Guardium Latest Courses:
This course demonstrates how to use Guardium Vulnerability Assessment to locate various security risks in your environment.
A policy is a key component of your data security strategy. To keep your data secure, you must implement rules that monitor, log, and control data. In this course, you learn how to create, install, and modify IBM Security Guardium policies and policy rules that control data access.
This video is based on Guardium 11.2.
- Create, install, and test a Guardium policy
- Modify a Guardium policy and policy rule
- Add rules to a Guardium policy
- Test a reinstalled Guardium policy
This course demonstrates the hands-on lab available in the course Detect database login failures with Guardium. The demonstration covers creating a policy that will detect and alert on database login failures that occur multiple times over a short time period,
In this video, Guardium expert Glenn Weidner demonstrates enhancements to Guardium 11.2 auto create inspection engines, including scheduler user interface, rules results report, report only mode, and alerts.
This video provides a short demonstration of Guardium Vulnerability Assessment v10.
In this video, Shay Harel, Director of Data Security Engineering,
explores the new features and updates in IBM Guardium v11.2.