Guardium

Guardium Courses:

NEW

Active Directory provides central authentication and other services to Microsoft Windows networks. Organizations that use Active Directory for centralized authentication usually require that all applications integrate with it, so users can be centrally managed across the enterprise.

Guardium integrates with Active Directory in two ways:

  • Populate a Guardium group with Active Directory users and integrate into your security policies
  • Authenticate Guardium users with Active Directory

In this course, you learn how to integrate Guardium with Active Directory.

NEW

The IBM DB2 for z/OS platform stores mission critical data for companies. In this overview, you will learn how IBM Security Guardium can help monitor, audit, and protect DB2 z/OS environments.  Topics include best practices and approaches to protect your data using Guardium for DB2 z/OS S-TAP features and capabilities, and troubleshooting.

NEW

This video presents a deep dive with a Use Case and supporting screen shots showing how to use the functionality of Smart Assistant.  

NEW

In this video, Leila Johannesen demonstrates a Guardium integration with Cloudera Distribution of Hadoop (CDH).

NEW

In this video, Shay Harel, Director of Data Security Engineering, explores the new features and updates in IBM Guardium v11.1. 






  • Mapping applications
  • Active threat analytics                         
  • Risk spotter
  • ServiceNow integration
  • Auto create inspection engine
  • IPv6 support
  • Cloud database updates  
  • Vulnerability Assessment enhancements  
  • S-TAP updates 
  • Mainframe updates
  • Sankey diagram for advanced investigations

NEW

The central reporting of activity of database activity monitoring systems is measured against the problem of huge amounts of data and the necessity of long data retention that is enforced by regulations, and correct identification of anomalies in user behavior through quantitative analysis.

IBM Security Guardium Insights (GI) is a response to these needs and is designed as a container service implementable in both private and public clouds. The following procedures bring together the various installation and configuration steps to install Guardium Insights. The process is divided into five main tasks:

  • System requirements
  • Red Hat setup
  • OpenShift installation
  • IBM Cloud Private installation
  • Guardium Insights installation