Skip to main content

InfoSphere Guardium Data Security Library

Analyst reports 

Implement A Proactive Strategy For Data Security:

Data security and privacy are critical business imperatives in the data economy

Last updated: 15 Sep 2014

Gartner - Competitive Landscape: Database Audit and Protection

The database audit and protection (DAP) continues to evolve, expanding beyond the database, while concepts such as big data, behavioral attack detection and comprehensive database support expand.

Last updated: 30 Mar 2014

Bloor Research: Managing data growth on System z

IBM Optim provides facilities that ensure that the data won't break and it offers a variety of mechanisms for accessing the data. In this paper, we will discuss breakage and access in more detail, and then briefly consider how IBM Optim works, particularly with respect to System z.

Last updated: 27 Aug 2013

Gartner - Apply the Nine Critical Capabilities of Database Audit and Protection

As organizations continue to increase the size and scope of databases, IT leaders are challenged to protect sensitive data, which has been condensed into many databases from different vendors. In this analyst report, Gartner Inc. has identified nine critical security capabilities that form part of a DAP solution.

Last updated: 07 Jun 2013

IBM X-Force 2012 Annual Trend and Risk Report

This document analyzes and explores security threats including vulnerabilities, malware, spam, phishing, and more.

Last updated: 30 Apr 2013

Control and Protect Sensitive Information in the Era of Big Data, a Forrester Research report

As big data initiatives ingest more and more data, enterprises will face significant risks and threats to the repositories in which they keep that data. Learn how to control and properly protect sensitive information that is subject to global laws and regulations.

Last updated: 23 Jul 2012

Announcement letters 

IBM InfoSphere Guardium V9.0

Deliver real-time activity monitoring and automated compliance reporting for Big Data security

Last updated: 10 Sep 2012


Data security strategies for next generation data warehouses

Data warehouses deliver analytics with speed and simplicity to propel you ahead of the competition in the era of big data. Critical to any big data strategy is protecting the data warehouse to ensure that the data is secure. Learn strategies to protect your data warehouse in this ebook.

Last updated: 30 Sep 2013

NoSQL does not have to mean no security

This eBook provides a basic introduction into NoSQL, the security implications for NoSQL, and how IBM InfoSphere Guardium solutions can help speed the deployment of NoSQL by breaking down the inhibitors to meeting security and compliance requirements and reducing overall risk

Last updated: 01 Sep 2013

Bridging the data security gap - Unified data protection for four key data environments

Today's IT environment is complex- big data, cloud and virtual, enterprise data, and enterprise application security. How do you protect them all? Read this e-book and learn how you can implement an effective data security and privacy solution for multiple environments.

Last updated: 17 Jun 2013

Data sheets 

InfoSphere Guardium for Applications

Leveraging advanced dynamic data masking (DDM) technology, IBM InfoSphere Guardium for Applications masks sensitive data, protecting it from unauthorized users in accordance with an organization’s compliance mandates or security policies.

Last updated: 08 Feb 2015

InfoSphere Guardium Data Activity Monitor for Hadoop

IBM InfoSphere Guardium extends its market-leading data activity monitoring solution to Hadoop-based systems including Hive, MapReduce, HBase and HDFS to help organizations meet compliance requirements and protect sensitive data in real time.

Last updated: 27 Jun 2013

IBM InfoSphere Guardium for Greenplum

IBM InfoSphere Guardium extends its market leading data activity monitoring solution to include leading-edge platforms, such as Greenplum database, to help organizations meet compliance requirements while exploiting new innovations in data processing and analytics

Last updated: 26 Jun 2013

IBM InfoSphere Guardium Data Activity Monitor for MongoDB

IBM® InfoSphere® Guardium® addresses the fast growing class of NoSQL databases by delivering the first data monitoring and auditing solution for MongoDB to prevent data breaches and avoid compliance violations without sacrificing performance.

Last updated: 21 Jun 2013

IBM InfoSphere Guardium Appliances

IBM xSeries-based x2000 InfoSphere Guardium Appliances provide outstanding performance for all InfoSphere Guardium applications. Read how Guardium Appliances can help boost performance, improve scalability, and reduce costs.

Last updated: 08 May 2013

IBM InfoSphere Guardium for federal information systems

Escalating threats to federal information systems have most agencies moving aggressively to protect data and meet compliance requirements. InfoSphere Guardium Data Activity Monitor is a simple,scalable solution for centralizing and automating the controls needed to protect sensitive data.

Last updated: 08 May 2013

IBM InfoSphere Guardium Data Activity Monitor

Continuously monitor data access and protect sensitive data across the enterprise with IBM InfoSphere Guardium Data Activity Monitor—a robust solution for assuring the security and integrity of data in heterogeneous environments such as databases, data warehouses, file shares and big data platforms.

Last updated: 25 Apr 2013

IBM InfoSphere Guardium Vulnerability Assessment

IBM InfoSphere® Guardium® Vulnerability Assessment helps harden database infrastructures. It detects vulnerabilities and identifies threats and security holes in databases or the underlying operating system which could be exploited by intruders and hackers to gain access to sensitive data.

Last updated: 17 Apr 2013


IBM InfoSphere Guardium database activity monitoring

Organizations across the globe continue to experience compromised data caused by malicious attacks, web application vulnerabilities or unauthorized changes.

Last updated: 29 Mar 2012


A Proactive, Preventative Approach to Compliance and Security

Lower risk through a proactive approach to compliance and security., Sept. 2011.

Last updated: 09 Sep 2011

Guardium 7 – database security review, by David Mitchell, IT PRO

The Verdict: 5 Stars With database attacks on the increase Guardium can make sure businesses don’t get caught with their pants down.

Last updated: 25 Feb 2009

Network Security Against Today's Threats - Guardium 7 Product Review, by Samara Lynn, CRN ChannelWeb

Guardium’s database security may contain the most powerful compliance regulations tools that the Test Center has ever seen.

Last updated: 09 Jan 2009


Data Security for NoSQL systems with IBM InfoSphere Guardium

NoSQL data systems are making their way into the enterprise. IBM InfoSphere Guardium is a cross-platform, cross-database solution that can help speed the deployment of NoSQL by breaking down the inhibitors to meeting security and compliance requirements and reducing overall risk.

Last updated: 28 Feb 2014

Explore data masking and emerging big data masking trends with Jim Lee, IBM VP of Product Line Management

In this 20 minute podcast, Jim Lee, Vice President of Product Management, will describe the importance of data masking big data environments as well as how to build business driven masking policies to address growing privacy requirements across the enterprise.

Last updated: 24 Sep 2013

Managing the lifecycle of your JD Edwards applications and data with Cynthia Babb, WW Product Marketing, IBM Software Group

This year, a significant number of JD Edward users are facing loss of support from Oracle. That means an upgrade and/or a migration. In this podcast, we will explore these challenges and the best practices JD Edwards users should implement to address them.

Last updated: 21 May 2013

Assess the Security of Your Database Environment

IBM InfoSphere Guardium Database Vulnerability Assessment provides ongoing evaluation of database security configurations. Learn how Guardium Database Vulnerability Assessment software performs security assessments, helps with compliance, and protects against data breaches.

Last updated: 09 Mar 2013

Solution sheets 

IBM InfoSphere Data Privacy for Hadoop

InfoSphere Data Privacy for Hadoop is the first solution on the market to provide exhaustive data privacy capabilities for the big data platform. It helps organizations build confidence in their data a crucial step toward realizing the promise of big data analytics by providing the data privacy.

Last updated: 10 Feb 2014

IBM InfoSphere Guardium

IBM® InfoSphere® Guardium® offers a family of integrated modules for managing the entire data security and compliance life cycle. Manage the entire data security and compliance life cycle for enterprise systems

Last updated: 01 Nov 2013


Exposing the Hidden Costs of Database Security Solutions

In this webcast, we will provide a framework to calculate the financial impact of any database security solution in in three critical areas: Staff, Hardware, and Risk Mitigation.

Last updated: 09 Jun 2013

IBM X-Force 2012 Data Breach Trend Report: Issues and Solutions webcast

Cyber attacks continue to grow in volume and sophistication — relentlessly evolving to bypass traditional IT defenses. Michael Hamelin of IBM X-Force® Advanced Research presents an in-depth analysis of recent public vulnerability disclosures and discusses important lessons learned.

Last updated: 17 May 2013

From Stuxnet to SQL Injection: HOWTO Safeguard Against the Latest Cyber-Threats

Learn about the security landscape and get the latest results from the newly-released “IBM X-Force 2010 Trend and Risk Report" in this On Demand Webcast.

Last updated: 20 Jun 2011

Top Scenarios for Real-Time Database Security & Monitoring

Insider threats, high-profile data breaches, regulatory compliance demands -- learn how Guardium can help.

Last updated: 24 Mar 2011

White papers 

Streamline enterprise application upgrades with data life cycle management

Know how effective data management that includes data discovery and archiving can improve the outcome of upgrade projects, creating greater business value and higher overall success rates.

Last updated: 27 Aug 2013

Data masking everywhere-Design standard and repeatable data privacy policies across the enterprise

Mask data in real-time as it speeds across the enterprise to address emerging masking requirements in applications, reports, analytics platforms, databases, warehouses and big data environments without changes to applications or impacting performance.

Last updated: 29 Jul 2013

Protecting your critical data with integrated security intelligence

Extend security intelligence with data security insights. Combine the IBM QRadar Security Intelligence Platform with the robust data security capabilities of IBM InfoSphere Guardium to prevent attacks, ensure compliance and reduce the overall costs of security management.

Last updated: 08 May 2013

Understanding holistic database security: 8 steps to successfully securing enterprise data sources

This paper discusses the eight essential best practices that provide a holistic approach to safeguarding data sources and achieving compliance with key regulations, such as SOX, PCI DSS, GLBA and data protection laws.

Last updated: 08 Oct 2012

InfoSphere Guardium Data Redaction: Reconciling openness with privacy

Provide fine-grained protection for sensitive unstructured data to achieve regulatory compliance and reduce risk.

Last updated: 17 Aug 2012

IBM InfoSphere Guardium Data Encryption: Help secure and protect SAP data

This paper describes the unique challenges involved in securing SAP data. It highlights and compares the various technologies that can be used to secure SAP data along with the trade offs posed by the different approaches.

Last updated: 16 Sep 2011

HOWTO Secure and Audit Oracle 10g and 11g: Chapter 6 - Authentication

Ultimate guide for providing HOWTO information for security and audit best practices for Oracle--bridging the gap between those who install and configure security features and those who secure and audit them.

Last updated: 10 Mar 2009

HOWTO Secure and Audit Oracle 10g and 11g: Hardening the Database

Learn how to choose a hardening guideline, use a vulnerability assessment tool, create and maintain a secure configuration baseline.

Last updated: 10 Mar 2009