SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
Security Data Sheet
IBM Security Guardium
Data Activity Monitor
Continuously monitor data access and protect sensitive
data across the enterprise
Highlights
●● ● ●
Uncover risks to sensitive data through
data discovery, classification and privi-
leged access discovery to automatically
take action or report for compliance
●● ● ●
Reduce data breach risk and extend
security intelligence with in-depth data
protection
●● ● ●
Provide a streamlined and adaptable
solution for real-time monitoring access to
high-value databases, data warehouses,
files, cloud and big-data environments
●● ● ●
Minimize total cost of ownership
with robust scalability, simplification,
automation, analytics and transparency
for a range of deployments—whether
they are small, large or enterprise-wide
IBM® Security Guardium® Data Activity Monitor empowers security
teams to analyze, protect and adapt for comprehensive data protection in
heterogeneous environments, including databases, data warehouses, files,
file shares, cloud, and big-data platforms such as Hadoop and NoSQL.
The solution continuously monitors all data access operations in real
time to detect unauthorized actions, based on detailed contextual
information—the “who, what, where, when and how” of each data access.
Guardium Data Activity Monitor reacts immediately to help prevent
unauthorized or suspicious activities by privileged insiders and potential
hackers. It automates data security governance controls in heterogeneous
enterprises.
Guardium Data Activity Monitor improves security and supports compli-
ance requirements through a set of core capabilities that help reduce risk
and minimize cost of ownership. These capabilities are available in four
offering levels: Express Data Activity Monitor, Standard Data Activity
Monitor, Advanced Data Activity Monitor, and Central Management and
Aggregation Pack.
2
Data SheetSecurity
Risk reduction
For any given organizational action or activity, there is the
potential risk of sensitive data exposure or loss. The probability
or threat of damage, liability or data loss caused by external or
internal vulnerability can be avoided through quick response
or preemptive action. Guardium Data Activity Monitor
reduces data breach risk by providing real-time data security
and intelligence with features such as:
●● ●
Automatic identification of risky data or configurations—
Uses data discovery, classification, entitlement reports and
audit records to identify data at risk, such as dormant sensi-
tive data or outdated entitlements and over-privileges to data.
●● ●
Real-time data activity monitoring with application
end-user translation
– Provides 100 percent visibility and granularity into all data-
base, files, file share, data warehouse, Hadoop and NoSQL
transactions across all platforms and protocols—with a
secure, tamper-proof audit trail that supports segregation
of duties.
– Monitors and enforces a wide range of policies for sensi-
tive-data access, privileged-user actions, change control,
application-user activities and security exceptions.
– Monitors all data transactions to create a continuous,
fine-grained audit trail of all data sources that identifies
the “who, what, when, where and how” of each transaction,
including execution of all SQL commands on all database
objects.
– Audits all logins/logouts, security exceptions such as
login failures and SQL errors and extrusion detection
(identifying sensitive data returned by queries).
– Creates a single, centralized audit repository for enterprise-
wide compliance reporting, performance optimization,
investigations and forensics.
●● ●
Real-time security alerts—Creates alerts in real time when
a security policy is violated—including alerts to enterprise-
wide security information and event management (SIEM)
systems. IBM Security QRadar® provides bidirectional com-
munications to Guardium, so you can take immediate action.
●● ●
Real-time data masking (via the Guardium S-GATE
agent)—Helps ensure that critical data does not fall into the
wrong hands. Guardium Data Activity Monitoring looks at
the data content leaving the data sources and obfuscates
non-authorized fields according to the requestor privileges.
●● ●
Real-time blocking (via S-GATE), including user
quarantine and firewall IDs
Guardium Data Activity Monitor provides comprehensive protection. It makes
it easy to see which databases and big-data platforms contain sensitive data,
monitor data access, and take action to help protect against internal and
external threats.
Hadoop
Protect cloud environments
Protect databases
and big data
Protect files
DOC PDF XML JS
NoSQL
Oracle
Teradata
IBM DB2
IBM Security
Guardium
3
Data SheetSecurity
– Establishes preventive controls across the enterprise.
Guardium Data Activity Monitor provides automated,
real-time controls that help prevent privileged users from
performing unauthorized actions such as executing queries
on sensitive tables, changing sensitive data values, adding
or deleting critical tables (schema changes) outside the
change management process, and creating new user
accounts and modifying privileges.
– Reacts to suspicious activity by blocking activity or quaran-
tining the requestor.
– Implements firewall IDs that allow specified users to access
certain servers for a particular time period to accommodate
certain activities such as maintenance windows without
affecting database security configurations.
●● ●
Custom report builder with drill-down capabilities—
Customizes and filters security reports to display the parame-
ters that are relevant to your organization. Some common
reports include: SQL errors, failed logins, terminated users
and policy violations.
●● ●
Best-practice recommendations in predefined reports
and alerts—Provides a variety of predefined reports with
different views of entitlement data, enabling organizations
to quickly and easily identify security risks such as inappro-
priately exposed objects, users with excessive rights and
unauthorized administrative actions. Examples of the
numerous predefined reports include: system, administrator
and object privileges with SQL-level detail drill-downs by
user and all objects. Entitlement information is stored in a
forensically secure and tamper-proof repository, along with
all data source audit information. Custom reports can be
easily built by using an intuitive drag-and-drop interface.
Streamlined graphical user interface
provides centralized control
IT organizations today are under high pressure to maximize the
use of their resources and time. Low-level security operations
or manual processes are wasteful, risky and error-prone. As your
business data needs grow, the scope of the data security and
compliance projects increases. You need security solutions to
become more streamlined and adaptable as your needs change.
In the era of big data, Guardium Data Activity Monitor pro-
vides key capabilities to help organizations streamline and adapt
data protection and security management without impacting
data sources, networks, or applications, such as:
●● ●
Dynamic graphical user interface (GUI) helps build and
update data and user groups—Maximizes the protection
delivered by Guardium. With one click, groups, policies, tests
and other configurable parameters can be updated to adapt
to the constantly evolving nature of the IT environment,
database infrastructure and associated threats. Automated
group management is used in audit reports, alerts and real-
time policies to facilitate maintenance—despite constant
changes in the IT environment. Whitelists or blacklists can
be generated on any auditable item, for example, users,
IP addresses, table names and so forth. Group maintenance
can be done manually through the GUI or automated with
Lightweight Directory Access Protocol (LDAP) integration.
Groups can be populated using queries or GuardAPIs.
You can synchronize with user groups in Microsoft
Active Directory, IBM Security Directory Server, Novell,
OpenLDAP, Sun ONE, IBM z/OS® and more. Handling
policies, reporting and auditing indirectly through groups
helps to keep a consistent management process, despite the
constant change in the environment.
4
Data SheetSecurity
●● ●
Centralized management automates the deployment of
Guardium—Provides centralized management through a
single web-based console. The scalable multi-tier architecture
supports large and small environments with built-in health-
check dashboards. Software updates are handled centrally and
automatically without having to involve the change manage-
ment team or resource owners.
●● ●
Database discovery, data classification and entitlement
reports—Discovers and classifies sensitive data. The discov-
ery process can be configured through the Guardium GUI
to probe specified network segments on a schedule or on
demand. Once instances of interest are identified, the content
is examined to identify and classify sensitive data. Entitlement
reports provide an automatic risk assessment on who is con-
figured to access the sensitive data.
●● ●
Powerful analytic insights—Enables organizations to cen-
trally visualize and analyze data activity from a heterogeneous
data environment using a single format. The Guardium
GUI includes leading-edge analytic tools—such as connec-
tion profiling, Quick Search real-time forensics, outlier
detection algorithms and an investigative dashboard—that
provide actionable insights on data access behavior.
●● ●
Predefined security policies—Allows you to create and
manage your own data security policies based on audit data
or leverage out-of-the-box predefined policies. The policies
can be built to detect any threat scenario against the data
utilizing the most common audit constructs such as who,
from where, when, where to, on what, what action and other
contextual information. Examples of security policies include:
– Access policies that identify anomalous behavior by contin-
uously comparing all data activity to a baseline of normal
behavior. An example of anomalous behavior would
be an SQL injection attack, which typically exhibits pat-
terns of data access that are uncharacteristic of standard
line-of-business applications.
– Exception policies that are based on definable thresholds,
such as an excessive number of failed logins or SQL errors.
– Extrusion policies that examine data leaving the data repos-
itory for specific data value patterns, such as credit card
numbers.
●● ●
Guardium GUI has customizable compliance workflows
with preset compliance accelerators for common compli-
ance requirements—Centralizes and automates oversight
processes enterprise-wide, including report generation,
distribution, electronic sign-offs and escalations. It creates
custom processes without sacrificing security. It ensures that
some team members see only data and tasks related to their
own roles and stores process results in a secure centralized
repository. It supports compliance with Sarbanes-Oxley
(SOX), Payment Card Industry (PCI), Health Insurance
Portability and Accountability Act (HIPAA) and other
regulations with predefined reports. An easy-to-use GUI
allows a wide variety of processes to be created to match the
unique needs of the tasks and individuals involved. Reports
can be exported in varying formats, including PDF, comma-
separated values (CSV), common event format (CEF), Syslog
forwarding, Security Content Automation Protocol (SCAP)
or custom schemas.
●● ●
Secure and self-sustained platform through the
Guardium GUI—Audits all operations, including adminis-
tration and configuration tasks, to maintain compliance
controls, segregation of duties, and compliance with the
latest security mandates and Federal Information Processing
Standards (FIPS) 140-2.
5
Data SheetSecurity
Performance
Business moves fast and clients demand continual access to
data. As a result, IT environments with diverse databases,
transactional applications, analytics platforms, file systems and
emerging big-data applications are required to meet aggressive
service level agreements for availability, performance and
responsiveness. Compliance requirements need to be addressed
and security strategies implemented without impacting perfor-
mance. Guardium Data Activity Monitor can be implemented
with negligible performance impact—less than 1 percent over-
head in most cases—using key capabilities, such as:
●● ●
An operating system-based agent—Provides full visibility
of data traffic without affecting the performance of the data
source or application, as in the case of native audit logging.
●● ●
Filtering of database traffic—Avoids unnecessary database
audit traffic by monitoring only what is required, such as
the data traffic already going from the operating system to
the data source, and sending it out of band for analysis.
●● ●
Centralized load balancing for multi-tier architecture—
Enables Guardium agents (STAPs) to be automatically
distributed, so they can automatically find the most optimal
configuration to send their data activity traffic.
●● ●
Support for 64-bit architecture—Provides the ability to
handle and store more data traffic data with fewer resources.
Protect critical data Central manager
from a single The load balancer optimizes
console real-time monitoring
Data collection layer
Scalability
Driven by a rapidly changing business landscape that includes
mergers, outsourcing, cloud deployments, workforce adjust-
ments and accelerating business automation, data sources
continue to proliferate over geographical and organizational
boundaries. In addition, data is growing in terms of volume,
variety and velocity, and it now resides in new types of data
stores, such as Hadoop and NoSQL databases. Given current
IT resource constraints, the complexity of environments and
escalating workloads, many organizations want to increase
automation in their data security and compliance operations.
With automated load balancing, Guardium Data Activity Monitor enables
organizations to easily adapt to IT changes that affect data security.
IBM Security Guardium S-TAP probes
6
Data SheetSecurity
Guardium Data Activity Monitor is equipped to seamlessly
scale from one data source to tens of thousands without
disrupting operations. Automation capabilities include:
●● ●
Guardium Grid automates adaptation to changes in the
data—Automatically balances the load and handles changes
or additions to the environment without impacting the per-
formance or availability of the data monitoring infrastructure.
Guardium Data Activity Monitor dynamically adds or drops
data sources without altering configurations. Guardium Grid
provides elasticity for supporting large deployments in fre-
quent change. Load balancing scalability and performance
features help clients reduce management costs, minimize
the need to manage detailed configuration information
(IP addresses or hostnames) as data sources are added or
removed, and simplify data capacity expansion projects.
●● ●
GuardAPI support for batch operations—Facilitates
integration of any IT process with Guardium Data Activity
Monitor. GuardAPI is a script-based command-line interface
(CLI) to Guardium, which allows any operation to be per-
formed remotely.
●● ●
Centralized aggregation—Merges and normalizes audit
reports from multiple data sources to produce enterprise-
wide reports and a forensics source.
●● ●
Centralized management—Controls operations and policy
setting from a central location, including hands-off agent
updates, policy control, Guardium environment health and
load balancing.
Integration
Most organizations have a diverse set of IT and security
solutions in place today, such as ticketing systems or SIEM
solutions. All of these solutions eventually require interaction
with data security. Most existing security solutions lack the
complete visibility into data access patterns required by regula-
tory mandates. Guardium Data Activity Monitor provides
analytics-based, in-depth insight while seamlessly integrating
into existing security solutions, such as QRadar or ArcSight.
In addition, Guardium Data Activity Monitor provides
a modular integration model with existing IT systems,
such as data management, ticketing and archiving solutions.
The goal is to streamline IT and security operations by comple-
menting and extending them with data security capabilities,
including:
●● ●
Integration with IT operations—Guardium Data
Activity Monitor includes built-in, ready-to-use support
for Oracle, IBM DB2®, Sybase, Microsoft SQL Server,
IBM Informix®, mySQL, Teradata, IBM PureSystems®,
Hadoop, IBM InfoSphere® BigInsights™, PostgreSQL,
NoSQL, MongoDB, SAP HANA and more across all major
protocols, including: HTTP, HTTPS, FTP, SAMBA and
IBM iSeries connections to CSV text file data sources.
It can also seamlessly share information with common IT
operations tools, such as ticketing systems, where Guardium
tracks ticket IDs within data access audit records.
●● ●
Integration with security systems and standards (QRadar,
HP ArcSight, Radius, LDAP)—Changes to users, groups,
roles and authentication to data sources and applications can
be updated automatically and directly from directories such
as LDAP, Radius and Active Directory. Organizations can
automatically handle any staff or user changes while keeping
the policies and reports intact, avoiding the need to con-
stantly modify them. In addition, IT staff can send alerts and
all audit information to a SIEM. QRadar users experience
bidirectional integration, allowing QRadar to issue alerts and
change policies for immediate data protection.
●● ●
Guardium Universal Feed and Enterprise Integrator—
Simplifies and automates the integration of data from
external data sources or text files into the Guardium reposi-
tory. With data housed in the repository, the full array of
Guardium policy, analysis, reporting and workflow tools
can be leveraged. It allows input data from other sources to
participate in the correlation analysis from change ticketing
systems. Organizations can import descriptive information
such as full names and phone numbers corresponding to user
names to streamline investigation of exceptions; integrate
information from identity and access management systems,
such as roles and departments, to enable fine-grained security
policies; and connect to IBM Spectrum Protect™, formerly
known as IBM Tivoli® Storage Manager, and EMC Centera
to archive audit data and oversight process results.
7
Data SheetSecurity
Why Guardium?
Guardium is part of IBM Security Systems Framework and
IBM Data Security Privacy Platform. Data Security and Privacy
Platform provides end-to-end data protection capabilities to
discover and analyze, protect, integrate and manage the critical
data in your environment. Guardium provides all the building
blocks you need for data protection—from meeting compliance
requirements all the way through to broader data protection.
The portfolio is modular, so you can start anywhere and
mix and match security software building blocks with compo-
nents from other vendors or choose to deploy multiple
building blocks together for increased acceleration and value.
The security platform is an enterprise-class foundation for
information-intensive projects providing the performance,
scalability, reliability and acceleration needed to simplify
difficult challenges and deliver trusted information to your
business faster.
IBM Security Guardium is a comprehensive data security platform that
helps security teams secure and manage all types of sensitive data
consistently, whether it is in big-data platforms, databases or file systems,
across distributed and mainframe (IBM z Systems™) environments.
Why IBM?
IBM Security offers one of the most advanced and integrated
portfolios of enterprise security products and services. The
portfolio, supported by world-renowned IBM X-Force®
research and development, provides security intelligence to help
organizations holistically protect their people, infrastructures,
data and applications, offering solutions for identity and access
management, database security, application development, risk
management, endpoint management, network security and
more. These solutions enable organizations to effectively
manage risk and implement integrated security for mobile,
cloud, social media and other enterprise business architectures.
IBM operates one of the world’s broadest security research,
development and delivery organizations, monitors 15 billion
security events per day in more than 130 countries, and holds
more than 3,000 security patents.
For more information
To learn more about IBM Security Guardium Data Activity
Monitor, please contact your IBM representative or
IBM Business Partner, or visit: ibm.com/guardium
Additionally, IBM Global Financing provides numerous pay-
ment options to help you acquire the technology you need to
grow your business. We provide full lifecycle management of
IT products and services, from acquisition to disposition. For
more information, visit: ibm.com/financing
File systems
Databases and
data warehouses
Big-data
platforms
Applications
Cloud
environments
IBM
Security
Guardium
Discovery, classification,
vulnerability assessment and
entitlement reporting
Encryption, masking
and redaction
Data and file activity
monitoring
Dynamic blocking and
masking, alerts, and
quarantines
Compliance automation
and auditing
Analytics
© Copyright IBM Corporation 2016
IBM Security
Route 100
Somers, NY 10589
Produced in the United States of America
February 2016
IBM, the IBM logo, ibm.com, Guardium, z/OS, QRadar, Informix,
InfoSphere, BigInsights, iSeries, PureSystems, Tivoli, IBM Spectrum
Protect, z Systems, DB2, and X-Force are trademarks of International
Business Machines Corp., registered in many jurisdictions worldwide.
Other product and service names might be trademarks of IBM or other
companies. A current list of IBM trademarks is available on the web at
“Copyright and trademark information” at ibm.com/legal/copytrade.shtml
Microsoft is a trademark of Microsoft Corporation in the United States,
other countries, or both.
This document is current as of the initial date of publication and may be
changed by IBM at any time. IBM Business Partners set their own prices,
which may vary.
The performance data discussed herein is presented as derived under
specific operating conditions. Actual results may vary. It is the user’s
responsibility to evaluate and verify the operation of any other products or
programs with IBM products and programs.
THE INFORMATION IN THIS DOCUMENT IS PROVIDED
“AS IS” WITHOUT ANY WARRANTY, EXPRESS OR
IMPLIED, INCLUDING WITHOUT ANY WARRANTIES
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE AND ANY WARRANTY OR CONDITION OF
NON-INFRINGEMENT. IBM products are warranted according to the
terms and conditions of the agreements under which they are provided.
The client is responsible for ensuring compliance with laws and regulations
applicable to it. IBM does not provide legal advice or represent or warrant
that its services or products will ensure that the client is in compliance with
any law or regulation.
Statements regarding IBM’s future direction and intent are subject to
change or withdrawal without notice, and represent goals and
objectives only.
Please Recycle
Statement of Good Security Practices: IT system security involves
protecting systems and information through prevention, detection and
response to improper access from within and outside your enterprise.
Improper access can result in information being altered, destroyed,
misappropriated or misused or can result in damage to or misuse of your
systems, including for use in attacks on others. No IT system or product
should be considered completely secure and no single product, service
or security measure can be completely effective in preventing improper
use or access. IBM systems, products and services are designed to be
part of a lawful, comprehensive security approach, which will necessarily
involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT
WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES
ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT
OF ANY PARTY.
WGD03075-USEN-01

Mais conteúdo relacionado

Mais procurados

Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...solarisyougood
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification PresentationDerroylo
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM AlienVault
 
Splunk for Enterprise Security and User Behavior Analytics
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior AnalyticsSplunk
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk
 
Microsoft Sentinel- a cloud native SIEM & SOAR.pdf
Microsoft Sentinel- a cloud native SIEM  & SOAR.pdfMicrosoft Sentinel- a cloud native SIEM  & SOAR.pdf
Microsoft Sentinel- a cloud native SIEM & SOAR.pdfKranthi Aragonda
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)hardik soni
 
Microsoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionMicrosoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionDavid J Rosenthal
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesCamilo Fandiño Gómez
 
Best practises for log management
Best practises for log managementBest practises for log management
Best practises for log managementBrian Honan
 

Mais procurados (20)

Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
 
HP ArcSight
HP ArcSight HP ArcSight
HP ArcSight
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification Presentation
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
Splunk for Enterprise Security and User Behavior Analytics
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior Analytics
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Splunk-Presentation
Splunk-Presentation Splunk-Presentation
Splunk-Presentation
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
 
Microsoft Sentinel- a cloud native SIEM & SOAR.pdf
Microsoft Sentinel- a cloud native SIEM  & SOAR.pdfMicrosoft Sentinel- a cloud native SIEM  & SOAR.pdf
Microsoft Sentinel- a cloud native SIEM & SOAR.pdf
 
IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Microsoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionMicrosoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat Protection
 
Arcsight explained
Arcsight explainedArcsight explained
Arcsight explained
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
Best practises for log management
Best practises for log managementBest practises for log management
Best practises for log management
 

Destaque

Attack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainAttack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainIBM Security
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)Peter Tutty
 
the-real-world-of-the-database-administrator-white-paper-15623
the-real-world-of-the-database-administrator-white-paper-15623the-real-world-of-the-database-administrator-white-paper-15623
the-real-world-of-the-database-administrator-white-paper-15623Gustavo Carneiro
 
What is a white paper 6 feb
What is a white paper 6 febWhat is a white paper 6 feb
What is a white paper 6 febMakarand Pandit
 
How to write a technology white paper to increase sales
How to write a technology white paper to increase salesHow to write a technology white paper to increase sales
How to write a technology white paper to increase salesAna Thompson
 
Amazon whitepaper
Amazon whitepaperAmazon whitepaper
Amazon whitepaperPetit182
 
White Paper - How Data Works
White Paper - How Data WorksWhite Paper - How Data Works
White Paper - How Data WorksDavid Walker
 
Whitepaper: Volume Testing Thick Clients and Databases
Whitepaper:  Volume Testing Thick Clients and DatabasesWhitepaper:  Volume Testing Thick Clients and Databases
Whitepaper: Volume Testing Thick Clients and DatabasesRTTS
 
B2B White Papers Examples
B2B White Papers ExamplesB2B White Papers Examples
B2B White Papers ExamplesAna Thompson
 
Creating effective white papers and industry reports
Creating effective white papers and industry reportsCreating effective white papers and industry reports
Creating effective white papers and industry reportsSonia Quinones
 
Presentation on White paper
Presentation on White paperPresentation on White paper
Presentation on White paperMuhammad Rehman
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemKaspersky Lab
 
How to write a good white paper
How to write a good white paperHow to write a good white paper
How to write a good white paperslidale
 

Destaque (15)

Attack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainAttack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack Chain
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
 
the-real-world-of-the-database-administrator-white-paper-15623
the-real-world-of-the-database-administrator-white-paper-15623the-real-world-of-the-database-administrator-white-paper-15623
the-real-world-of-the-database-administrator-white-paper-15623
 
What is a white paper 6 feb
What is a white paper 6 febWhat is a white paper 6 feb
What is a white paper 6 feb
 
How to write a technology white paper to increase sales
How to write a technology white paper to increase salesHow to write a technology white paper to increase sales
How to write a technology white paper to increase sales
 
Amazon whitepaper
Amazon whitepaperAmazon whitepaper
Amazon whitepaper
 
White Paper - How Data Works
White Paper - How Data WorksWhite Paper - How Data Works
White Paper - How Data Works
 
Whitepaper: Volume Testing Thick Clients and Databases
Whitepaper:  Volume Testing Thick Clients and DatabasesWhitepaper:  Volume Testing Thick Clients and Databases
Whitepaper: Volume Testing Thick Clients and Databases
 
B2B White Papers Examples
B2B White Papers ExamplesB2B White Papers Examples
B2B White Papers Examples
 
Creating effective white papers and industry reports
Creating effective white papers and industry reportsCreating effective white papers and industry reports
Creating effective white papers and industry reports
 
Presentation on White paper
Presentation on White paperPresentation on White paper
Presentation on White paper
 
Blockchain white paper
Blockchain white paperBlockchain white paper
Blockchain white paper
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating System
 
LinkedIn Powerpoint Template - Slideworld.com
LinkedIn Powerpoint Template - Slideworld.comLinkedIn Powerpoint Template - Slideworld.com
LinkedIn Powerpoint Template - Slideworld.com
 
How to write a good white paper
How to write a good white paperHow to write a good white paper
How to write a good white paper
 

Semelhante a Whitepaper IBM Guardium Data Activity Monitor

Executive Summary_2016
Executive Summary_2016Executive Summary_2016
Executive Summary_2016Annie Cute
 
Guardium Suite_seguridad de los datos...
Guardium Suite_seguridad de los datos...Guardium Suite_seguridad de los datos...
Guardium Suite_seguridad de los datos...EdiverLadino
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptxTranVu383073
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDMGreg Cranley
 
GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014Ravindran Vasu
 
Demystifying Cloud Security Compliance
Demystifying Cloud Security ComplianceDemystifying Cloud Security Compliance
Demystifying Cloud Security ComplianceMirantis
 
2015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #22015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #2Harriet Schneider
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Office 365 Dashboards - Analytical Reporting Tools
Office 365 Dashboards - Analytical Reporting ToolsOffice 365 Dashboards - Analytical Reporting Tools
Office 365 Dashboards - Analytical Reporting ToolsUnifyCloud
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreSeclore
 
Balabit Company Overview
Balabit Company OverviewBalabit Company Overview
Balabit Company OverviewBalaBit
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence SystemJoseph Yosi Margalit
 
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools SolarWinds
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceCamilo Fandiño Gómez
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_securityGreg Hanchin
 
Security 101: IBM i Security Auditing and Reporting
Security 101: IBM i Security Auditing and ReportingSecurity 101: IBM i Security Auditing and Reporting
Security 101: IBM i Security Auditing and ReportingPrecisely
 

Semelhante a Whitepaper IBM Guardium Data Activity Monitor (20)

Executive Summary_2016
Executive Summary_2016Executive Summary_2016
Executive Summary_2016
 
Guardium Suite_seguridad de los datos...
Guardium Suite_seguridad de los datos...Guardium Suite_seguridad de los datos...
Guardium Suite_seguridad de los datos...
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
NogaLogic
NogaLogicNogaLogic
NogaLogic
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDM
 
GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014
 
Demystifying Cloud Security Compliance
Demystifying Cloud Security ComplianceDemystifying Cloud Security Compliance
Demystifying Cloud Security Compliance
 
AGSL brochure
AGSL brochureAGSL brochure
AGSL brochure
 
2015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #22015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #2
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Office 365 Dashboards - Analytical Reporting Tools
Office 365 Dashboards - Analytical Reporting ToolsOffice 365 Dashboards - Analytical Reporting Tools
Office 365 Dashboards - Analytical Reporting Tools
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | Seclore
 
Balabit Company Overview
Balabit Company OverviewBalabit Company Overview
Balabit Company Overview
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_security
 
Security 101: IBM i Security Auditing and Reporting
Security 101: IBM i Security Auditing and ReportingSecurity 101: IBM i Security Auditing and Reporting
Security 101: IBM i Security Auditing and Reporting
 

Mais de Camilo Fandiño Gómez

Mais de Camilo Fandiño Gómez (6)

IBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaSIBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaS
 
IBM Cloud Security Enforcer
IBM Cloud Security EnforcerIBM Cloud Security Enforcer
IBM Cloud Security Enforcer
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
 
Conoce la Seguridad Cognitiva
Conoce la Seguridad CognitivaConoce la Seguridad Cognitiva
Conoce la Seguridad Cognitiva
 
Top 10 razones para no necesitar un MDM
Top 10 razones para no necesitar un MDMTop 10 razones para no necesitar un MDM
Top 10 razones para no necesitar un MDM
 
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
 

Último

Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our WorldEduminds Learning
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanMYRABACSAFRA2
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectBoston Institute of Analytics
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxMike Bennett
 
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhThiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhYasamin16
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfBoston Institute of Analytics
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGIThomas Poetter
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDRafezzaman
 
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一F sss
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Seán Kennedy
 
Business Analytics using Microsoft Excel
Business Analytics using Microsoft ExcelBusiness Analytics using Microsoft Excel
Business Analytics using Microsoft Excelysmaelreyes
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxdolaknnilon
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxaleedritatuxx
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 217djon017
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...Amil Baba Dawood bangali
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsVICTOR MAESTRE RAMIREZ
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.natarajan8993
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Seán Kennedy
 

Último (20)

Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our World
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population Mean
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis Project
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptx
 
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhThiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
 
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...
 
Business Analytics using Microsoft Excel
Business Analytics using Microsoft ExcelBusiness Analytics using Microsoft Excel
Business Analytics using Microsoft Excel
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptx
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business Professionals
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...
 

Whitepaper IBM Guardium Data Activity Monitor

  • 1. Security Data Sheet IBM Security Guardium Data Activity Monitor Continuously monitor data access and protect sensitive data across the enterprise Highlights ●● ● ● Uncover risks to sensitive data through data discovery, classification and privi- leged access discovery to automatically take action or report for compliance ●● ● ● Reduce data breach risk and extend security intelligence with in-depth data protection ●● ● ● Provide a streamlined and adaptable solution for real-time monitoring access to high-value databases, data warehouses, files, cloud and big-data environments ●● ● ● Minimize total cost of ownership with robust scalability, simplification, automation, analytics and transparency for a range of deployments—whether they are small, large or enterprise-wide IBM® Security Guardium® Data Activity Monitor empowers security teams to analyze, protect and adapt for comprehensive data protection in heterogeneous environments, including databases, data warehouses, files, file shares, cloud, and big-data platforms such as Hadoop and NoSQL. The solution continuously monitors all data access operations in real time to detect unauthorized actions, based on detailed contextual information—the “who, what, where, when and how” of each data access. Guardium Data Activity Monitor reacts immediately to help prevent unauthorized or suspicious activities by privileged insiders and potential hackers. It automates data security governance controls in heterogeneous enterprises. Guardium Data Activity Monitor improves security and supports compli- ance requirements through a set of core capabilities that help reduce risk and minimize cost of ownership. These capabilities are available in four offering levels: Express Data Activity Monitor, Standard Data Activity Monitor, Advanced Data Activity Monitor, and Central Management and Aggregation Pack.
  • 2. 2 Data SheetSecurity Risk reduction For any given organizational action or activity, there is the potential risk of sensitive data exposure or loss. The probability or threat of damage, liability or data loss caused by external or internal vulnerability can be avoided through quick response or preemptive action. Guardium Data Activity Monitor reduces data breach risk by providing real-time data security and intelligence with features such as: ●● ● Automatic identification of risky data or configurations— Uses data discovery, classification, entitlement reports and audit records to identify data at risk, such as dormant sensi- tive data or outdated entitlements and over-privileges to data. ●● ● Real-time data activity monitoring with application end-user translation – Provides 100 percent visibility and granularity into all data- base, files, file share, data warehouse, Hadoop and NoSQL transactions across all platforms and protocols—with a secure, tamper-proof audit trail that supports segregation of duties. – Monitors and enforces a wide range of policies for sensi- tive-data access, privileged-user actions, change control, application-user activities and security exceptions. – Monitors all data transactions to create a continuous, fine-grained audit trail of all data sources that identifies the “who, what, when, where and how” of each transaction, including execution of all SQL commands on all database objects. – Audits all logins/logouts, security exceptions such as login failures and SQL errors and extrusion detection (identifying sensitive data returned by queries). – Creates a single, centralized audit repository for enterprise- wide compliance reporting, performance optimization, investigations and forensics. ●● ● Real-time security alerts—Creates alerts in real time when a security policy is violated—including alerts to enterprise- wide security information and event management (SIEM) systems. IBM Security QRadar® provides bidirectional com- munications to Guardium, so you can take immediate action. ●● ● Real-time data masking (via the Guardium S-GATE agent)—Helps ensure that critical data does not fall into the wrong hands. Guardium Data Activity Monitoring looks at the data content leaving the data sources and obfuscates non-authorized fields according to the requestor privileges. ●● ● Real-time blocking (via S-GATE), including user quarantine and firewall IDs Guardium Data Activity Monitor provides comprehensive protection. It makes it easy to see which databases and big-data platforms contain sensitive data, monitor data access, and take action to help protect against internal and external threats. Hadoop Protect cloud environments Protect databases and big data Protect files DOC PDF XML JS NoSQL Oracle Teradata IBM DB2 IBM Security Guardium
  • 3. 3 Data SheetSecurity – Establishes preventive controls across the enterprise. Guardium Data Activity Monitor provides automated, real-time controls that help prevent privileged users from performing unauthorized actions such as executing queries on sensitive tables, changing sensitive data values, adding or deleting critical tables (schema changes) outside the change management process, and creating new user accounts and modifying privileges. – Reacts to suspicious activity by blocking activity or quaran- tining the requestor. – Implements firewall IDs that allow specified users to access certain servers for a particular time period to accommodate certain activities such as maintenance windows without affecting database security configurations. ●● ● Custom report builder with drill-down capabilities— Customizes and filters security reports to display the parame- ters that are relevant to your organization. Some common reports include: SQL errors, failed logins, terminated users and policy violations. ●● ● Best-practice recommendations in predefined reports and alerts—Provides a variety of predefined reports with different views of entitlement data, enabling organizations to quickly and easily identify security risks such as inappro- priately exposed objects, users with excessive rights and unauthorized administrative actions. Examples of the numerous predefined reports include: system, administrator and object privileges with SQL-level detail drill-downs by user and all objects. Entitlement information is stored in a forensically secure and tamper-proof repository, along with all data source audit information. Custom reports can be easily built by using an intuitive drag-and-drop interface. Streamlined graphical user interface provides centralized control IT organizations today are under high pressure to maximize the use of their resources and time. Low-level security operations or manual processes are wasteful, risky and error-prone. As your business data needs grow, the scope of the data security and compliance projects increases. You need security solutions to become more streamlined and adaptable as your needs change. In the era of big data, Guardium Data Activity Monitor pro- vides key capabilities to help organizations streamline and adapt data protection and security management without impacting data sources, networks, or applications, such as: ●● ● Dynamic graphical user interface (GUI) helps build and update data and user groups—Maximizes the protection delivered by Guardium. With one click, groups, policies, tests and other configurable parameters can be updated to adapt to the constantly evolving nature of the IT environment, database infrastructure and associated threats. Automated group management is used in audit reports, alerts and real- time policies to facilitate maintenance—despite constant changes in the IT environment. Whitelists or blacklists can be generated on any auditable item, for example, users, IP addresses, table names and so forth. Group maintenance can be done manually through the GUI or automated with Lightweight Directory Access Protocol (LDAP) integration. Groups can be populated using queries or GuardAPIs. You can synchronize with user groups in Microsoft Active Directory, IBM Security Directory Server, Novell, OpenLDAP, Sun ONE, IBM z/OS® and more. Handling policies, reporting and auditing indirectly through groups helps to keep a consistent management process, despite the constant change in the environment.
  • 4. 4 Data SheetSecurity ●● ● Centralized management automates the deployment of Guardium—Provides centralized management through a single web-based console. The scalable multi-tier architecture supports large and small environments with built-in health- check dashboards. Software updates are handled centrally and automatically without having to involve the change manage- ment team or resource owners. ●● ● Database discovery, data classification and entitlement reports—Discovers and classifies sensitive data. The discov- ery process can be configured through the Guardium GUI to probe specified network segments on a schedule or on demand. Once instances of interest are identified, the content is examined to identify and classify sensitive data. Entitlement reports provide an automatic risk assessment on who is con- figured to access the sensitive data. ●● ● Powerful analytic insights—Enables organizations to cen- trally visualize and analyze data activity from a heterogeneous data environment using a single format. The Guardium GUI includes leading-edge analytic tools—such as connec- tion profiling, Quick Search real-time forensics, outlier detection algorithms and an investigative dashboard—that provide actionable insights on data access behavior. ●● ● Predefined security policies—Allows you to create and manage your own data security policies based on audit data or leverage out-of-the-box predefined policies. The policies can be built to detect any threat scenario against the data utilizing the most common audit constructs such as who, from where, when, where to, on what, what action and other contextual information. Examples of security policies include: – Access policies that identify anomalous behavior by contin- uously comparing all data activity to a baseline of normal behavior. An example of anomalous behavior would be an SQL injection attack, which typically exhibits pat- terns of data access that are uncharacteristic of standard line-of-business applications. – Exception policies that are based on definable thresholds, such as an excessive number of failed logins or SQL errors. – Extrusion policies that examine data leaving the data repos- itory for specific data value patterns, such as credit card numbers. ●● ● Guardium GUI has customizable compliance workflows with preset compliance accelerators for common compli- ance requirements—Centralizes and automates oversight processes enterprise-wide, including report generation, distribution, electronic sign-offs and escalations. It creates custom processes without sacrificing security. It ensures that some team members see only data and tasks related to their own roles and stores process results in a secure centralized repository. It supports compliance with Sarbanes-Oxley (SOX), Payment Card Industry (PCI), Health Insurance Portability and Accountability Act (HIPAA) and other regulations with predefined reports. An easy-to-use GUI allows a wide variety of processes to be created to match the unique needs of the tasks and individuals involved. Reports can be exported in varying formats, including PDF, comma- separated values (CSV), common event format (CEF), Syslog forwarding, Security Content Automation Protocol (SCAP) or custom schemas. ●● ● Secure and self-sustained platform through the Guardium GUI—Audits all operations, including adminis- tration and configuration tasks, to maintain compliance controls, segregation of duties, and compliance with the latest security mandates and Federal Information Processing Standards (FIPS) 140-2.
  • 5. 5 Data SheetSecurity Performance Business moves fast and clients demand continual access to data. As a result, IT environments with diverse databases, transactional applications, analytics platforms, file systems and emerging big-data applications are required to meet aggressive service level agreements for availability, performance and responsiveness. Compliance requirements need to be addressed and security strategies implemented without impacting perfor- mance. Guardium Data Activity Monitor can be implemented with negligible performance impact—less than 1 percent over- head in most cases—using key capabilities, such as: ●● ● An operating system-based agent—Provides full visibility of data traffic without affecting the performance of the data source or application, as in the case of native audit logging. ●● ● Filtering of database traffic—Avoids unnecessary database audit traffic by monitoring only what is required, such as the data traffic already going from the operating system to the data source, and sending it out of band for analysis. ●● ● Centralized load balancing for multi-tier architecture— Enables Guardium agents (STAPs) to be automatically distributed, so they can automatically find the most optimal configuration to send their data activity traffic. ●● ● Support for 64-bit architecture—Provides the ability to handle and store more data traffic data with fewer resources. Protect critical data Central manager from a single The load balancer optimizes console real-time monitoring Data collection layer Scalability Driven by a rapidly changing business landscape that includes mergers, outsourcing, cloud deployments, workforce adjust- ments and accelerating business automation, data sources continue to proliferate over geographical and organizational boundaries. In addition, data is growing in terms of volume, variety and velocity, and it now resides in new types of data stores, such as Hadoop and NoSQL databases. Given current IT resource constraints, the complexity of environments and escalating workloads, many organizations want to increase automation in their data security and compliance operations. With automated load balancing, Guardium Data Activity Monitor enables organizations to easily adapt to IT changes that affect data security. IBM Security Guardium S-TAP probes
  • 6. 6 Data SheetSecurity Guardium Data Activity Monitor is equipped to seamlessly scale from one data source to tens of thousands without disrupting operations. Automation capabilities include: ●● ● Guardium Grid automates adaptation to changes in the data—Automatically balances the load and handles changes or additions to the environment without impacting the per- formance or availability of the data monitoring infrastructure. Guardium Data Activity Monitor dynamically adds or drops data sources without altering configurations. Guardium Grid provides elasticity for supporting large deployments in fre- quent change. Load balancing scalability and performance features help clients reduce management costs, minimize the need to manage detailed configuration information (IP addresses or hostnames) as data sources are added or removed, and simplify data capacity expansion projects. ●● ● GuardAPI support for batch operations—Facilitates integration of any IT process with Guardium Data Activity Monitor. GuardAPI is a script-based command-line interface (CLI) to Guardium, which allows any operation to be per- formed remotely. ●● ● Centralized aggregation—Merges and normalizes audit reports from multiple data sources to produce enterprise- wide reports and a forensics source. ●● ● Centralized management—Controls operations and policy setting from a central location, including hands-off agent updates, policy control, Guardium environment health and load balancing. Integration Most organizations have a diverse set of IT and security solutions in place today, such as ticketing systems or SIEM solutions. All of these solutions eventually require interaction with data security. Most existing security solutions lack the complete visibility into data access patterns required by regula- tory mandates. Guardium Data Activity Monitor provides analytics-based, in-depth insight while seamlessly integrating into existing security solutions, such as QRadar or ArcSight. In addition, Guardium Data Activity Monitor provides a modular integration model with existing IT systems, such as data management, ticketing and archiving solutions. The goal is to streamline IT and security operations by comple- menting and extending them with data security capabilities, including: ●● ● Integration with IT operations—Guardium Data Activity Monitor includes built-in, ready-to-use support for Oracle, IBM DB2®, Sybase, Microsoft SQL Server, IBM Informix®, mySQL, Teradata, IBM PureSystems®, Hadoop, IBM InfoSphere® BigInsights™, PostgreSQL, NoSQL, MongoDB, SAP HANA and more across all major protocols, including: HTTP, HTTPS, FTP, SAMBA and IBM iSeries connections to CSV text file data sources. It can also seamlessly share information with common IT operations tools, such as ticketing systems, where Guardium tracks ticket IDs within data access audit records. ●● ● Integration with security systems and standards (QRadar, HP ArcSight, Radius, LDAP)—Changes to users, groups, roles and authentication to data sources and applications can be updated automatically and directly from directories such as LDAP, Radius and Active Directory. Organizations can automatically handle any staff or user changes while keeping the policies and reports intact, avoiding the need to con- stantly modify them. In addition, IT staff can send alerts and all audit information to a SIEM. QRadar users experience bidirectional integration, allowing QRadar to issue alerts and change policies for immediate data protection. ●● ● Guardium Universal Feed and Enterprise Integrator— Simplifies and automates the integration of data from external data sources or text files into the Guardium reposi- tory. With data housed in the repository, the full array of Guardium policy, analysis, reporting and workflow tools can be leveraged. It allows input data from other sources to participate in the correlation analysis from change ticketing systems. Organizations can import descriptive information such as full names and phone numbers corresponding to user names to streamline investigation of exceptions; integrate information from identity and access management systems, such as roles and departments, to enable fine-grained security policies; and connect to IBM Spectrum Protect™, formerly known as IBM Tivoli® Storage Manager, and EMC Centera to archive audit data and oversight process results.
  • 7. 7 Data SheetSecurity Why Guardium? Guardium is part of IBM Security Systems Framework and IBM Data Security Privacy Platform. Data Security and Privacy Platform provides end-to-end data protection capabilities to discover and analyze, protect, integrate and manage the critical data in your environment. Guardium provides all the building blocks you need for data protection—from meeting compliance requirements all the way through to broader data protection. The portfolio is modular, so you can start anywhere and mix and match security software building blocks with compo- nents from other vendors or choose to deploy multiple building blocks together for increased acceleration and value. The security platform is an enterprise-class foundation for information-intensive projects providing the performance, scalability, reliability and acceleration needed to simplify difficult challenges and deliver trusted information to your business faster. IBM Security Guardium is a comprehensive data security platform that helps security teams secure and manage all types of sensitive data consistently, whether it is in big-data platforms, databases or file systems, across distributed and mainframe (IBM z Systems™) environments. Why IBM? IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM X-Force® research and development, provides security intelligence to help organizations holistically protect their people, infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents. For more information To learn more about IBM Security Guardium Data Activity Monitor, please contact your IBM representative or IBM Business Partner, or visit: ibm.com/guardium Additionally, IBM Global Financing provides numerous pay- ment options to help you acquire the technology you need to grow your business. We provide full lifecycle management of IT products and services, from acquisition to disposition. For more information, visit: ibm.com/financing File systems Databases and data warehouses Big-data platforms Applications Cloud environments IBM Security Guardium Discovery, classification, vulnerability assessment and entitlement reporting Encryption, masking and redaction Data and file activity monitoring Dynamic blocking and masking, alerts, and quarantines Compliance automation and auditing Analytics
  • 8. © Copyright IBM Corporation 2016 IBM Security Route 100 Somers, NY 10589 Produced in the United States of America February 2016 IBM, the IBM logo, ibm.com, Guardium, z/OS, QRadar, Informix, InfoSphere, BigInsights, iSeries, PureSystems, Tivoli, IBM Spectrum Protect, z Systems, DB2, and X-Force are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml Microsoft is a trademark of Microsoft Corporation in the United States, other countries, or both. This document is current as of the initial date of publication and may be changed by IBM at any time. IBM Business Partners set their own prices, which may vary. The performance data discussed herein is presented as derived under specific operating conditions. Actual results may vary. It is the user’s responsibility to evaluate and verify the operation of any other products or programs with IBM products and programs. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. The client is responsible for ensuring compliance with laws and regulations applicable to it. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the client is in compliance with any law or regulation. Statements regarding IBM’s future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Please Recycle Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. WGD03075-USEN-01