This category includes courses that address Guardium discovery, classification, vulnerability assessment, and entitlements.
Data Security Courses:
This course covers why Vulnerability Assessment is critical, what it is, how Guardium addresses it, and discusses and demonstrates using Guardium Vulnerability Assessment.
This course demonstrates how to use Guardium Vulnerability Assessment to locate various security risks in your environment.
This video provides a short demonstration of Guardium Vulnerability Assessment v10.
This video presents a deep dive with a Use Case and supporting screen shots showing how to use the functionality of Smart Assistant.
The Guardium Vulnerability Assessment application enables organizations to identify and address database vulnerabilities in a consistent and automated fashion. The assessment process in Guardium evaluates and recommends actions to improve the health of your database environment. In this lab, you learn how to configure and run a database vulnerability assessment.
This lab environment reflects Guardium 10.5.
In Guardium 11, the smart assistant for compliance monitoring helps you
quickly configure monitoring for GDPR, PCI, SOX, and other security
standards by automating policy installation and scheduling, populating
policy groups, discovering sensitive data
in your databases, and more.
MongoDB is a free and open-source cross-platform document-oriented database program. In this video, you will see a detailed demonstration of Guardium Vulnerability Assessment for MongoDB, including the process to set up and run the test, and what happens after you harden the database per recommendations from the assessment.
IBM Guardium provides tools for helping meet the requirements of the Payment Card Industry (PCI) data security standard.
In this video series, you become familiar with Guardium features that pertain to the PCI data security standard. You see a demonstration of how the features are configured.
In this video, Leila Johannesen demonstrates a new feature in Guardium
11.2 that allows customers to compare a list of databases with the
databases that are known to Guardium.
It is easy to use the predefined alerts in Guardium. In this course, you to learn about the different Guardium alert types and how to use them to monitor your Guardium ecosystem.
Configuring and validating the Alert and Anomaly Detection engines is one of the first steps when you are configuring Guardium alerts. In this video, you learn how to configure and validate the Alert and Anomaly Detection engines.
This video demonstrates how to configure a Guardium correlation alert and view the alert after it triggers.
This video demonstrates how to create, configure, and view a Guardium real-time alert when it triggers.
This video course demonstrates how to create a Guardium custom alerts dashboard that centralizes alerting activities.
Data is the lifeblood of an organization. Profit and revenue generation requires data in order to compete and provide your services. That data also needs protection. Lots of different tools, solutions, and vendors say they do data protection, but with many of these claims it is about the programs that need to be in place instead of a comprehensive strategy. Security and risk management leaders should develop a data security governance framework to mitigate the risks caused by security threats, data residency, and privacy issues.
In this video, you learn about IBM's data security strategy and risk based approach.