Now that IBM Guardium data protection software has been moved into IBM Security, we have even more opportunities to deepen the integration between the deep database insights from Guardium with the big picture point of view from the QRadar Security Intelligence Platform. Guardium has been sending events, audit data, and CVE test results to QRadar for a long time. In this talk you’ll learn more about how insights from QRadar can be sent the other way, to Guardium, to dynamically enhance and speed Guardium’s data security capabilities.
This September 8th talk will cover the following:
Guardium is known for its ability to integrate with a wide variety of other technologies and products. In this upcoming tech talk John Haldeman, from Information Insights, describes some recent integration work he’s been doing to support some interesting use cases. Perhaps you’ll learn something new you can try in your environment. The following integration use cases will be described:
For recordings and slides from previous tech talks, visit the Tech Talk page on the Guardium developerWorks Community
Earlier this month IBM Systems Magazine published an article by Joel Tilton
Note you can also navigate from there to Joel's earlier article on achieving PCI compliance for FTP.
You might also be interested in the Redbook
Products discussed include IBM InfoSphere Guardium, IBM Security zSecure, IBM Security QRadar, IBM Security Key Lifecycle Manager, IBM Security Identity Manager, IBM Security Access Manager, and others.
IBM® InfoSphere® Guardium® has a level of visibility into databases for vulnerabilities that no application scanner can ever have because it has deep access to the configuration and other information about the database server. But how do you manage the vulnerabilities that it finds? How do you prioritize and track the work? The answer is the IBM Security QRadar® SIEM family of products.
In this demo
Tim Landers has published a new article on developerWorks on secu
"All of the benefits the Hadoop environment provides hinge on the addition of security features that are provided by an external security software solution. Just as Hadoop big data environment configurations differ, so do the security requirements for protecting that environment. All big data environments are risk-prone; therefore, they must have built-in protection against unauthorized use, threats, cyberattacks, invalid input data sources, and other challenges. To that end, IBM offers IBM® InfoSphere® Guardium®, a state-of-the-art solution for securing the Hadoop environment and protecting big data. Learn more about InfoSphere Guardium and how it can secure your Hadoop environment.
Jeroen Tiggleman has published a usef
Comments (3) Visits (2452)
See below for an announcement from Kathryn Zeidenstein about some new video tutorials on InfoSphere Guardium policies
Hi community members
Back in 2011 or so the lab services team had done a LotusLive education session on policies that was very well received. I have taken the first of these presentations and broken it into 4 modules that are now hosted on the InfoSphere Guardium YouTube channel.
You can find links to all 4 of the modules on this new page on the InfoSphere Guardium community wiki. http
Here are the direct links:
Break out the popcorn!!
Have a great weekend.