Active Directory provides central authentication and other services to Microsoft Windows networks. Organizations that use Active Directory for centralized authentication usually require that all applications integrate with it, so users can be centrally managed across the enterprise.
Guardium integrates with Active Directory in two ways:
a Guardium group with Active Directory users and integrate into your security policies
Guardium users with Active Directory
In this course, you learn how to integrate Guardium with Active Directory.
The IBM DB2 for z/OS platform stores mission critical data for
companies. In this overview, you will learn how IBM Security Guardium
can help monitor, audit, and protect DB2 z/OS environments. Topics include
best practices and approaches to protect your data using Guardium for
DB2 z/OS S-TAP features and capabilities, and troubleshooting.
This video presents a deep dive with a Use Case and supporting screen shots showing how to use the functionality of Smart Assistant.
In this video, Leila Johannesen demonstrates a Guardium integration with Cloudera Distribution of Hadoop (CDH).
In this video, Shay Harel, Director of Data Security Engineering,
explores the new features and updates in IBM Guardium v11.1.
The central reporting of activity of database activity monitoring systems is measured against the problem of huge amounts of data and the necessity of long data retention that is enforced by regulations, and correct identification of anomalies in user behavior through quantitative analysis.
IBM Security Guardium Insights (GI) is a response to these needs and is designed as a container service implementable in both private and public clouds. The following procedures bring together the various installation and configuration steps to install Guardium Insights. The process is divided into five main tasks:
- System requirements
- Red Hat setup
- OpenShift installation
- IBM Cloud Private installation
- Guardium Insights installation