Guardium Latest Courses:
This course contains a step by step guide for installing a Guardium GUI certificate signed by an internal organization certificate authority.
This course demonstrates how to use Guardium Vulnerability Assessment to locate various security risks in your environment.
A policy is a key component of your data security strategy. To keep your data secure, you must implement rules that monitor, log, and control data. In this course, you learn how to create, install, and modify IBM Security Guardium policies and policy rules that control data access.
This video is based on Guardium 11.2.
- Create, install, and test a Guardium policy
- Modify a Guardium policy and policy rule
- Add rules to a Guardium policy
- Test a reinstalled Guardium policy