Skip to main content

InfoSphere Guardium Data Security Library

Analyst reports 

Implement A Proactive Strategy For Data Security:

Data security and privacy are critical business imperatives in the data economy

Last updated: 15 Sep 2014

Bloor Research: Managing data growth on System z

IBM Optim provides facilities that ensure that the data won't break and it offers a variety of mechanisms for accessing the data. In this paper, we will discuss breakage and access in more detail, and then briefly consider how IBM Optim works, particularly with respect to System z.

Last updated: 27 Aug 2013

Gartner - Apply the Nine Critical Capabilities of Database Audit and Protection

As organizations continue to increase the size and scope of databases, IT leaders are challenged to protect sensitive data, which has been condensed into many databases from different vendors. In this analyst report, Gartner Inc. has identified nine critical security capabilities that form part of a DAP solution.

Last updated: 07 Jun 2013

Control and Protect Sensitive Information in the Era of Big Data, a Forrester Research report

As big data initiatives ingest more and more data, enterprises will face significant risks and threats to the repositories in which they keep that data. Learn how to control and properly protect sensitive information that is subject to global laws and regulations.

Last updated: 23 Jul 2012

Data sheets 

InfoSphere Guardium for Applications

Leveraging advanced dynamic data masking (DDM) technology, IBM InfoSphere Guardium for Applications masks sensitive data, protecting it from unauthorized users in accordance with an organization’s compliance mandates or security policies.

Last updated: 08 Feb 2015


IBM InfoSphere Guardium database activity monitoring

Organizations across the globe continue to experience compromised data caused by malicious attacks, web application vulnerabilities or unauthorized changes.

Last updated: 29 Mar 2012

Solution sheets 

IBM InfoSphere Data Privacy for Hadoop

InfoSphere Data Privacy for Hadoop is the first solution on the market to provide exhaustive data privacy capabilities for the big data platform. It helps organizations build confidence in their data a crucial step toward realizing the promise of big data analytics by providing the data privacy.

Last updated: 10 Feb 2014


Exposing the Hidden Costs of Database Security Solutions

In this webcast, we will provide a framework to calculate the financial impact of any database security solution in in three critical areas: Staff, Hardware, and Risk Mitigation.

Last updated: 09 Jun 2013

IBM X-Force 2012 Data Breach Trend Report: Issues and Solutions webcast

Cyber attacks continue to grow in volume and sophistication — relentlessly evolving to bypass traditional IT defenses. Michael Hamelin of IBM X-Force® Advanced Research presents an in-depth analysis of recent public vulnerability disclosures and discusses important lessons learned.

Last updated: 17 May 2013

From Stuxnet to SQL Injection: HOWTO Safeguard Against the Latest Cyber-Threats

Learn about the security landscape and get the latest results from the newly-released “IBM X-Force 2010 Trend and Risk Report" in this On Demand Webcast.

Last updated: 20 Jun 2011

Top Scenarios for Real-Time Database Security & Monitoring

Insider threats, high-profile data breaches, regulatory compliance demands -- learn how Guardium can help.

Last updated: 24 Mar 2011

White papers 

Understanding holistic database security: 8 steps to successfully securing enterprise data sources

This paper discusses the eight essential best practices that provide a holistic approach to safeguarding data sources and achieving compliance with key regulations, such as SOX, PCI DSS, GLBA and data protection laws.

Last updated: 08 Oct 2012

InfoSphere Guardium Data Redaction: Reconciling openness with privacy

Provide fine-grained protection for sensitive unstructured data to achieve regulatory compliance and reduce risk.

Last updated: 17 Aug 2012

HOWTO Secure and Audit Oracle 10g and 11g: Chapter 6 - Authentication

Ultimate guide for providing HOWTO information for security and audit best practices for Oracle--bridging the gap between those who install and configure security features and those who secure and audit them.

Last updated: 10 Mar 2009

HOWTO Secure and Audit Oracle 10g and 11g: Hardening the Database

Learn how to choose a hardening guideline, use a vulnerability assessment tool, create and maintain a secure configuration baseline.

Last updated: 10 Mar 2009