Only a partial course catalog is displayed. Please log in to see the complete catalog.


Data Security Courses (4):

NEW

In Guardium, when a database user name in a report is blank, the cause should be investigated by the Guardium administrator.  In this course, you will learn various causes and solutions for missing DB USER information, illustrated with specific examples. 

NEW

Load balancing automatically allocates managed units to S-TAP agents when new S-TAPs are installed and during fail-over when a managed unit is unavailable. The load balancing application also dynamically re-balances loaded or busy managed units by relocating S-TAP agents to less-loaded managed units.  These topics are discussed in this Open Mic.

NEW

In this Tech Talk, you will see how IBM Guardium Data Protection for Files discovers and classifies unstructured sensitive file repositories on various platforms, including Network Attached Storage (NAS) and Microsoft SharePoint. This video covers:

  • Data-centric security approach
  • Partnership with STEALTHbits
  • Data Protection for Files, NAS, and SharePoint
  •  File Discovery, Entitlement, and Classification (FDEC)
  • File Activity Monitoring (FAM)

NEW

Starting with version 10.6, IBM Guardium has a new policy builder. This builder incorporates many of the 10.x design features, including a format that presents configuration options as sections, as well as an intuitive, step-by-step guide to create and configure the policy.

In this lab, you use the new policy builder to create a policy that logs any attempt by a group of privileged users to run an INSERT command on a sensitive database table. Then you install the policy, generate data to test the policy, and view the results.