Gartner - Competitive Landscape: Database Audit and Protection
The database audit and protection (DAP) continues to evolve, expanding beyond the database, while concepts such as big data, behavioral attack detection and comprehensive database support expand.
Last updated: 30 Mar 2014
Gartner - Magic Quadrant for Data Masking Technology
IBM InfoSphere Optim is a leader in Gartner Inc's Magic Quadrant for Data Masking Technology. InfoSphere Optim received the best ranking in the ability to execute and completeness of vision categories compared to competitors
Last updated: 02 Jan 2014
Bloor Research: Managing data growth on System z
IBM Optim provides facilities that ensure that the data won't break and it offers a variety of mechanisms for accessing the data. In this paper, we will discuss breakage and access in more detail, and then briefly consider how IBM Optim works, particularly with respect to System z.
Last updated: 27 Aug 2013
Gartner - Apply the Nine Critical Capabilities of Database Audit and Protection
As organizations continue to increase the size and scope of databases, IT leaders are challenged to protect sensitive data, which has been condensed into many databases from different vendors. In this analyst report, Gartner Inc. has identified nine critical security capabilities that form part of a DAP solution.
Last updated: 07 Jun 2013
IBM X-Force 2012 Annual Trend and Risk Report
This document analyzes and explores security threats including vulnerabilities, malware, spam, phishing, and more.
Last updated: 30 Apr 2013
Hardening A Teradata Database: Best practices for access rights management
This joint IBM - Teradata white paper identifies the best practices for database access rights management and introduces the IBM InfoSphere Guardium Vulnerability Assessment.
Last updated: 26 Mar 2013
Current Analysis: Exposing the hidden costs of database security solutions
Organizations evaluating database security solutions must delve deeper than the upfront costs to meet compliance requirements and support new environments, like cloud and big data. Evaluating hidden costs and implementing best-in-class solutions delivers a much lower cost of ownership.
Last updated: 07 Feb 2013
Control and Protect Sensitive Information in the Era of Big Data, a Forrester Research report
As big data initiatives ingest more and more data, enterprises will face significant risks and threats to the repositories in which they keep that data. Learn how to control and properly protect sensitive information that is subject to global laws and regulations.
Last updated: 23 Jul 2012
Gartner: Database Activities You Should Be Monitoring
Gartner has compiled a list of 10 critical database activities and behaviors — segmented by four user profiles — that enterprises should be monitoring and auditing now
Last updated: 10 Mar 2012
IBM InfoSphere Guardium V9.0
Deliver real-time activity monitoring and automated compliance reporting for Big Data security
Last updated: 10 Sep 2012
Data security strategies for next generation data warehouses
Data warehouses deliver analytics with speed and simplicity to propel you ahead of the competition in the era of big data. Critical to any big data strategy is protecting the data warehouse to ensure that the data is secure. Learn strategies to protect your data warehouse in this ebook.
Last updated: 30 Sep 2013
NoSQL does not have to mean no security
This eBook provides a basic introduction into NoSQL, the security implications for NoSQL, and how IBM InfoSphere Guardium solutions can help speed the deployment of NoSQL by breaking down the inhibitors to meeting security and compliance requirements and reducing overall risk
Last updated: 01 Sep 2013
Bridging the data security gap - Unified data protection for four key data environments
Today's IT environment is complex- big data, cloud and virtual, enterprise data, and enterprise application security. How do you protect them all? Read this e-book and learn how you can implement an effective data security and privacy solution for multiple environments.
Last updated: 17 Jun 2013
Planning a data security and auditing deployment for Hadoop eBook
As volumes of data including 'sensitive data' move to Hadoop big data environments, the relative lack of controls makes it an attractive target. Read how IBM InfoSphere Guardium data activity monitoring and auditing solutions help to protect against breaches and unauthorized access.
Last updated: 18 Jan 2013
Protect your SAP data environment with IBM InfoSphere Guardium
Learn how IBM® InfoSphere® Guardium® solutions secure SAP database environments and help your organization monitor user activity to detect and respond to fraud, without causing a large-scale disruption of IT operations.
Last updated: 01 Mar 2013
InfoSphere Guardium Data Activity Monitor for Hadoop
IBM InfoSphere Guardium extends its market-leading data activity monitoring solution to Hadoop-based systems including Hive, MapReduce, HBase and HDFS to help organizations meet compliance requirements and protect sensitive data in real time.
Last updated: 27 Jun 2013
IBM InfoSphere Guardium for Greenplum
IBM InfoSphere Guardium extends its market leading data activity monitoring solution to include leading-edge platforms, such as Greenplum database, to help organizations meet compliance requirements while exploiting new innovations in data processing and analytics
Last updated: 26 Jun 2013
IBM InfoSphere Guardium Data Activity Monitor for MongoDB
IBM® InfoSphere® Guardium® addresses the fast growing class of NoSQL databases by delivering the first data monitoring and auditing solution for MongoDB to prevent data breaches and avoid compliance violations without sacrificing performance.
Last updated: 21 Jun 2013
IBM InfoSphere Guardium Appliances
IBM xSeries-based x2000 InfoSphere Guardium Appliances provide outstanding performance for all InfoSphere Guardium applications. Read how Guardium Appliances can help boost performance, improve scalability, and reduce costs.
Last updated: 08 May 2013
IBM InfoSphere Guardium for federal information systems
Escalating threats to federal information systems have most agencies moving aggressively to protect data and meet compliance requirements. InfoSphere Guardium Data Activity Monitor is a simple,scalable solution for centralizing and automating the controls needed to protect sensitive data.
Last updated: 08 May 2013
IBM InfoSphere Guardium Data Activity Monitor
Continuously monitor data access and protect sensitive data across the enterprise with IBM InfoSphere Guardium Data Activity Monitor—a robust solution for assuring the security and integrity of data in heterogeneous environments such as databases, data warehouses, file shares and big data platforms.
Last updated: 25 Apr 2013
IBM InfoSphere Guardium Vulnerability Assessment
IBM InfoSphere® Guardium® Vulnerability Assessment helps harden database infrastructures. It detects vulnerabilities and identifies threats and security holes in databases or the underlying operating system which could be exploited by intruders and hackers to gain access to sensitive data.
Last updated: 17 Apr 2013
IBM InfoSphere Guardium for z/OS
The IBM InfoSphere Guardium data security solution helps to lower the costs and risks of compliance, security and audit — using proven z/OS technology. It offers a simple, yet powerful, means of securing critical data throughout the enterprise.
Last updated: 21 Jan 2013
IBM InfoSphere Guardium database activity monitoring
Organizations across the globe continue to experience compromised data caused by malicious attacks, web application vulnerabilities or unauthorized changes.
Last updated: 29 Mar 2012
A Proactive, Preventative Approach to Compliance and Security
Lower risk through a proactive approach to compliance and security. http://www.ibmsystemsmag.com, Sept. 2011.
Last updated: 09 Sep 2011
Guardium 7 – database security review, by David Mitchell, IT PRO
The Verdict: 5 Stars With database attacks on the increase Guardium can make sure businesses don’t get caught with their pants down.
Last updated: 25 Feb 2009
Network Security Against Today's Threats - Guardium 7 Product Review, by Samara Lynn, CRN ChannelWeb
Guardium’s database security may contain the most powerful compliance regulations tools that the Test Center has ever seen.
Last updated: 09 Jan 2009
Data Security for NoSQL systems with IBM InfoSphere Guardium
NoSQL data systems are making their way into the enterprise. IBM InfoSphere Guardium is a cross-platform, cross-database solution that can help speed the deployment of NoSQL by breaking down the inhibitors to meeting security and compliance requirements and reducing overall risk.
Last updated: 28 Feb 2014
Explore data masking and emerging big data masking trends with Jim Lee, IBM VP of Product Line Management
In this 20 minute podcast, Jim Lee, Vice President of Product Management, will describe the importance of data masking big data environments as well as how to build business driven masking policies to address growing privacy requirements across the enterprise.
Last updated: 24 Sep 2013
Managing the lifecycle of your JD Edwards applications and data with Cynthia Babb, WW Product Marketing, IBM Software Group
This year, a significant number of JD Edward users are facing loss of support from Oracle. That means an upgrade and/or a migration. In this podcast, we will explore these challenges and the best practices JD Edwards users should implement to address them.
Last updated: 21 May 2013
Building security into big data podcast
Big data environments allow organizations to aggregate and share multitudes of data — much of which is sensitive data that must be protected. Listen to this podcast and learn how to build security and privacy into your big data platform using three key foundational pillars.
Last updated: 11 Mar 2013
Assess the Security of Your Database Environment
IBM InfoSphere Guardium Database Vulnerability Assessment provides ongoing evaluation of database security configurations. Learn how Guardium Database Vulnerability Assessment software performs security assessments, helps with compliance, and protects against data breaches.
Last updated: 09 Mar 2013
One Step Closer to Making Data Breaches a Thing of the Past
Databases contain some of an organization’s most valuable assets and have become the primary target of attacks. This podcast discusses how to prevent hacking or theft of your data that is stored on DB2 for z/OS and other database platforms with IBM InfoSphere Guardium.
Last updated: 28 Jan 2013
Ensure PCI DSS Compliance with Real-Time Database Security & Monitoring
Financial organizations struggle with PCI DSS compliance, especially with the requirements to “track and monitor” and “protect cardholder data.” IBM InfoSphere Guardium can help assure payment card industry data security standard compliance with real-time database security and monitoring.
Last updated: 25 Jan 2013
How to apply InfoSphere Guardium to the Big Data world
Ron Ben Natan discusses how you can apply IBM InfoSphere Guardium to the world of big data, specifically to Hadoop environments.
Last updated: 25 Oct 2012
Who is watching big data? Monitor and secure data streams
In this audio podcast, learn the key challenges of securing sensitive information in big data environments where volume, velocity and variety of data must be monitored, protected and analyzed while streaming across the enterprise.
Last updated: 09 Oct 2012
InfoSphere Guardium Data Redaction v2.5
In this podcast, learn about the new capabilities of IBM® InfoSphere® Guardium® Data Redaction for safeguarding and removing sensitive information contained in documents, forms, spreadsheets, images and other unstructured data sources while facilitating information sharing for business use.
Last updated: 01 Oct 2012
IBM InfoSphere Data Privacy for Hadoop
InfoSphere Data Privacy for Hadoop is the first solution on the market to provide exhaustive data privacy capabilities for the big data platform. It helps organizations build confidence in their data a crucial step toward realizing the promise of big data analytics by providing the data privacy.
Last updated: 10 Feb 2014
IBM InfoSphere Guardium
IBM® InfoSphere® Guardium® offers a family of integrated modules for managing the entire data security and compliance life cycle. Manage the entire data security and compliance life cycle for enterprise systems
Last updated: 01 Nov 2013
IBM InfoSphere Guardium for big data
Meet big data security challenges with IBM InfoSphere Guardium
Last updated: 16 Jan 2013
Exposing the Hidden Costs of Database Security Solutions
In this webcast, we will provide a framework to calculate the financial impact of any database security solution in in three critical areas: Staff, Hardware, and Risk Mitigation.
Last updated: 09 Jun 2013
IBM X-Force 2012 Data Breach Trend Report: Issues and Solutions webcast
Cyber attacks continue to grow in volume and sophistication — relentlessly evolving to bypass traditional IT defenses. Michael Hamelin of IBM X-Force® Advanced Research presents an in-depth analysis of recent public vulnerability disclosures and discusses important lessons learned.
Last updated: 17 May 2013
From Stuxnet to SQL Injection: HOWTO Safeguard Against the Latest Cyber-Threats
Learn about the security landscape and get the latest results from the newly-released “IBM X-Force 2010 Trend and Risk Report" in this On Demand Webcast.
Last updated: 20 Jun 2011
Top Scenarios for Real-Time Database Security & Monitoring
Insider threats, high-profile data breaches, regulatory compliance demands -- learn how Guardium can help.
Last updated: 24 Mar 2011
Streamline enterprise application upgrades with data life cycle management
Know how effective data management that includes data discovery and archiving can improve the outcome of upgrade projects, creating greater business value and higher overall success rates.
Last updated: 27 Aug 2013
Data masking everywhere-Design standard and repeatable data privacy policies across the enterprise
Mask data in real-time as it speeds across the enterprise to address emerging masking requirements in applications, reports, analytics platforms, databases, warehouses and big data environments without changes to applications or impacting performance.
Last updated: 29 Jul 2013
Protecting your critical data with integrated security intelligence
Extend security intelligence with data security insights. Combine the IBM QRadar Security Intelligence Platform with the robust data security capabilities of IBM InfoSphere Guardium to prevent attacks, ensure compliance and reduce the overall costs of security management.
Last updated: 08 May 2013
Understanding holistic database security: 8 steps to successfully securing enterprise data sources
This paper discusses the eight essential best practices that provide a holistic approach to safeguarding data sources and achieving compliance with key regulations, such as SOX, PCI DSS, GLBA and data protection laws.
Last updated: 08 Oct 2012
InfoSphere Guardium Data Redaction: Reconciling openness with privacy
Provide fine-grained protection for sensitive unstructured data to achieve regulatory compliance and reduce risk.
Last updated: 17 Aug 2012
Implementing Database Security and Auditing: Chapter 4 - Authentication and Password Security
Learn best practices and techniques involving authentication and user account management, password strength and password profiles, as well as user account/password maintenance.
Last updated: 04 Nov 2011
IBM InfoSphere Guardium Data Encryption: Help secure and protect SAP data
This paper describes the unique challenges involved in securing SAP data. It highlights and compares the various technologies that can be used to secure SAP data along with the trade offs posed by the different approaches.
Last updated: 16 Sep 2011
HOWTO Secure and Audit Oracle 10g and 11g: Chapter 6 - Authentication
Ultimate guide for providing HOWTO information for security and audit best practices for Oracle--bridging the gap between those who install and configure security features and those who secure and audit them.
Last updated: 10 Mar 2009
HOWTO Secure and Audit Oracle 10g and 11g: Hardening the Database
Learn how to choose a hardening guideline, use a vulnerability assessment tool, create and maintain a secure configuration baseline.
Last updated: 10 Mar 2009