IBM Security Guardium Vulnerability Assessment software scans on-premises and cloud database infrastructure to detect vulnerabilities and orchestrate remedial actions. It is part of the IBM Guardium family of data security software and integrates with existing security solutions such as IBM QRadar, HP ArcSight or Splunk.
Identifying vulnerabilities in your data environments is key to understanding and managing your data security posture. IBM Security® Guardium® Vulnerability Assessment scans data infrastructure such as databases, data warehouses, and big data environments — both on-premises and in the cloud — to detect vulnerabilities and suggest remedial actions based on benchmarks from STIG, CIS, CVE, and other configuration standards.
Guardium Vulnerability Assessment identifies security gaps in databases such as missing patches, weak passwords, unauthorized changes, misconfigured privileges, excessive administrative logins, unusual after-hours activity, and other behavioral vulnerabilities such as account sharing. It then provides full reports as well as actionable recommendations to address vulnerabilities to harden your database environments.
Guardium Vulnerability Assessment is delivered as a part of Guardium Data Protection, but can be implemented as a stand-alone offering that serves its own use case.
Learn more about the Guardium family of products
categories show IBM Security Guardium as a "strong positive", making it an Overall Leader.
billion security events each day in more than 130 countries.
of new vulnerabilities had known exploits.
Perform vulnerability assessments within minutes, with minimal read-only access privileges, with zero to minimal performance impact.
Dynamic reports and precise recommendations for remediating data-centric threats and vulnerabilities.
Scale from one data source to tens of thousands across multiple data centers or geographical locations. Support leading database platforms and all major operating systems, including big data environments.
Integrate or complement existing security solutions, IT systems, and applications such as ServiceNow. Whether its efficiently assigning tickets or enabling on-demand rescans users a streamlined and expedited vulnerability scanning and remediation workflow."
Understand the latest vulnerabilities for supported platforms with automatic, real-time updates updates, summary results, and concrete recommendations.
Pricing varies based on your environment and configuration. Contact an IBM representative to discuss your deployment model.