Data Security

This category includes courses that address Guardium discovery, classification, vulnerability assessment, and entitlements.

Data Security Courses:

Discussion and Demonstration of Guardium Vulnerability Assessment

This course covers why Vulnerability Assessment is critical, what it is, how Guardium addresses it, and discusses and demonstrates using Guardium Vulnerability Assessment.

Finding vulnerabilities with Guardium Vulnerability Assessment

This course demonstrates how to use Guardium Vulnerability Assessment to locate various security risks in your environment.

Demo: Guardium Vulnerability Assessment for DB2 for z/OS

Louis Lam, IBM Security Guardium Database Security Content Manager, provides a detailed overview of Guardium v10 Vulnerability Assessment for DB2 for z/OS including FAQs, remediation strategy and more. He then does a step by step demo on configuring and running the solution. 

Guardium v10 Discover Sensitive Data demonstration

Dan Goodes presents a high level demonstration of the sensitive data discovery process in IBM Security Guardium V10.

Guardium Vulnerability Assessment Demonstration

This video provides a short demonstration of Guardium Vulnerability Assessment v10. 

Guardium 11 Smart Assistant: Industries and Applications demonstration

This video presents a deep dive with a Use Case and supporting screen shots showing how to use the functionality of Smart Assistant.  

Guardium database vulnerability assessment

The Guardium Vulnerability Assessment application enables organizations to identify and address database vulnerabilities in a consistent and automated fashion. The assessment process in Guardium evaluates and recommends actions to improve the health of your database environment. In this lab, you learn how to configure and run a database vulnerability assessment.

This lab environment reflects Guardium 10.5.

Franklin Almonte

Guardium 11 smart assistant for compliance monitoring

In Guardium 11, the smart assistant for compliance monitoring helps you quickly configure monitoring for GDPR, PCI, SOX, and other security standards by automating policy installation and scheduling, populating policy groups, discovering sensitive data in your databases, and more.

Guardium Vulnerability Assessment for MongoDB

MongoDB is a free and open-source cross-platform document-oriented database program.  In this video, you will see a detailed demonstration of Guardium Vulnerability Assessment for MongoDB, including the process to set up and run the test, and what happens after you harden the database per recommendations from the assessment.

PCI compliance quickstart with IBM Guardium

IBM Guardium provides tools for helping meet the requirements of the Payment Card Industry (PCI) data security standard.

In this video series, you become familiar with Guardium features that pertain to the PCI data security standard. You see a demonstration of how the features are configured.

Guardium asset reconciliation

In this video, Leila Johannesen demonstrates a new feature in Guardium 11.2 that allows customers to compare a list of databases with the databases that are known to Guardium.

Getting started with Guardium alerts

It is easy to use the predefined alerts in Guardium. In this course, you to learn about the different Guardium alert types and how to use them to monitor your Guardium ecosystem.

Configure Alerter and Anomaly Detection

Configuring and validating the Alert and Anomaly Detection engines is one of the first steps when you are configuring Guardium alerts. In this video, you learn how to configure and validate the Alert and Anomaly Detection engines.

Configure and view correlation alerts

This video demonstrates how to configure a Guardium correlation alert and view the alert after it triggers.

Create and configure real-time alerts

This video demonstrates how to create, configure, and view a Guardium real-time alert when it triggers.

Use prebuilt and predefined alerts to configure an alerts dashboard

This video course demonstrates how to create a Guardium custom alerts dashboard that centralizes alerting activities.

Franklin Almonte

IBM data security strategy and risk-based approach

Data is the lifeblood of an organization. Profit and revenue generation requires data in order to compete and provide your services. That data also needs protection. Lots of different tools, solutions, and vendors say they do data protection, but with many of these claims it is about the programs that need to be in place instead of a comprehensive strategy. Security and risk management leaders should develop a data security governance framework to mitigate the risks caused by security threats, data residency, and privacy issues.

In this video, you learn about IBM's data security strategy and risk based approach.