Guardium Latest

Guardium Latest Courses:

NEW

Louis Lam, IBM Security Guardium Database Security Content Manager, provides a detailed overview of Guardium v10 Vulnerability Assessment for DB2 for z/OS including FAQs, remediation strategy and more. He then does a step by step demo on configuring and running the solution. 

NEW

This Open Mic addresses the Guardium File Activity Monitor (FAM), and common issues users face during configuration.

Originally presented 25 May 2017

NEW

Correlation alerts in Guardium are query based, as opposed to real-time policy alerts. There are various considerations for configuration of correlation alerts. There are also some overhead cost to be considered. This Open Mic is a discussion of correlation alerts in IBM Security Guardium, including an example of setting up a Repeating Inactive S-Tap alert.

NEW

This Open Mic presented by David Plummer of Guardium Tech Support provides an overview to Guardium load balancing, including:

  • Prerequisites
  • How it works
  • grdapi commands
  • Activity report
  • Other related information and general overview


NEW

This Open Mic discusses how to troubleshoot situations where the S-TAP shows 'no traffic', including various steps you can take on your system to understand the reason for the issue or at least the scope of the issue, and what to do if all else fails.

Originally presented 18 July, 2017


NEW

Remote Syslog Shipping is a process to transport Guardium syslog to remote Security Information and Event Management (SIEM) systems. This Open Mic addresses how to configure remote syslog shipping in Guardium and basic troubleshooting of common issues.


NEW

A walk through of integration between IBM Cloud Pak for Security "Cases" and Guardium Insights

  • Map a ticket in Guardium Insights to the “Cases” application and assign to a user
  • Allow SOC analyst to view and respond through the Cloud Pak for Security console


NEW

In this Open Mic, you learn about how Outlier Detection works. You also learn about the Learning and Analysis phases, how to configure Outlier Detection, and how to interpret the Outlier results.