Data Encryption

IBM Guardium Data Encryption (GDE) helps protect file and database data from misuse and help you comply with industry and regulatory requirements.

Data Encryption Courses:

4 reasons to love the new Guardium Data Encryption v3.0

In this Tech Talk, Guardium experts discuss the new Guardium Data Encryption v3.0.

Encryption is the fastest way to protect data

Most known data breaches are from organizations that did not encrypt their breached data. Current regulations like GDPR and LGPD (Brazilian data privacy law) recommend anonymization of data, which can be achieved using different methods like encryption, tokenization, redaction, and data masking. Learn what the differences are, and which one fits your needs. Learn what solutions are available and can fit seamlessly with your existing applications and data repositories.

GDE for Ransomware and Spoofing protection

This video covers three Guardium Data Encryption (GDE) use cases for protecting against Ransomware and Spoofing.  The use cases are:

  • Ransomware simulation
  • Ransomware and spoofing attack
  • GDE policy basics and QRadar integration

Guardium Data Encryption - Container Encryption

As enterprises are modernizing their infrastructure and operations and deploying containers, it is important to understand the security implications. In this Tech Talk you will learn how to deploy a Guardium Data Encryption V4 agent on a Docker and OpenShift environment. You will also see how to configure a report for unauthorized access attempts and add access controls to internal container users.

Guardium Data Encryption overview

This presentation provides an overview of the IBM Guardium Data Encryption portfolio, including information on the following solutions:

  • Guardium for File and Database Encryption (GDE)
  • Guardium for Data Encryption Key Management (GDKM)
  • Guardium for Cloud Key Management (GCKM)
  • Guardium for Application Encryption (GAE)
  • Guardium for Tokenization (GTO)
  • Guardium for Container Data Encryption (GCDE)
  • Guardium for Batch Data Transformation (GBDT)
  • Data Security Manager (DSM)


Guardium Tech Talk series: Data Encryption for DB2 and IMS on z/OS

In this Guardium tech talk series, you will learn about IMS Implementation, cryptographic hardware, CKDS creation, and master key rotation.