Feature spotlights
Interactive data risk control center
Visualize and manage data in a unifying, single pane-of-glass view that helps convey value and meaning to business executives. Correlate security metrics from point security solutions to provide an end-to-end view of your security posture, using the common language of risk to communicate with the C-suite and the risk office.
Data discovery and classification
Programatically discover, classify and report sensitive data and associated risks across the enterprise by integrating outputs from IBM Guardium, Symantec DLP and IBM Information Governance Catalog. Leverage real time information to efficiently discover sensitive information assets and yet-unidentified data stores.
Automated analytics
Analyze identified risks, their type, affected information assets, and additional elements to deliver a comprehensive view of their potential probability and business impact. Choose mitigating actions to help avoid suffering information losses based upon the analytics.
Business risk evaluation and modeling
Correlate threats, vulnerabilities, controls and business attributes with the value of the information asset. Calculate a risk score that highlights the parts of the business that are at risk.
Technical details
Software requirements
There are no software requirements for Data Risk Manager.
Hardware requirements
Data Risk Manager will be delivered as a virtual appliance, ready to be installed on a hypervisor.
- Minimum number of processors: 4
- Required memory (RAM): 16 GB
- Network requirements: Dual 1 Gigabits per second (Gbps)
- Minimum storage: 200 GB
You may also be interested in
IBM Security Guardium Vulnerability Assessment
Scans your data to detect vulnerabilities and suggest remedial actions.
IBM Security Guardium Data Protection
Provides data activity monitoring and cognitive analytics.
IBM Security Guardium Data Encryption
Protects your file and database data from misuse and helps comply with industry and government regulations.
IBM Security Guardium Data Protection for Files
Monitors unstructured data access and protects sensitive data.