Filter by products, topics, and types of content

(466 Products)

(776 Topics)

(20 Industries)

(15 Types)

1 - 23 of 23 results
Show Summaries | Hide Summaries
View Results
Title none Type none Date none
Secure and harden Netezza data warehouse appliance with InfoSphere Guardium
This article will build the basic foundation of a hardened, monitored, and secured Netezza environment. To achieve this, InfoSphere Guardium, IBM's solution for database activity monitoring and auditing, will be used. Hardening Netezza with Guardium will be presented as a multi-step process: The first step will address the basic initial setup from a security and user access management perspective. Configuration of users, groups, and privileges will be addressed. The second step will leverage Guardium Vulnerability Assessment to scan the environment for Netezza-specific insecure configurations and privileges. The third step will detail how to address some of the failed Vulnerability Assessment test by making appropriate adjustments in Netezza configuration. The last step is ensuring that the optimal configuration of privileges built in the first and third stages are not tampered with. Guardium Entitlement Reports will be used to audit the Netezza user management. By this stage we have built a hardened Netezza appliance with ongoing assessments using InfoSphere Guardium.
Also available in: Chinese   Portuguese  
Articles 04 Oct 2012
InfoSphere Guardium and the Amazon cloud, Part 2: Secure storage on the cloud for backup and restore
The growing number of relational databases on the cloud accentuates the need for data protection and auditing. InfoSphere Guardium offers real-time database security and monitoring, fine-grain database auditing, automated compliance reporting, data-level access control, database vulnerability management, and auto-discovery of sensitive data in the cloud. With the Amazon Relational Database Service (RDS), you can create and use your own database instances in the cloud and build your own applications around them. This two-part series explores how to use InfoSphere Guardium to protect database information in the cloud. Part 1 describes how to use InfoSphere Guardium's discovery and vulnerability assessment with Amazon RDS instances. This tutorial covers how InfoSphere Guardium uses Amazon S3 for backup and restore.
Also available in: Chinese   Russian  
Tutorial 23 Oct 2014
Create a secure Hadoop environment with IBM InfoSphere Guardium
All of the benefits the Hadoop environment provides hinge on the addition of security features that are provided by an external security software solution. Just as Hadoop big data environment configurations differ, so do the security requirements for protecting that environment. All big data environments are risk-prone; therefore, they must have built-in protection against unauthorized use, threats, cyberattacks, invalid input data sources, and other challenges. To that end, IBM offers IBM InfoSphere Guardium, a state-of-the-art solution for securing the Hadoop environment and protecting big data. Learn more about InfoSphere Guardium and how it can secure your Hadoop environment.
Also available in: Russian   Portuguese   Spanish  
Articles 20 Jan 2014
Big data security and auditing with IBM InfoSphere Guardium
In this article, you will learn how InfoSphere Guardium provides database activity monitoring and auditing capabilities that enable you to seamlessly integrate Hadoop data protection into your existing enterprise data security strategy. You will learn how to configure the system and to use InfoSphere Guardium security policies and reports tailored specifically for Hadoop environments, including IBM InfoSphere BigInsights, Cloudera, Hortonworks Data Platform, and Greenplum Hadoop. You will also learn about a quick start monitoring implementation available only with IBM InfoSphere BigInsights.
Also available in: Chinese   Japanese   Portuguese   Spanish  
Articles 11 Jul 2013
Advanced redaction for better document workflow
IBM InfoSphere Guardium Data Redaction removes sensitive data from documents that enterprises share across departments or with the public. The product supports various document formats. This article describes several features of InfoSphere Guardium Data Redaction along with configuration and programming tips, starting with XML document redaction.
Also available in: Chinese  
Articles 11 Jul 2013
InfoSphere Guardium data security and protection for MongoDB, Part 3: Reporting, automating, and blocking
This article series describes how to monitor and protect MongoDB data using IBM InfoSphere Guardium, including the configuration of the solution, sample monitoring use cases, and additional capabilities such as quick search of audit data and building a compliance workflow using an audit process. Part 3 describes the capabilities in InfoSphere Guardium to search and report on audit data, how to create an audit process, and how to block users (available only with the Advanced Monitor). Many organizations are just getting started with MongoDB, and now is the time to build security into the environment to save time, prevent breaches, and avoid compliance violations.
Also available in: Chinese  
Articles 27 Jun 2013
InfoSphere Guardium data security and protection for MongoDB, Part 2: Configuration and policies
This article series describes how to monitor and protect MongoDB data using IBM InfoSphere Guardium, including the configuration of the solution, sample monitoring use cases, and additional capabilities such as quick search of audit data and building a compliance workflow using an audit process. Part 2 describes how to configure InfoSphere Guardium to collect MongoDB traffic and describes how to create security policy rules for a variety of typical data protection use cases, such as alerting on excessive failed logins, monitoring privileged users, and alerting on unauthorized access to sensitive data. Many organizations are just getting started with MongoDB, and now is the time to build security into the environment to save time, prevent breaches, and avoid compliance violations.
Also available in: Chinese   Portuguese  
Articles 16 Sep 2014
Accelerate the path to PCI DSS data compliance using InfoSphere Guardium
This article gives you a step-by-step overview of using the Payment Card Industry (PCI) Data Security Standard (DSS) accelerator that is included with the standard InfoSphere Guardium data security and protection solution. The PCI DSS is a set of technical and operational requirements designed to protect cardholder data and applies to all organizations who store, process, use, or transmit cardholder data. Failure to comply can mean loss of privileges, stiff fines, and, in the case of a data breach, severe loss of consumer confidence in your brand or services. The InfoSphere Guardium accelerator helps guide you through the process of complying with parts of the standard using predefined policies, reports, group definitions, and more.
Articles 18 Apr 2013
Integrate InfoSphere Guardium Data Redaction with IBM Classification Module
InfoSphere Guardium Data Redaction is capable of finding and concealing sensitive text within a document. Within an organization, not all documents contain sensitive data. For the data redaction to be effective, it is critical that relevant documents be identified. The sensitivity of the entities is often dependent on context. InfoSphere Classification Module is capable of identifying sensitive documents containing data that require redaction. This article explains how to integrate Guardium Data Redaction and Classification Module to achieve the goal of redacting only relevant documents.
Also available in: Chinese  
Articles 03 Nov 2011
Using IBM InfoSphere Guardium Encryption Expert to protect your sensitive data
IBM InfoSphere Guardium Encryption Expert provides features to encrypt and control access to data written to file systems and database backup images. Beginning with Version 1.1 Fix Pack 3, the product supports both DB2 and Informix Dynamic Server (IDS). This article describes some of the key features and mechanisms of InfoSphere Guardium Encryption Expert and shows you how to use them.
Articles 02 Jul 2009
Install IBM InfoSphere Guardium Data Encryption on the IBM PureApplication System
This article focuses on deploying the IBM InfoSphere Guardium data encryption software to provide data encryption for Red Hat Linux V6.2 IBM DB2 hosts. This software provides encryption for both regular files and DB2 files. InfoSphere Guardium also provides a DB2 agent for DB2 encrypted backup and restore operations.
Also available in: Chinese  
Articles 16 Jan 2013
Using IBM InfoSphere Guardium for monitoring and auditing IBM DB2 for i database activity
IBM® InfoSphere® Guardium® is an enterprise information audit and protection solution that helps enterprises to protect and audit information across a diverse set of relational and nonrelational data sources such as Oracle, Teradata, IMS, VSAM, Microsoft® SharePoint, and IBM Netezza®, and IBM DB2® for z/OS®, and DB2 for Linux, UNIX and Windows. With InfoSphere Guardium V9.0, DB2 for i can now be included as a data source, enabling you to monitor access through native interfaces and through SQL. This article provides a brief overview of the InfoSphere Guardium architecture, describes how to configure access (including best practices for performance), and describes how to access data activity reports.
Also available in: Chinese   Japanese  
Articles 16 Dec 2013
Use data-level security for granular access control of auditing results in InfoSphere Guardium
InfoSphere Guardium offers enterprise-wide data activity monitoring for data protection and auditing. Two critical elements to consider for a successful enterprise implementation of InfoSphere Guardium for enterprise-wide data protection and audit include support for separation of duties, and enterprise deployment capabilities that eliminate redundant configurations and streamline enterprise deployments to match your organizational structures. By using Guardium data-level security mechanisms, administrators can assign responsibilities for particular databases or systems to individuals (or groups) which align with their hierarchical organizational structure. This article describes the benefits of data-level security as well as step-by-step instructions for implementing the solution for a sample scenario.
Articles 21 Feb 2013
Creating a feed for a user-defined data source
New databases and new applications are continually being created and adopted to meet specific organizational needs. The requirement for data protection and auditing capabilities is required by mandate and is more critical than ever. The InfoSphere Guardium data protection solution is extensible to enable the integration of a wide variety of new databases and sources into its platform, thereby providing a consistent enterprise-wide monitoring solution. This article includes a sample event description file and sample program.
Also available in: Portuguese  
Articles 08 Nov 2012
InfoSphere Guardium data security and protection for MongoDB, Part 1: Overview of the solution and data security recommendations
This article series describes how to monitor and protect MongoDB data using IBM InfoSphere Guardium. Part 1 describes an overview of the solution, the architecture, and the benefits of using InfoSphere Guardium with MongoDB. The value of the fast growing class of NoSQL databases such as MongoDB is the ability to handle high velocity and volumes of data while enabling greater agility with dynamic schemas. Many organizations are just getting started with MongoDB, and now is the time to build security into the environment to save time, prevent breaches, and avoid compliance violations. This article series describes configuration of the solution, sample monitoring use cases, and additional capabilities such as quick search of audit data and building a compliance workflow using an audit process.
Also available in: Chinese   Portuguese  
Articles 30 Oct 2013
Using the IBM InfoSphere Guardium REST API
Organizations that use InfoSphere Guardium for data security and compliance can take advantage of a rich set of APIs to automate processes and maintain the system in a more efficient manner. As of InfoSphere Guardium 9.1, the Guardium API is exposed to external systems as online RESTful web services, which provide organizations with a modern interface to expose Guardium capabilities in a Web portal or via the Cloud.
Also available in: Chinese   Portuguese  
Articles 24 Nov 2014
InfoSphere Guardium
This article describes the technical details of IBM InfoSphere Guardium, a solution for real-time database activity monitoring and protection. Existing information security solutions often leave databases vulnerable to advanced hacking techniques and insider attacks. InfoSphere Guardium automatically monitors database transactions and can respond in real-time to access policy violations.
Also available in: Chinese  
Articles 30 Jul 2010
Benefits of InfoSphere Guardium for System Z in the healthcare industry
Mark Simmonds is a guest on The Pulse Network TV to discuss the benefits of InfoSphere Guardium on System z for the healthcare industry.
Articles 27 Nov 2012
Monitor database activity for application users with Guardium and WebSphere Application Server
Certain audit requirements mandate that specific database activity can be traced back to the user who is responsible for the specific activity. This is especially challenging in application scenarios where the pooled database connections are used and the application itself is responsible for authentication and authorization. This article presents a generic approach for WebSphere Application Server applications that enables database activity monitoring solutions like InfoSphere Guardium to reliably assign the application user to the database activity without requiring changes to the respective applications.
Also available in: Chinese   Russian   Portuguese  
Articles 23 Aug 2012
Share information while protecting privacy using IBM InfoSphere Guardium Data Redaction
IBM InfoSphere Guardium Data Redaction enables effective disclosure of public information while protecting confidential information of the enterprise, as well as personal customer data. It redacts private information in free-text documents and forms, based on the role of the reader. It accelerates information sharing within organizations, and across organization boundaries by supporting controlled information disclosure. In this article, get an introduction to the capabilities of this product. See how to use automated redaction to process a large number of documents in batch mode, and learn how to use the GUI client to redact and review automated redactions.
Also available in: Chinese  
Articles 01 Sep 2011
Integrated Data Management: Managing data across its lifecycle
The Optim portfolio from IBM focuses on realizing Integrated Data Management with innovative delivery of application-aware solutions for managing data and data-driven applications across the lifecycle, from requirements to retirement. This overview article explains both the vision and reality of Integrated Data Management and how you--whether you are a data architect, developer, tester, DBA, or data steward--can use IBM solutions today to respond quickly to emerging opportunities, improve quality of service, mitigate risk, and reduce costs. [Updated 2010 Apr: This article is updated to reflect changes in product names and functionality that occurred between 2009 June and 2010 April.]
Also available in: Chinese   Russian   Japanese   Spanish  
Articles 15 Apr 2010
InfoSphere Guardium and the Amazon cloud, Part 1: Explore Amazon RDS database instances and vulnerabilities
The growing number of relational databases on the cloud accentuates the need for data protection and auditing. IBM InfoSphere Guardium offers real time database security and monitoring, fine-grained database auditing, automated compliance reporting, data-level access control, database vulnerability management, and auto-discovery of sensitive data in the cloud. With the Amazon Relational Database Service (RDS) you can create and use your own database instances in the cloud and build your own applications around them. This two-part series explores how to use Guardium to protect database information in the cloud. This article describes how to use Guardium's discovery and vulnerability assessment with Amazon RDS database instances. Part 2 will cover how Guardium uses Amazon S3 for backup and restore.
Also available in: Chinese   Russian   Portuguese   Spanish  
Articles 27 Feb 2014
InfoSphere Guardium application user translation
Many organizations today have data auditing requirements that make it mandatory to be able to identify which application end users are executing specific database transactions. In an environment where a connection pool is being used to enhance performance, it can be a challenge to identify the end user. Learn five methods for solving this fundamental governance problem using IBM InfoSphere Guardium, and understand which of these methods is most applicable for your environment.
Also available in: Chinese   Russian   Japanese  
Articles 01 Feb 2012
1 - 23 of 23 results
Show Summaries | Hide Summaries