Implement A Proactive Strategy For Data Security:
Data security and privacy are critical business imperatives in the data economy
Last updated: 15 Sep 2014
Gartner - Competitive Landscape: Database Audit and Protection
The database audit and protection (DAP) continues to evolve, expanding beyond the database, while concepts such as big data, behavioral attack detection and comprehensive database support expand.
Last updated: 30 Mar 2014
Bloor Research: Managing data growth on System z
IBM Optim provides facilities that ensure that the data won't break and it offers a variety of mechanisms for accessing the data. In this paper, we will discuss breakage and access in more detail, and then briefly consider how IBM Optim works, particularly with respect to System z.
Last updated: 27 Aug 2013
Gartner - Apply the Nine Critical Capabilities of Database Audit and Protection
As organizations continue to increase the size and scope of databases, IT leaders are challenged to protect sensitive data, which has been condensed into many databases from different vendors. In this analyst report, Gartner Inc. has identified nine critical security capabilities that form part of a DAP solution.
Last updated: 07 Jun 2013
Control and Protect Sensitive Information in the Era of Big Data, a Forrester Research report
As big data initiatives ingest more and more data, enterprises will face significant risks and threats to the repositories in which they keep that data. Learn how to control and properly protect sensitive information that is subject to global laws and regulations.
Last updated: 23 Jul 2012
Data security strategies for next generation data warehouses
Data warehouses deliver analytics with speed and simplicity to propel you ahead of the competition in the era of big data. Critical to any big data strategy is protecting the data warehouse to ensure that the data is secure. Learn strategies to protect your data warehouse in this ebook.
Last updated: 30 Sep 2013
NoSQL does not have to mean no security
This eBook provides a basic introduction into NoSQL, the security implications for NoSQL, and how IBM InfoSphere Guardium solutions can help speed the deployment of NoSQL by breaking down the inhibitors to meeting security and compliance requirements and reducing overall risk
Last updated: 01 Sep 2013
Bridging the data security gap - Unified data protection for four key data environments
Today's IT environment is complex- big data, cloud and virtual, enterprise data, and enterprise application security. How do you protect them all? Read this e-book and learn how you can implement an effective data security and privacy solution for multiple environments.
Last updated: 17 Jun 2013
InfoSphere Guardium for Applications
Leveraging advanced dynamic data masking (DDM) technology, IBM InfoSphere Guardium for Applications masks sensitive data, protecting it from unauthorized users in accordance with an organization’s compliance mandates or security policies.
Last updated: 08 Feb 2015
InfoSphere Guardium Data Activity Monitor for Hadoop
IBM InfoSphere Guardium extends its market-leading data activity monitoring solution to Hadoop-based systems including Hive, MapReduce, HBase and HDFS to help organizations meet compliance requirements and protect sensitive data in real time.
Last updated: 27 Jun 2013
IBM InfoSphere Guardium for Greenplum
IBM InfoSphere Guardium extends its market leading data activity monitoring solution to include leading-edge platforms, such as Greenplum database, to help organizations meet compliance requirements while exploiting new innovations in data processing and analytics
Last updated: 26 Jun 2013
IBM InfoSphere Guardium Data Activity Monitor for MongoDB
IBM® InfoSphere® Guardium® addresses the fast growing class of NoSQL databases by delivering the first data monitoring and auditing solution for MongoDB to prevent data breaches and avoid compliance violations without sacrificing performance.
Last updated: 21 Jun 2013
IBM InfoSphere Guardium database activity monitoring
Organizations across the globe continue to experience compromised data caused by malicious attacks, web application vulnerabilities or unauthorized changes.
Last updated: 29 Mar 2012
A Proactive, Preventative Approach to Compliance and Security
Lower risk through a proactive approach to compliance and security. http://www.ibmsystemsmag.com, Sept. 2011.
Last updated: 09 Sep 2011
Guardium 7 – database security review, by David Mitchell, IT PRO
The Verdict: 5 Stars With database attacks on the increase Guardium can make sure businesses don’t get caught with their pants down.
Last updated: 25 Feb 2009
Network Security Against Today's Threats - Guardium 7 Product Review, by Samara Lynn, CRN ChannelWeb
Guardium’s database security may contain the most powerful compliance regulations tools that the Test Center has ever seen.
Last updated: 09 Jan 2009
Data Security for NoSQL systems with IBM InfoSphere Guardium
NoSQL data systems are making their way into the enterprise. IBM InfoSphere Guardium is a cross-platform, cross-database solution that can help speed the deployment of NoSQL by breaking down the inhibitors to meeting security and compliance requirements and reducing overall risk.
Last updated: 28 Feb 2014
Explore data masking and emerging big data masking trends with Jim Lee, IBM VP of Product Line Management
In this 20 minute podcast, Jim Lee, Vice President of Product Management, will describe the importance of data masking big data environments as well as how to build business driven masking policies to address growing privacy requirements across the enterprise.
Last updated: 24 Sep 2013
IBM InfoSphere Data Privacy for Hadoop
InfoSphere Data Privacy for Hadoop is the first solution on the market to provide exhaustive data privacy capabilities for the big data platform. It helps organizations build confidence in their data a crucial step toward realizing the promise of big data analytics by providing the data privacy.
Last updated: 10 Feb 2014
IBM InfoSphere Guardium
IBM® InfoSphere® Guardium® offers a family of integrated modules for managing the entire data security and compliance life cycle. Manage the entire data security and compliance life cycle for enterprise systems
Last updated: 01 Nov 2013
Exposing the Hidden Costs of Database Security Solutions
In this webcast, we will provide a framework to calculate the financial impact of any database security solution in in three critical areas: Staff, Hardware, and Risk Mitigation.
Last updated: 09 Jun 2013
IBM X-Force 2012 Data Breach Trend Report: Issues and Solutions webcast
Cyber attacks continue to grow in volume and sophistication — relentlessly evolving to bypass traditional IT defenses. Michael Hamelin of IBM X-Force® Advanced Research presents an in-depth analysis of recent public vulnerability disclosures and discusses important lessons learned.
Last updated: 17 May 2013
From Stuxnet to SQL Injection: HOWTO Safeguard Against the Latest Cyber-Threats
Learn about the security landscape and get the latest results from the newly-released “IBM X-Force 2010 Trend and Risk Report" in this On Demand Webcast.
Last updated: 20 Jun 2011
Top Scenarios for Real-Time Database Security & Monitoring
Insider threats, high-profile data breaches, regulatory compliance demands -- learn how Guardium can help.
Last updated: 24 Mar 2011
Streamline enterprise application upgrades with data life cycle management
Know how effective data management that includes data discovery and archiving can improve the outcome of upgrade projects, creating greater business value and higher overall success rates.
Last updated: 27 Aug 2013
Data masking everywhere-Design standard and repeatable data privacy policies across the enterprise
Mask data in real-time as it speeds across the enterprise to address emerging masking requirements in applications, reports, analytics platforms, databases, warehouses and big data environments without changes to applications or impacting performance.
Last updated: 29 Jul 2013
Understanding holistic database security: 8 steps to successfully securing enterprise data sources
This paper discusses the eight essential best practices that provide a holistic approach to safeguarding data sources and achieving compliance with key regulations, such as SOX, PCI DSS, GLBA and data protection laws.
Last updated: 08 Oct 2012
InfoSphere Guardium Data Redaction: Reconciling openness with privacy
Provide fine-grained protection for sensitive unstructured data to achieve regulatory compliance and reduce risk.
Last updated: 17 Aug 2012
IBM InfoSphere Guardium Data Encryption: Help secure and protect SAP data
This paper describes the unique challenges involved in securing SAP data. It highlights and compares the various technologies that can be used to secure SAP data along with the trade offs posed by the different approaches.
Last updated: 16 Sep 2011
HOWTO Secure and Audit Oracle 10g and 11g: Chapter 6 - Authentication
Ultimate guide for providing HOWTO information for security and audit best practices for Oracle--bridging the gap between those who install and configure security features and those who secure and audit them.
Last updated: 10 Mar 2009
HOWTO Secure and Audit Oracle 10g and 11g: Hardening the Database
Learn how to choose a hardening guideline, use a vulnerability assessment tool, create and maintain a secure configuration baseline.
Last updated: 10 Mar 2009