IBM Security Guardium is designed to help safeguard critical data. Guardium is a comprehensive data protection platform that enables security teams to automatically analyze what is happening in sensitive-data environments (databases, data warehouses, big data platforms, cloud environments, files systems, and so on) to help minimize risk, protect sensitive data from internal and external threats, and seamlessly adapt to IT changes that may impact data security. Guardium helps ensure the integrity of information in data centers and automate compliance controls.
The IBM Security Guardium solution is offered in two versions:
- IBM Security Guardium Database Activity Monitoring (DAM)
- IBM Security Guardium File Activity Monitoring (FAM) – Use Guardium file activity monitoring to extend monitoring capabilities to file servers.
IBM Security Learning (Guardium):
IBM Security Guardium Analyzer
- Overview
- Getting started
- Setting up IBM Security Guardium Data Connector
- Creating a database connection with IBM Security Guardium Data Connector
- Viewing scan results on the cloud
- Viewing all connectors
- IBM Security Guardium Analyzer settings
- Vulnerability assessment results categories
- Database privileges for producing assessments
- Privacy notice: IBM Security Guardium Analyzer General Data Protection Regulation (GDPR) compliance
- What’s new in Guardium 10.5
- Guardium Tech Talk: Hints and tips for a successful v10 upgrade
- IBM Guardium Cloud Deployment Guides
- Managing Transport Layer Security (TLS) Protocol Versions in IBM Guardium 10.1.4
- Using IBM Guardium 10.1.4 for Cloud database service protection
- Deploying the Guardium S-TAP Agent
- Upgrading IBM Guardium from V9.x to V10.1.3
- IBM Guardium Groups and Policies
- Guardium Big Data Intelligence for Data Security Insights and Integration
- IBM Guardium S-GATE policy
- IBM Guardium Distributed Reports
- Enabling IP-to-Hostname Aliasing
- IBM Security Guardium Analyzer Overview
- How to download and install a Guardium patch
- Dos and Don’ts of Guardium GPU patch installation
- Guardium User Management
- Preventing and Reacting to Guardium Database Full Issues
- Archiving Guardium Data
- Guardium Open Mic Full Appliance Issues – Detection, Root Cause, and Remediation
- How can I check if the correct data is being logged on my Guardium Appliance?
- IBM Guardium troubleshooting and Support
- Guardium Open Mic: Using Buffer Usage Monitor Report & Sniffer Must-gather for Troubleshooting
- How can I check if the correct data is being logged on my Guardium Appliance?
- IBM Guardium: Sniffer restart & High CPU correlation alerts
- IBM Guardium Foundations
Academy Courses
- Introduction to the IBM Guardium User and Command Line Interfaces
- What’s new in Guardium 10.5
- IBM Guardium Groups and Policies
- Creating and Installing a Policy
- File Activity Monitoring using IBM Guardium
- Using IBM Guardium to Create a File Activity Monitoring Dashboard and Report
- Creating a IBM Guardium Policy to Log File Activity
- Cloning an IBM Guardium Query and Report
- Creating a Guardium Policy that Ignores Trusted User Session Database Activity
- Detecting failed database logins using IBM Guardium
- Creating an IBM Guardium Query and Report
- Creating and Populating an IBM Guardium Group
- Using IBM Guardium to Create a Policy from File Activity Discovery and Classification Results
- IBM Guardium Selective and Non-Selective Audit Policy
- Guardium ATAP & EXIT functionality for database traffic collection
- IBM Guardium S-GATE policy
- IBM Guardium Policy: The Continue to Next Rule Functionality
- Using IBM Guardium to Quarantine Database Access
- Assessing Database Vulnerabilities using IBM Guardium
- IBM Guardium: Running a Vulnerability Assessment
- IBM Guardium Foundations
YouTube Video: