Guardium General

This category includes general Guardium courses.

Guardium General Courses:

Common Guardium Data Protection Support Issues

Avi Walerius from Guardium Support provides an overview of Guardium Data Protection issues including Full Database, Missing DB Users, and K-TAP Severity 1 problems.  The presentation contains a number of important resources for full details on each issue and how to avoid or resolve them.

What's new in Guardium 11.2

In this video, Shay Harel, Director of Data Security Engineering, explores the new features and updates in IBM Guardium v11.2.









Topics include:

  • Deployment Health
  • Asset reconciliation  
  • LDAP import
  • 2FA using DUO
  • FAM enhancements
  • Auto create inspection engine
  • GIM upload modules
  • Active threat detection
  • Vulnerability Assessment enhancements 
  • Ticketing support for audit process 
  • S-TAP updates 
  • Outliers clustering
  • Session Level Policy updates
  • ELB failover


Defining the Guardium Navigation menu

You can use the Guardium Navigation menu to access the Guardium user interface. The icons that are displayed on the Navigation menu depend on your user roles. 

What's new in Guardium Data Protection v11.3

An overview of the features and enhancements of the Guardium Data Protection version 11.3 release.

Tour Guardium on the Security Learning Academy

Join the IBM Security Learning Services team for an in-depth tour of the Security Learning Academy, with a focus on IBM Security Guardium course offerings. In this video, you will see how to navigate the platform, search the course catalog, enroll in a course, view your enrollments on your dashboard, create progress reports, and see how Security Learning Academy is integrated with IBM VIP Rewards for Security.

Facilitating secure hybrid cloud adoption with Guardium

Learn how IBM Security Guardium helps organizations expand data protection capabilities across hybrid/multi-cloud deployment models and take advantage of fast-paced innovation delivered through cloud-enabled services securely.

There is a fundamental shift in the way IT is providing services through modernized infrastructure and SecDevOps driven operational models. This shift, in turn, is affecting all the facets of application management, including the way organizations use and consume next-generation database management solutions.

Topics covered
  • Cloud trends
  • Database service use cases
  • Cloud journey
  • Data protection
  • External-TAP
  • Native logging
  • Streaming APIs
  • Considerations
  • Adoption
  • Guardium for database services

  • IBM Guardium 10.6 Multi-threading capability

    IBM Guardium version 10.6 introduces multi-threading capabilities to vulnerability assessment. With multi-threading, you can run vulnerability assessments in parallel, reducing completion time while more efficiently using CPU resources. 

    In this video series, you will see how to configure vulnerability assessment multi-threading.

    IBM Security Guardium Foundations

    Are you getting ready to administer database security policies? Learn how to configure Guardium to discover, classify, analyze, protect, and control access to sensitive data. You learn to perform vulnerability assessment, and how to monitor data and file activity. This course teaches you how to create reports, audits, alerts, metrics, and compliance oversight processes. 

    Objectives 

    • Identify the primary functions of IBM Security Guardium
    • Apply key Guardium architecture components
    • Navigate the Guardium user interface and command line interface
    • Manage user access to Guardium
    • Build and populate Guardium groups
    • Use the administration console to manage Guardium components
    • Configure policy rules that process the information gathered from database and file servers
    • Use the configuration auditing system, Vulnerability Assessment application, and Database Discovery to perform data security tasks
    • Create queries and reports to examine trends and gather data
    • Automate compliance workflow processes
    • Use file activity monitoring to keep track of the files on your servers

    Overview of the IBM Guardium User Interface

    This course introduces  you to the Guardium interface and command line interface. You learn how to access common Guardium features and applications. You can use the Guardium command line interface (CLI) to automate and script functions that are frequently used. You learn how to search the CLI for commands and list applicable options.

    In the lab, you explore the Guardium GUI and learn how to classify data in your database environment. You create a new classification policy that searches for credit card numbers and populates the Sensitive Objects group with the table name and column name for each detected incident. 

    The lab environment reflects Guardium 10.5.

    Franklin Almonte


    What's New in Guardium 10.5

    The IBM Security Guardium Data Protection v10.5 platform continues to evolve to support a wider variety of use cases, both by adding new functionality and by opening up the platform to support application integration.  In this tech talk, you will get an overview of the new and updated Guardium features, including:

    • An apps ecosystem that enables integration of your own functionality into Guardium 
    • An expansion of file discovery and classification to more deployment models 
    • Updates to Vulnerability Assessment, including support for SAP HANA 
    • Enhanced integration to support Guardium Big Data Intelligence use cases 
    • Platform enhancements for currency, security, and manageability

    Bookmarks in the video take you to the following topics:

    • Guardium App Exchange (Ecosystem)
    • File Access Monitoring (FAM) for SharePoint and NAS
    • Platform / OS changes
    • CyberArk integration
    • Currency updates
    • Sniffer updates
    • Guardium Big Data Intelligence (GBDI) integration
    • STAP, ATAP, and GIM updates
    • Vulnerability Assessment (VA)
    • IBM License Metric Tool (ILMT)


    What's new in Guardium 10.6

    In this Tech Talk, Shay Harel discusses several new IBM Guardium 10.6 enhancements that improve usability, core functionality and enable greater extensibility to new types of data environments. In the area of usability, there is a new policy builder user interface, as well as easier to use query report builder. There are new monitoring capabilities for Database as a Service. In addition, Guardium performance has been enhanced. Vulnerability assessment has improved accuracy and scan granularity. File access management with NAS and SharePoint enables consistent data protection across unstructured as well as structured data.

    What's new in Guardium 11.0

    In this video, Shay Harel, Director of Data Security Engineering, explores the new features and updates in IBM Guardium v11. 

    Topics include:

    • Upgrade
    • Active threat analytics
    • Risk spotter
    • Policy analyzer
    • Smart Assistant
    • CyberArk integration
    • Data protection for files (Sharepoint and NAS)       
    • Vulnerability Assessment enhancements
    • External STAP with Kubernetes
    • Monitor DBaaS without STAP
    • New platform support database
    • Miscellaneous updates

    What's new in Guardium 11.1

    In this video, Shay Harel, Director of Data Security Engineering, explores the new features and updates in IBM Guardium v11.1. 






    • Mapping applications
    • Active threat analytics                         
    • Risk spotter
    • ServiceNow integration
    • Auto create inspection engine
    • IPv6 support
    • Cloud database updates  
    • Vulnerability Assessment enhancements  
    • S-TAP updates 
    • Mainframe updates
    • Sankey diagram for advanced investigations

    Getting started with Guardium alerts

    It is easy to use the predefined alerts in Guardium. In this course, you to learn about the different Guardium alert types and how to use them to monitor your Guardium ecosystem.

    Why Guardium?

    Data security breaches are more frequent and more expensive than in the past. Even more pressing, insider data breaches are present in many data breaches and they make up a great percentage of the total data breach expense for organizations.  Why are insider threat-related breaches costly? Insiders, or those who pose as insiders, have more access to sensitive and regulated data and therefore can do more damage. 

    These realities mean that single niche vendors, with their siloed and narrow scope, are less capable of addressing complex modern data security, privacy, and compliance requirements. To help you traverse this new and potentially confusing landscape, make sure you can achieve the following good practices: 

    • Spot, stop, and defend your organization from data breaches
    • Reduce the burden of remediating a data breach
    • Modernize your data security solutions 
    • Quickly gather audit data
    • Integrate and collaborate with a security ecosystem
    Guardium is uniquely positioned to provide a modern data security solution that is centered around your security requirements

    Guardium TechBook

    The Guardium TechBook consists of several video presentations on key topics that provide a current technical foundation for IBM Security Guardium Data Protection. These are the topics covered:

    • Architecture, Deployment and Automation
    • Data Collection methods
    • GIM and S-TAP installation
    • Data Protection
    • Reporting and auditing
    • Policy management
    • Analytics
    • Administration performance
    • Guardium Vision
    • Guardium Insights introduction
    • Guardium for z/OS Overview and Best Practices

    IBM Security Guardium Foundations badge
    NEW

    Picture of the badge

    IBM Guardium Foundations

    IBM Security Guardium is a comprehensive data security platform that can help you support compliance initiatives, privacy initiatives, big data security projects, and comprehensive data protection. This course introduces you to Guardium. The following objectives are included in this course:

    • Use the Guardium user interface
    • Describe user access roles in Guardium
    • Create and populate Guardium groups
    • Monitor system and manage data with Guardium
    • Configure Guardium policies 
    • Use Guardium to perform data security tasks 
    • Create and clone a Guardium report

    Guardium and Resilient integration: Email Connector

    In this video, you will see how to set up IBM Guardium email alerts in an IBM Resilient incident response workflow using the Resilient Email Connector.

    Deployment Health Enhancements in Guardium 11.2

    In this video, Leila Johannesen discusses the enhancements in Guardium 11.2 that allow you to more easily understand the health of your system.