Skip to main content

InfoSphere Guardium Data Security Library

Analyst reports 

Implement A Proactive Strategy For Data Security:

Data security and privacy are critical business imperatives in the data economy

Last updated: 15 Sep 2014


Gartner - Competitive Landscape: Database Audit and Protection

The database audit and protection (DAP) continues to evolve, expanding beyond the database, while concepts such as big data, behavioral attack detection and comprehensive database support expand.

Last updated: 30 Mar 2014


Bloor Research: Managing data growth on System z

IBM Optim provides facilities that ensure that the data won't break and it offers a variety of mechanisms for accessing the data. In this paper, we will discuss breakage and access in more detail, and then briefly consider how IBM Optim works, particularly with respect to System z.

Last updated: 27 Aug 2013


Gartner - Apply the Nine Critical Capabilities of Database Audit and Protection

As organizations continue to increase the size and scope of databases, IT leaders are challenged to protect sensitive data, which has been condensed into many databases from different vendors. In this analyst report, Gartner Inc. has identified nine critical security capabilities that form part of a DAP solution.

Last updated: 07 Jun 2013


Control and Protect Sensitive Information in the Era of Big Data, a Forrester Research report

As big data initiatives ingest more and more data, enterprises will face significant risks and threats to the repositories in which they keep that data. Learn how to control and properly protect sensitive information that is subject to global laws and regulations.

Last updated: 23 Jul 2012

Books 

Data security strategies for next generation data warehouses

Data warehouses deliver analytics with speed and simplicity to propel you ahead of the competition in the era of big data. Critical to any big data strategy is protecting the data warehouse to ensure that the data is secure. Learn strategies to protect your data warehouse in this ebook.

Last updated: 30 Sep 2013


NoSQL does not have to mean no security

This eBook provides a basic introduction into NoSQL, the security implications for NoSQL, and how IBM InfoSphere Guardium solutions can help speed the deployment of NoSQL by breaking down the inhibitors to meeting security and compliance requirements and reducing overall risk

Last updated: 01 Sep 2013

Data sheets 

InfoSphere Guardium for Applications

Leveraging advanced dynamic data masking (DDM) technology, IBM InfoSphere Guardium for Applications masks sensitive data, protecting it from unauthorized users in accordance with an organization’s compliance mandates or security policies.

Last updated: 08 Feb 2015

Demos 

IBM InfoSphere Guardium database activity monitoring

Organizations across the globe continue to experience compromised data caused by malicious attacks, web application vulnerabilities or unauthorized changes.

Last updated: 29 Mar 2012

Magazines 

A Proactive, Preventative Approach to Compliance and Security

Lower risk through a proactive approach to compliance and security. http://www.ibmsystemsmag.com, Sept. 2011.

Last updated: 09 Sep 2011


Guardium 7 – database security review, by David Mitchell, IT PRO

The Verdict: 5 Stars With database attacks on the increase Guardium can make sure businesses don’t get caught with their pants down.

Last updated: 25 Feb 2009


Network Security Against Today's Threats - Guardium 7 Product Review, by Samara Lynn, CRN ChannelWeb

Guardium’s database security may contain the most powerful compliance regulations tools that the Test Center has ever seen.

Last updated: 09 Jan 2009

Podcasts 

Data Security for NoSQL systems with IBM InfoSphere Guardium

NoSQL data systems are making their way into the enterprise. IBM InfoSphere Guardium is a cross-platform, cross-database solution that can help speed the deployment of NoSQL by breaking down the inhibitors to meeting security and compliance requirements and reducing overall risk.

Last updated: 28 Feb 2014


Explore data masking and emerging big data masking trends with Jim Lee, IBM VP of Product Line Management

In this 20 minute podcast, Jim Lee, Vice President of Product Management, will describe the importance of data masking big data environments as well as how to build business driven masking policies to address growing privacy requirements across the enterprise.

Last updated: 24 Sep 2013

Solution sheets 

IBM InfoSphere Data Privacy for Hadoop

InfoSphere Data Privacy for Hadoop is the first solution on the market to provide exhaustive data privacy capabilities for the big data platform. It helps organizations build confidence in their data a crucial step toward realizing the promise of big data analytics by providing the data privacy.

Last updated: 10 Feb 2014


IBM InfoSphere Guardium

IBM® InfoSphere® Guardium® offers a family of integrated modules for managing the entire data security and compliance life cycle. Manage the entire data security and compliance life cycle for enterprise systems

Last updated: 01 Nov 2013

Webcasts 

Exposing the Hidden Costs of Database Security Solutions

In this webcast, we will provide a framework to calculate the financial impact of any database security solution in in three critical areas: Staff, Hardware, and Risk Mitigation.

Last updated: 09 Jun 2013


IBM X-Force 2012 Data Breach Trend Report: Issues and Solutions webcast

Cyber attacks continue to grow in volume and sophistication — relentlessly evolving to bypass traditional IT defenses. Michael Hamelin of IBM X-Force® Advanced Research presents an in-depth analysis of recent public vulnerability disclosures and discusses important lessons learned.

Last updated: 17 May 2013


From Stuxnet to SQL Injection: HOWTO Safeguard Against the Latest Cyber-Threats

Learn about the security landscape and get the latest results from the newly-released “IBM X-Force 2010 Trend and Risk Report" in this On Demand Webcast.

Last updated: 20 Jun 2011


Top Scenarios for Real-Time Database Security & Monitoring

Insider threats, high-profile data breaches, regulatory compliance demands -- learn how Guardium can help.

Last updated: 24 Mar 2011

White papers 

Streamline enterprise application upgrades with data life cycle management

Know how effective data management that includes data discovery and archiving can improve the outcome of upgrade projects, creating greater business value and higher overall success rates.

Last updated: 27 Aug 2013


Data masking everywhere-Design standard and repeatable data privacy policies across the enterprise

Mask data in real-time as it speeds across the enterprise to address emerging masking requirements in applications, reports, analytics platforms, databases, warehouses and big data environments without changes to applications or impacting performance.

Last updated: 29 Jul 2013


Understanding holistic database security: 8 steps to successfully securing enterprise data sources

This paper discusses the eight essential best practices that provide a holistic approach to safeguarding data sources and achieving compliance with key regulations, such as SOX, PCI DSS, GLBA and data protection laws.

Last updated: 08 Oct 2012


InfoSphere Guardium Data Redaction: Reconciling openness with privacy

Provide fine-grained protection for sensitive unstructured data to achieve regulatory compliance and reduce risk.

Last updated: 17 Aug 2012


IBM InfoSphere Guardium Data Encryption: Help secure and protect SAP data

This paper describes the unique challenges involved in securing SAP data. It highlights and compares the various technologies that can be used to secure SAP data along with the trade offs posed by the different approaches.

Last updated: 16 Sep 2011


HOWTO Secure and Audit Oracle 10g and 11g: Chapter 6 - Authentication

Ultimate guide for providing HOWTO information for security and audit best practices for Oracle--bridging the gap between those who install and configure security features and those who secure and audit them.

Last updated: 10 Mar 2009


HOWTO Secure and Audit Oracle 10g and 11g: Hardening the Database

Learn how to choose a hardening guideline, use a vulnerability assessment tool, create and maintain a secure configuration baseline.

Last updated: 10 Mar 2009