Guardium

Guardium Courses:

NEW

Correlation alerts in Guardium are query based, as opposed to real-time policy alerts. There are various considerations for configuration of correlation alerts. There are also some overhead cost to be considered. This Open Mic is a discussion of correlation alerts in IBM Security Guardium, including an example of setting up a Repeating Inactive S-Tap alert.

NEW

This Open Mic presented by David Plummer of Guardium Tech Support provides an overview to Guardium load balancing, including:

  • Prerequisites
  • How it works
  • grdapi commands
  • Activity report
  • Other related information and general overview


NEW

This Open Mic discusses how to troubleshoot situations where the S-TAP shows 'no traffic', including various steps you can take on your system to understand the reason for the issue or at least the scope of the issue, and what to do if all else fails.

Originally presented 18 July, 2017


NEW

Remote Syslog Shipping is a process to transport Guardium syslog to remote Security Information and Event Management (SIEM) systems. This Open Mic addresses how to configure remote syslog shipping in Guardium and basic troubleshooting of common issues.


NEW

A walk through of integration between IBM Cloud Pak for Security "Cases" and Guardium Insights

  • Map a ticket in Guardium Insights to the “Cases” application and assign to a user
  • Allow SOC analyst to view and respond through the Cloud Pak for Security console


NEW

This video demonstration guides you step-by-step through how to install and configure IBM Security Guardium. This video uses the Arabic language.



NEW

This video demonstration guides you step-by-step through installing IBM Security Guardium agents (GIM and S-TAP). 


NEW

In this IBM Security Guardium walkthrough, you learn about the data protection journey including Discovery, Classification, Vulnerability Assessment, monitoring, and protection. 


NEW

IBM Security Guardium query-based tests provide a means of capturing customer-specific requirements in Guardium vulnerability assessments. In this virtual lab, you create a query-based test, use it in a vulnerability assessment, and run the assessment to discover vulnerabilities. 




NEW

In this Open Mic, you learn about how Outlier Detection works. You also learn about the Learning and Analysis phases, how to configure Outlier Detection, and how to interpret the Outlier results. 

NEW

New in IBM Security Guardium 11.3, the universal connector allows you to configure a connection from native database activity logs to the Guardium collector. This allows Guardium to monitor data sources such as cloud database implementations that are not suited to running an S-TAP agent.  The Guardium Universal Connector includes support for MongoDB®, MySQL, and Amazon S3, requiring minimal configuration. Users can easily develop plug-ins for other data sources.

In this course, you learn to use the Guardium Universal Connector functionality to monitor activity from a MongoDB data source. 

NEW

Data security breaches are more frequent and more expensive than in the past. Even more pressing, insider data breaches are present in many data breaches and they make up a great percentage of the total data breach expense for organizations.  Why are insider threat-related breaches costly? Insiders, or those who pose as insiders, have more access to sensitive and regulated data and therefore can do more damage. 

These realities mean that single niche vendors, with their siloed and narrow scope, are less capable of addressing complex modern data security, privacy, and compliance requirements. To help you traverse this new and potentially confusing landscape, make sure you can achieve the following good practices: 

  • Spot, stop, and defend your organization from data breaches
  • Reduce the burden of remediating a data breach
  • Modernize your data security solutions 
  • Quickly gather audit data
  • Integrate and collaborate with a security ecosystem
Guardium is uniquely positioned to provide a modern data security solution that is centered around your security requirements