Guardium Latest Courses:
In IBM Security Guardium, you use roles to grant access to Guardium resources, applications, and accelerators. This guide discusses the sample user roles such as Basel II, PCI, SOX, and GDPR to name a few. For each role, you learn the purpose of the role, the applications that the role has access to, and what the default user desktop that is associated with the role looks like.
In this video, Leila Johannesen discusses the enhancements in Guardium
11.2 that allow you to more easily understand the health of your system.
In this video, Leila Johannesen demonstrates a new feature in Guardium
11.2 that allows customers to compare a list of databases with the
databases that are known to Guardium.
You can configure IBM Security Guardium to discover databases that are created on both Windows and UNIX systems. In many cases, you might want Guardium to create and run inspection engines on all newly discovered databases. However, there are scenarios in which you want to control when and how Guardium creates new inspection engines. In these cases, Database Discovered Instances Rules, which is available in Guardium 11.2, provides a way to manage inspection engine creation. You can configure Discovered Instances Rules from a central manager in a managed environment or on a stand-alone system.
In this lab, you use the Database Discovered Instance Rules to specify how to manage inspection engines for discovered databases.
This type of configuration requires Guardium 11.2 or higher.Franklin Almonte
In this video, Vlad Langman, L3 Engineering Manager, discusses best practices for upgrading to Guardium 11.