Guardium General

This category includes general Guardium courses.

Guardium General Courses:

Why Guardium?

Data security breaches are more frequent and more expensive than in the past. Even more pressing, insider data breaches are present in many data breaches and they make up a great percentage of the total data breach expense for organizations.  Why are insider threat-related breaches costly? Insiders, or those who pose as insiders, have more access to sensitive and regulated data and therefore can do more damage. 

These realities mean that single niche vendors, with their siloed and narrow scope, are less capable of addressing complex modern data security, privacy, and compliance requirements. To help you traverse this new and potentially confusing landscape, make sure you can achieve the following good practices: 

  • Spot, stop, and defend your organization from data breaches
  • Reduce the burden of remediating a data breach
  • Modernize your data security solutions 
  • Quickly gather audit data
  • Integrate and collaborate with a security ecosystem
Guardium is uniquely positioned to provide a modern data security solution that is centered around your security requirements

Guardium TechBook

The Guardium TechBook consists of several video presentations on key topics that provide a current technical foundation for IBM Security Guardium Data Protection. These are the topics covered:

  • Architecture, Deployment and Automation
  • Data Collection methods
  • GIM and S-TAP installation
  • Data Protection
  • Reporting and auditing
  • Policy management
  • Analytics
  • Administration performance
  • Guardium Vision
  • Guardium Insights introduction
  • Guardium for z/OS Overview and Best Practices