Guardium Latest Courses:
In this IBM Security Guardium walkthrough, you learn about the data protection journey including Discovery, Classification, Vulnerability Assessment, monitoring, and protection.
IBM Security Guardium query-based tests provide a means of capturing customer-specific requirements in Guardium vulnerability assessments. In this virtual lab, you create a query-based test, use it in a vulnerability assessment, and run the assessment to discover vulnerabilities.
New in IBM Security Guardium 11.3, the universal connector allows you to configure a connection from native database activity logs to the Guardium collector. This allows Guardium to monitor data sources such as cloud database implementations that are not suited to running an S-TAP agent. The Guardium Universal Connector includes support for MongoDB®, MySQL, and Amazon S3, requiring minimal configuration. Users can easily develop plug-ins for other data sources.
In this course, you learn to use the Guardium Universal Connector functionality to monitor activity from a MongoDB data source.
Data security breaches are more frequent and more expensive than in the past. Even more pressing, insider data breaches are present in many data breaches and they make up a great percentage of the total data breach expense for organizations.
These realities mean that single niche vendors, with their siloed and narrow scope, are less capable of addressing complex modern data security, privacy, and compliance requirements. To help you traverse this new and potentially confusing landscape, make sure you can achieve the following good practices:
- Spot, stop, and defend your organization from data breaches
- Reduce the burden of remediating a data breach
- Modernize your data security solutions
- Quickly gather audit data
- Integrate and collaborate with a security ecosystem