requirements and reducing overall risk

Last updated: 01 Sep 2013


Bridging the data security gap - Unified data protection for four key data environments

Today's IT environment is complex- big data, cloud and virtual, enterprise data, and enterprise application security. How do you protect them all? Read this e-book and learn how you can implement an effective data security and privacy solution for multiple environments.

Last updated: 17 Jun 2013


Planning a data security and auditing deployment for Hadoop eBook

As volumes of data including 'sensitive data' move to Hadoop big data environments, the relative lack of controls makes it an attractive target. Read how IBM InfoSphere Guardium data activity monitoring and auditing solutions help to protect against breaches and unauthorized access.

Last updated: 18 Jan 2013


Top 3 Myths about Big Data Security eBook

Data volumes are growing rapidly with no end in sight. Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are they protecting that data? This eBook addresses three myths of big data security.

Last updated: 24 Oct 2012


Top tips for securing big data environments

Big data environments create significant opportunities along with security challenges. There are risks and threats to the repositories containing data, much of which is financial, personal, intellectual property or sensitive data and subject to compliance regulations. Learn tips on how to secure big data environments.

Last updated: 09 Oct 2012

Brochures 

Protect your SAP data environment with IBM InfoSphere Guardium

Learn how IBM® InfoSphere® Guardium® solutions secure SAP database environments and help your organization monitor user activity to detect and respond to fraud, without causing a large-scale disruption of IT operations.

Last updated: 01 Mar 2013

Data sheets 

InfoSphere Guardium Data Activity Monitor for Hadoop

IBM InfoSphere Guardium extends its market-leading data activity monitoring solution to Hadoop-based systems including Hive, MapReduce, HBase and HDFS to help organizations meet compliance requirements and protect sensitive data in real time.

Last updated: 27 Jun 2013


IBM InfoSphere Guardium for Greenplum

IBM InfoSphere Guardium extends its market leading data activity monitoring solution to include leading-edge platforms, such as Greenplum database, to help organizations meet compliance requirements while exploiting new innovations in data processing and analytics

Last updated: 26 Jun 2013


IBM InfoSphere Guardium Data Activity Monitor for MongoDB

IBM® InfoSphere® Guardium® addresses the fast growing class of NoSQL databases by delivering the first data monitoring and auditing solution for MongoDB to prevent data breaches and avoid compliance violations without sacrificing performance.

Last updated: 21 Jun 2013


IBM InfoSphere Guardium Appliances

IBM xSeries-based x2000 InfoSphere Guardium Appliances provide outstanding performance for all InfoSphere Guardium applications. Read how Guardium Appliances can help boost performance, improve scalability, and reduce costs.

Last updated: 08 May 2013


IBM InfoSphere Guardium for federal information systems

Escalating threats to federal information systems have most agencies moving aggressively to protect data and meet compliance requirements. InfoSphere Guardium Data Activity Monitor is a simple,scalable solution for centralizing and automating the controls needed to protect sensitive data.

Last updated: 08 May 2013


IBM InfoSphere Guardium Data Activity Monitor

Continuously monitor data access and protect sensitive data across the enterprise with IBM InfoSphere Guardium Data Activity Monitor—a robust solution for assuring the security and integrity of data in heterogeneous environments such as databases, data warehouses, file shares and big data platforms.

Last updated: 25 Apr 2013


IBM InfoSphere Guardium Vulnerability Assessment

IBM InfoSphere® Guardium® Vulnerability Assessment helps harden database infrastructures. It detects vulnerabilities and identifies threats and security holes in databases or the underlying operating system which could be exploited by intruders and hackers to gain access to sensitive data.

Last updated: 17 Apr 2013


IBM InfoSphere Guardium for z/OS

The IBM InfoSphere Guardium data security solution helps to lower the costs and risks of compliance, security and audit — using proven z/OS technology. It offers a simple, yet powerful, means of securing critical data throughout the enterprise.

Last updated: 21 Jan 2013


IBM® InfoSphere™ Guardium® Data Redaction

How secure is your sensitive information?

Last updated: 17 Aug 2012

Demos 

IBM InfoSphere Guardium database activity monitoring

Organizations across the globe continue to experience compromised data caused by malicious attacks, web application vulnerabilities or unauthorized changes.

Last updated: 29 Mar 2012

Magazines 

A Proactive, Preventative Approach to Compliance and Security

Lower risk through a proactive approach to compliance and security. http://www.ibmsystemsmag.com, Sept. 2011.

Last updated: 09 Sep 2011


Guardium 7 – database security review, by David Mitchell, IT PRO

The Verdict: 5 Stars With database attacks on the increase Guardium can make sure businesses don’t get caught with their pants down.

Last updated: 25 Feb 2009


Network Security Against Today's Threats - Guardium 7 Product Review, by Samara Lynn, CRN ChannelWeb

Guardium’s database security may contain the most powerful compliance regulations tools that the Test Center has ever seen.

Last updated: 09 Jan 2009

Podcasts 

Data Security for NoSQL systems with IBM InfoSphere Guardium

NoSQL data systems are making their way into the enterprise. IBM InfoSphere Guardium is a cross-platform, cross-database solution that can help speed the deployment of NoSQL by breaking down the inhibitors to meeting security and compliance requirements and reducing overall risk.

Last updated: 28 Feb 2014


Explore data masking and emerging big data masking trends with Jim Lee, IBM VP of Product Line Management

In this 20 minute podcast, Jim Lee, Vice President of Product Management, will describe the importance of data masking big data environments as well as how to build business driven masking policies to address growing privacy requirements across the enterprise.

Last updated: 24 Sep 2013


Managing the lifecycle of your JD Edwards applications and data with Cynthia Babb, WW Product Marketing, IBM Software Group

This year, a significant number of JD Edward users are facing loss of support from Oracle. That means an upgrade and/or a migration. In this podcast, we will explore these challenges and the best practices JD Edwards users should implement to address them.

Last updated: 21 May 2013


Building security into big data podcast

Big data environments allow organizations to aggregate and share multitudes of data — much of which is sensitive data that must be protected. Listen to this podcast and learn how to build security and privacy into your big data platform using three key foundational pillars.

Last updated: 11 Mar 2013


Assess the Security of Your Database Environment

IBM InfoSphere Guardium Database Vulnerability Assessment provides ongoing evaluation of database security configurations. Learn how Guardium Database Vulnerability Assessment software performs security assessments, helps with compliance, and protects against data breaches.

Last updated: 09 Mar 2013


One Step Closer to Making Data Breaches a Thing of the Past

Databases contain some of an organization’s most valuable assets and have become the primary target of attacks. This podcast discusses how to prevent hacking or theft of your data that is stored on DB2 for z/OS and other database platforms with IBM InfoSphere Guardium.

Last updated: 28 Jan 2013


Ensure PCI DSS Compliance with Real-Time Database Security & Monitoring

Financial organizations struggle with PCI DSS compliance, especially with the requirements to “track and monitor” and “protect cardholder data.” IBM InfoSphere Guardium can help assure payment card industry data security standard compliance with real-time database security and monitoring.

Last updated: 25 Jan 2013


How to apply InfoSphere Guardium to the Big Data world

Ron Ben Natan discusses how you can apply IBM InfoSphere Guardium to the world of big data, specifically to Hadoop environments.

Last updated: 25 Oct 2012


Introducing Guardium V9 podcast

IBM InfoSphere Guardium V9 protects sensitive data and ensures compliance in unstructured Hadoop big data environments and expands integration and automation to further reduce total cost of ownership in large enterprises.

Last updated: 09 Oct 2012


Top tips for securing big data podcast

Organizations are generating more data now compared to any other point in history, yet they don’t fully understand how to protect it.

Last updated: 09 Oct 2012


Who is watching big data? Monitor and secure data streams

In this audio podcast, learn the key challenges of securing sensitive information in big data environments where volume, velocity and variety of data must be monitored, protected and analyzed while streaming across the enterprise.

Last updated: 09 Oct 2012


InfoSphere Guardium Data Redaction v2.5

In this podcast, learn about the new capabilities of IBM® InfoSphere® Guardium® Data Redaction for safeguarding and removing sensitive information contained in documents, forms, spreadsheets, images and other unstructured data sources while facilitating information sharing for business use.

Last updated: 01 Oct 2012

Solution sheets 

IBM InfoSphere Data Privacy for Hadoop

InfoSphere Data Privacy for Hadoop is the first solution on the market to provide exhaustive data privacy capabilities for the big data platform. It helps organizations build confidence in their data a crucial step toward realizing the promise of big data analytics by providing the data privacy.

Last updated: 10 Feb 2014


IBM InfoSphere Guardium

IBM® InfoSphere® Guardium® offers a family of integrated modules for managing the entire data security and compliance life cycle. Manage the entire data security and compliance life cycle for enterprise systems

Last updated: 01 Nov 2013


Improve Your Data Security and Compliance Strategy

A holistic approach to data protection

Last updated: 19 Oct 2012

Videos 

IBM InfoSphere Guardium for big data

Meet big data security challenges with IBM InfoSphere Guardium

Last updated: 16 Jan 2013

Webcasts 

Exposing the Hidden Costs of Database Security Solutions

In this webcast, we will provide a framework to calculate the financial impact of any database security solution in in three critical areas: Staff, Hardware, and Risk Mitigation.

Last updated: 09 Jun 2013


IBM X-Force 2012 Data Breach Trend Report: Issues and Solutions webcast

Cyber attacks continue to grow in volume and sophistication — relentlessly evolving to bypass traditional IT defenses. Michael Hamelin of IBM X-Force® Advanced Research presents an in-depth analysis of recent public vulnerability disclosures and discusses important lessons learned.

Last updated: 17 May 2013


From Stuxnet to SQL Injection: HOWTO Safeguard Against the Latest Cyber-Threats

Learn about the security landscape and get the latest results from the newly-released “IBM X-Force 2010 Trend and Risk Report" in this On Demand Webcast.

Last updated: 20 Jun 2011


Top Scenarios for Real-Time Database Security & Monitoring

Insider threats, high-profile data breaches, regulatory compliance demands -- learn how Guardium can help.

Last updated: 24 Mar 2011

White papers 

Streamline enterprise application upgrades with data life cycle management

Know how effective data management that includes data discovery and archiving can improve the outcome of upgrade projects, creating greater business value and higher overall success rates.

Last updated: 27 Aug 2013


Data masking everywhere-Design standard and repeatable data privacy policies across the enterprise

Mask data in real-time as it speeds across the enterprise to address emerging masking requirements in applications, reports, analytics platforms, databases, warehouses and big data environments without changes to applications or impacting performance.

Last updated: 29 Jul 2013


Protecting your critical data with integrated security intelligence

Extend security intelligence with data security insights. Combine the IBM QRadar Security Intelligence Platform with the robust data security capabilities of IBM InfoSphere Guardium to prevent attacks, ensure compliance and reduce the overall costs of security management.

Last updated: 08 May 2013


Three guiding principles to improve data security and compliance

The information explosion, growing user volumes and emerging sophisticated threats require a more proactive and systematic approach to data security. Read how three guiding principles can help organizations protect data (no matter where it resides) and meet compliance mandates with confidence.

Last updated: 19 Oct 2012


Understanding holistic database security: 8 steps to successfully securing enterprise data sources

This paper discusses the eight essential best practices that provide a holistic approach to safeguarding data sources and achieving compliance with key regulations, such as SOX, PCI DSS, GLBA and data protection laws.

Last updated: 08 Oct 2012


InfoSphere Guardium Data Redaction: Reconciling openness with privacy

Provide fine-grained protection for sensitive unstructured data to achieve regulatory compliance and reduce risk.

Last updated: 17 Aug 2012


Implementing Database Security and Auditing: Chapter 4 - Authentication and Password Security

Learn best practices and techniques involving authentication and user account management, password strength and password profiles, as well as user account/password maintenance.

Last updated: 04 Nov 2011


IBM InfoSphere Guardium Data Encryption: Help secure and protect SAP data

This paper describes the unique challenges involved in securing SAP data. It highlights and compares the various technologies that can be used to secure SAP data along with the trade offs posed by the different approaches.

Last updated: 16 Sep 2011


HOWTO Secure and Audit Oracle 10g and 11g: Chapter 6 - Authentication

Ultimate guide for providing HOWTO information for security and audit best practices for Oracle--bridging the gap between those who install and configure security features and those who secure and audit them.

Last updated: 10 Mar 2009


HOWTO Secure and Audit Oracle 10g and 11g: Hardening the Database

Learn how to choose a hardening guideline, use a vulnerability assessment tool, create and maintain a secure configuration baseline.

Last updated: 10 Mar 2009