Guardium General
This category includes general Guardium courses.
Guardium General Courses:
In this video, Shay Harel, Director of Data Security Engineering,
explores the new features and updates in IBM Guardium v11.2.
Topics include:
|
|
|
Join the IBM Security Learning Services team for an in-depth tour of the Security Learning Academy, with a focus on IBM Security Guardium course offerings. In this video, you will see how to navigate the platform, search the course catalog, enroll in a course, view your enrollments on your dashboard, create progress reports, and see how Security Learning Academy is integrated with IBM VIP Rewards for Security.
IBM Guardium version 10.6 introduces multi-threading capabilities to vulnerability assessment. With multi-threading, you can run vulnerability assessments in parallel, reducing completion time while more efficiently using CPU resources.
In this video series, you will see how to configure vulnerability assessment multi-threading.
Are you getting ready to administer database security policies? Learn how to configure Guardium to discover, classify, analyze, protect, and control access to sensitive data. You learn to perform a vulnerability assessment, and how to monitor data and file activity. This course teaches you how to create reports, audits, alerts, metrics, and compliance oversight processes.
Objectives
- Identify the primary functions of IBM Security Guardium
- Apply key Guardium architecture components
- Navigate the Guardium user interface and command line interface
- Manage user access to Guardium
- Build and populate Guardium groups
- Use the administration console to manage Guardium components
- Configure policy rules that process the information gathered from database and file servers
- Use the configuration auditing system, Vulnerability Assessment application, and Database Discovery to perform data security tasks
- Create queries and reports to examine trends and gather data
- Automate compliance workflow processes
- Use file activity monitoring to keep track of the files on your servers
This course introduces you to the Guardium interface and command line interface. You learn how to access common Guardium features and applications. You can use the Guardium command line interface (CLI) to automate and script functions that are frequently used. You learn how to search the CLI for commands and list applicable options.
In the lab, you explore the Guardium GUI and learn how to classify data in your database environment. You create a new classification policy that searches for credit card numbers and populates the Sensitive Objects group with the table name and column name for each detected incident.
The lab environment reflects Guardium 10.5.
Franklin Almonte
- An apps ecosystem that enables integration of your own functionality into Guardium
- An expansion of file discovery and classification to more deployment models
- Updates to Vulnerability Assessment, including support for SAP HANA
- Enhanced integration to support Guardium Big Data Intelligence use cases
- Platform enhancements for currency, security, and manageability
- Guardium App Exchange (Ecosystem)
- File Access Monitoring (FAM) for SharePoint and NAS
- Platform / OS changes
- CyberArk integration
- Currency updates
- Sniffer updates
- Guardium Big Data Intelligence (GBDI) integration
- STAP, ATAP, and GIM updates
- Vulnerability Assessment (VA)
- IBM License Metric Tool (ILMT)
In this Tech Talk, Shay Harel discusses several new IBM Guardium 10.6 enhancements that improve usability, core functionality and enable greater extensibility to new types of data environments. In the area of usability, there is a new policy builder user interface, as well as easier to use query report builder. There are new monitoring capabilities for Database as a Service. In addition, Guardium performance has been enhanced. Vulnerability assessment has improved accuracy and scan granularity. File access management with NAS and SharePoint enables consistent data protection across unstructured as well as structured data.
In this video, Shay Harel, Director of Data Security Engineering, explores the new features and updates in IBM Guardium v11.
Topics include:
- Upgrade
- Active threat analytics
- Risk spotter
- Policy analyzer
- Smart Assistant
- CyberArk integration
- Data protection for files (Sharepoint and NAS)
- Vulnerability Assessment enhancements
- External STAP with Kubernetes
- Monitor DBaaS without STAP
- New platform support database
- Miscellaneous updates
In this video, Shay Harel, Director of Data Security Engineering,
explores the new features and updates in IBM Guardium v11.1.
|
|
|
It is easy to use the predefined alerts in Guardium. In this course, you to learn about the different Guardium alert types and how to use them to monitor your Guardium ecosystem.
Data security breaches are more frequent and more expensive than in the past. Even more pressing, insider data breaches are present in many data breaches and they make up a great percentage of the total data breach expense for organizations. Why are insider threat-related breaches costly? Insiders, or those who pose as insiders, have more access to sensitive and regulated data and therefore can do more damage.
These realities mean that single niche vendors, with their siloed and narrow scope, are less capable of addressing complex modern data security, privacy, and compliance requirements. To help you traverse this new and potentially confusing landscape, make sure you can achieve the following good practices:
- Spot, stop, and defend your organization from data breaches
- Reduce the burden of remediating a data breach
- Modernize your data security solutions
- Quickly gather audit data
- Integrate and collaborate with a security ecosystem
In this video, Leila Johannesen discusses the enhancements in Guardium
11.2 that allow you to more easily understand the health of your system.