Data Security Latest Courses (6):


If the IBM Guardium database utilization reaches capacity, this is a critical situation and operations will fail.  There are many reasons why this could happen, and it is important to review these causes to prevent this problem. It is also imperative that you are alerted when there is a problem.

This course is a troubleshooting tool.  Depending on your situation, you will choose to take preventive steps to maintain the health of your Guardium environment and prevent this issue, or if you are experiencing symptoms your database is getting full, you will be guided through troubleshooting steps.

Topics covered in this course:

Appliance patch levels      
Auto stop services  
Alert notifications
Purge periods Policy tuning
Database percent used           
Top database tables
Aggregation / archive logs                          
Disk & Database Health Analyzer                          
Collectors S-TAPs


  • Identify symptoms that indicate the Guardium database is getting full
  • Describe possible reasons the database utilization increases
  • Navigate through decision points to determine how to take preventive or corrective action
  • Troubleshoot based on the scenario you are experiencing
  • Prepare the required information to present to Guardium Technical Support, if needed

Duration: 1 to 2 hours, depending on symptoms

Course revision: 1.0


In this Tech Talk, Shay Harel discusses several new IBM Guardium 10.6 enhancements that improve usability, core functionality and enable greater extensibility to new types of data environments. In the area of usability, there is a new policy builder user interface, as well as easier to use query report builder. There are new monitoring capabilities for Database as a Service. In addition, Guardium performance has been enhanced. Vulnerability assessment has improved accuracy and scan granularity. File access management with NAS and SharePoint enables consistent data protection across unstructured as well as structured data.


IBM Guardium version 10.6 introduces multi-threading capabilities to vulnerability assessment. With multi-threading, you can run vulnerability assessments in parallel, reducing completion time while more efficiently using CPU resources. 

In this video series, you will see how to configure vulnerability assessment multi-threading.


IBM Multi-Cloud Data Encryption (MDE) is designed to safeguard critical data from misuse whether it resides in a single cloud, multiple clouds, or hybrid environments. In this Tech Talk, you will learn how MDE 2.2 will help you:

  • Store and protect your data in object stores of any cloud, encrypted under keys that only you control
  • Easily move data between or out of Cloud Service Providers (CSPs)
  • Securely back up or copy data from one server and restore or paste that data to another server


IBM Guardium v10.6 introduces session-level policy. This feature allows you to create policies that use database session information to make key decisions about actions, and makes Guardium database monitoring more efficient.

In this lab, you create and test a session-level policy.


In this video, you will learn how IBM Guardium supports monitoring capabilities for Database as a Service (DBaaS) and containerized databases, offering a consistent approach to data protection for on-premise and cloud environments.