Guardium Latest

Guardium Latest Courses:

NEW

It is easy to use the predefined alerts in Guardium. In this course, you to learn about the different Guardium alert types and how to use them to monitor your Guardium ecosystem.

NEW

This video demonstrates how to create, configure, and view a Guardium real-time alert when it triggers.

NEW

This video demonstrates how to configure a Guardium correlation alert and view the alert after it triggers.

NEW

Organizations have many goals for monitoring data servers. These goals require many rules, some of which  apply to a broad set of data servers, and some of which might apply to only one or a few data servers.

In this video, you learn how to organize these rules into a series of policies to optimize maintainability.

NEW

IBM Guardium Data Protection for Files discovers and classifies unstructured sensitive file repositories on various platforms, including Network Attached Storage (NAS) and Microsoft SharePoint. These videos cover:
  • Data-centric security approach
  • Partnership with STEALTHbits
  • Data Protection for Files, NAS, and SharePoint
  •  File Discovery, Entitlement, and Classification (FDEC)
  • File Activity Monitoring (FAM)

NEW

IBM Guardium 10.6 has a new query and report builder. This builder incorporates many of the 10.x design features, including a format that presents configuration options as sections, as well as an intuitive, step-by-step guide to create and configure the query and report. Additionally, the report is automatically generated from the query, rather than requiring an additional step. If the query is modified, the report is automatically regenerated when the query is saved.

In this set of exercises, you will create a query and report which show SQL commands. Then you will generate data to test the report and view the results.

Objectives

  • Create a query and report which shows SQL commands executed on a monitored database server
  • Test the query and report, viewing the results

NEW

Starting with version 10.6, IBM Guardium has a new policy builder. This builder incorporates many of the 10.x design features, including a format that presents configuration options as sections, and an intuitive, step-by-step guide to create and configure the policy.

Objectives

  • Describe the differences between the new and legacy user interfaces
  • Create a policy that logs any attempt by a group of privileged users to run an INSERT command on a sensitive database table
  • Generate data to test the policy
  • View the results

NEW

Configuring and validating the Alert and Anomaly Detection engines is one of the first steps when you are configuring Guardium alerts. In this video, you learn how to configure and validate the Alert and Anomaly Detection engines.

NEW

The information in this Open Mic will help keep you out of trouble and possibly rescue you in the case of full appliance issues.

Agenda:

  • Introduction
  • Detection
  • First Response
  • Getting to Root Cause
  • Questions & Answers

In the follow-up to the Open Mic, John spends time answering audience questions on that and other topics.

  • Reboot the appliance
  • Issues with fixes
  • Vulnerabilities
  • The Discovery engine
  • High CPU