Guardium

Guardium Courses:

NEW

Starting with version 10.6, Guardium has a new policy builder. This builder incorporates many of the 10.x design features, including a format that presents configuration options as sections, and an intuitive, step-by-step guide to create and configure the policy.

Franklin Almonte

NEW

In Guardium 11, the smart assistant for compliance monitoring helps you quickly configure monitoring for GDPR, PCI, SOX, and other security standards by automating policy installation and scheduling, populating policy groups, discovering sensitive data in your databases, and more.

NEW

IBM Guardium 11 introduces risk spotter, a semi-automatic process that hones in on the most risky users and the most risky databases. This dynamic risk assessment considers all risk factors, including but not limited to: outliers, vulnerability, volume of activities, access to sensitive data, type of commands (privileges). It scans unmonitored users and databases beyond your current policies to spot previously unmonitored risks, and it suggests proactive actions.

NEW

The IBM Guardium 11 active threat analytics dashboard shows potential security breach cases, based on the outlier mining process and on identified attack symptoms. In this video, you see how to use the dashboard to view cases, investigate them, and take action.

NEW

This course introduces  you to the Guardium interface and command line interface. You learn how to access common Guardium features and applications. You can use the Guardium command line interface (CLI) to automate and script functions that are frequently used. You learn how to search the CLI for commands and list applicable options.

In the lab, you explore the Guardium GUI and learn how to classify data in your database environment. You create a new classification policy that searches for credit card numbers and populates the Sensitive Objects group with the table name and column name for each detected incident. 

The lab environment reflects Guardium 10.5.

Franklin Almonte


NEW

Policy actions are key components of Guardium polices and are critical to policy strategy and tuning. This interactive video introduces you to common blocking actions, alerting actions, and logging actions. It also includes general tips about using policy rule actions.

Franklin Almonte