Configuring your data security centerEdit online You can configure several aspects of your Guardium® Data Security Center to meet your business goals effectively and efficiently. Connecting to data sourcesStream your data for analysis by connecting your data sources to IBM® Guardium Data Security Center. You can add one or more connections to your data sources, native activity logs, or Event Streams.Managing activity monitoring connectionsWhen you create connections to environments, Guardium Data Security Center keeps these connections in one convenient location so that you can edit and manage the connections, as needed.PoliciesPolicies are sets of rules and actions applied in real time to the data source traffic observed by Guardium Data Security Center. Policies define which traffic is ignored or logged, which activities require more granular logging, and which activities should trigger an alert.Setting up a data compliance programIBM® Guardium Data Security Center is designed to automatically create a compliance program and help you adhere to compliance regulations. Follow the prompts in the UI to set up an end-to-end compliance workflow quickly and efficiently.Using workflows to schedule jobs and respond to eventsWhen you create a workflow in Guardium Data Security Center, you are setting up a process for scheduling actions and then tracking the distribution, review, and completion of those actions. You can schedule reports to run and set up workflows for those reports - or you can schedule import jobs (these require an integration for importing and exporting data, which you can set up when you create the workflow if you don't already have one). You can also set up workflows to automate responses to risk events.Managing groupsGroups are collections of similar data objects (or members) that can be used for filtering reports. Guardium Data Security Center provides predefined groups that you can use for this - or you can import groups from Guardium central manager (where they are used for creating query, policy, and classification definitions).Enabling the Risk Event processEnable the Risk Event process to start. This process is disabled by default.IntegrationsWhen configuring Guardium Data Security Center settings, the settings that allow you to create integrations are organized in one convenient location. These include integrations for ticketing, sending alerts, importing and exporting data, and data enrichment.Working with variantsVariants enable you to use report data more easily through customization of report data, as required. Customization of report data allows for better joins to occur with custom data.