Data security is consistently identified as a top enterprise risk in today’s world. However, the complexity and volume of data has many organizations struggling with how to begin to manage this risk. The first step in implementing a data-centric approach to data security is to understand your organization’s level of risk through the identification and prioritization of sensitive information assets.
To achieve this level of understanding, organizations must undertake a comprehensive data discovery and classification effort. Companies should start discovery and classification efforts within a single organizational function or line of business - leveraging software tools to automate the process wherever possible. Such an effort, although limited in organizational scope, should include both structured and unstructured data held across traditional and emerging repositories such as data sources, applications, cloud, and big data environments.
IBM Security Guardium Analyzer is a powerful service that can help you with this data security effort. Simple to use, Guardium Analyzer allows you to set up connections to your data sources - with no need to configure classification or risk scanning. All you need to do to achieve the connection is add a read-only user to your data source that can be used by a data connector (the user must have appropriate data source privileges for producing assessments). Use this user name, along with other data source details, to complete your connector setup. Then, almost immediately, your data source will be scanned for risks - the results of which tell you where your vulnerabilities are (immediately scanning your data source is default behavior that can be changed).
When you first use the service, you will download the small IBM Security Guardium Data Connector tool. After installing the tool, you can use it to connect your data source servers to the cloud for scanning (this work would typically be done by a database administrator). You can connect up to 100 data sources to your data connector. As part of the connection process, you can provide details about each database server so that, when they are scanned, Guardium Analyzer is able to provide highly readable vulnerability assessments that are available to your compliance managers. These reports include:
- The classification of data and the types of tests and pattern matches that IBM Security Guardium Analyzer utilized to classify the data as vulnerable.
- The number of data sources that are at risk - with the option to drill down into each data source to see its vulnerabilities.
- The locations of the data sources that are at risk and the top vulnerabilities that are affecting them.
- Prioritization of the risk facing your data sources, so you know which ones to fix first.
Translated national languages
The IBM Security Guardium Analyzer and IBM Security Guardium Data Connector user interfaces are available in these languages:
To have the Guardium Analyzer user interface display in a particular language, your browser must be set to display that language. Consult your browser documentation to learn how to set language preferences. Note that, if you change the display language while using Guardium Analyzer, you may need to refresh your browser for the change to take effect.