Only a partial course catalog is displayed. Please log in to see the complete catalog.
Data Security Courses (4):
In Guardium, when a database user name in a report is blank, the cause should be investigated by the Guardium administrator. In this course, you will learn various causes and solutions for missing DB USER information, illustrated with specific examples.
Load balancing automatically allocates managed units to S-TAP agents
when new S-TAPs are installed and during fail-over when a managed unit
is unavailable. The load balancing application also dynamically
re-balances loaded or busy managed units by relocating S-TAP agents to
less-loaded managed units. These topics are discussed in this Open Mic.
- Data-centric security approach
- Partnership with STEALTHbits
- Data Protection for Files, NAS, and SharePoint
- File Discovery, Entitlement, and Classification (FDEC)
- File Activity Monitoring (FAM)
Starting with version 10.6, IBM Guardium has a new policy builder. This builder incorporates many of the 10.x design features, including a format that presents configuration options as sections, as well as an intuitive, step-by-step guide to create and configure the policy.
In this lab, you use the new policy builder to create a policy that logs any attempt by a group of privileged users to run an INSERT command on a sensitive database table. Then you install the policy, generate data to test the policy, and view the results.