Feature spotlights

Interactive data risk control center

Visualize and manage data in a unifying, single pane-of-glass view that helps convey value and meaning to business executives. Correlate security metrics from point security solutions to provide an end-to-end view of your security posture, using the common language of risk to communicate with the C-suite and the risk office.

Data discovery and classification

Programatically discover, classify and report sensitive data and associated risks across the enterprise by integrating outputs from IBM Guardium, Symantec DLP and IBM Information Governance Catalog. Leverage real time information to efficiently discover sensitive information assets and yet-unidentified data stores.

Automated analytics

Analyze identified risks, their type, affected information assets, and additional elements to deliver a comprehensive view of their potential probability and business impact. Choose mitigating actions to help avoid suffering information losses based upon the analytics.

Business risk evaluation and modeling

Correlate threats, vulnerabilities, controls and business attributes with the value of the information asset. Calculate a risk score that highlights the parts of the business that are at risk.

Technical details

Software requirements

There are no software requirements for Data Risk Manager.

    Hardware requirements

    Data Risk Manager will be delivered as a virtual appliance, ready to be installed on a hypervisor.

    • Minimum number of processors: 4
    • Required memory (RAM): 16 GB
    • Network requirements: Dual 1 Gigabits per second (Gbps)
    • Minimum storage: 200 GB

    You may also be interested in

    IBM Security Guardium Vulnerability Assessment

    IBM Security Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities and suggest remedial actions. The solution identifies exposures such as missing patches, weak passwords, unauthorized changes and misconfigured privileges. Full reports are provided as well as suggestions to address all vulnerabilities. Guardium Vulnerability Assessment detects behavioral vulnerabilities such as account sharing, excessive administrative logins and unusual after-hours activity. It identifies threats and security gaps in databases that could be exploited by hackers.

    Learn more

    IBM Guardium Data Protection for Big Data

    IBM Guardium Data Protection for Big Data provides automated sensitive data discovery and classification, real-time data activity monitoring and cognitive analytics to discover unusual activity around sensitive data. It protects against unauthorized data access by learning regular user access patterns and can provide real-time alerts on suspicious activities. It can dynamically block access or quarantine user IDs to protect against internal and external threats and also helps streamline and automate compliance workflows. The software provides full visibility on data activity and supports both Hadoop and NoSQL environments.

    Learn more

    IBM Guardium Data Protection for Databases

    IBM Guardium Data Protection for Databases provides automated sensitive data discovery and classification, real-time data activity monitoring and cognitive analytics to discover unusual activity around sensitive data. It protects against unauthorized data access by learning regular user access patterns and can provide real-time alerts on suspicious activities. It can dynamically block access or quarantine user IDs to protect against internal and external threats and also helps streamline and automate compliance workflows. The product is built on a scalable architecture that provides full visibility on data activity across all major databases.

    Learn more

    IBM Guardium Data Encryption for Db2 and IMS Databases

    Offers sensitive and private data protection for Db2 and IMS systems

    Learn more

    IBM Guardium Data Protection for Files

    This solution provides automated discovery and classification of unstructured data in files/file systems including NAS, SharePoint, Windows, Unix and Linux to help organizations better understand and control unstructured data risks. Guardium Data Protection for Files also supports intelligent access management and file activity monitoring across files/file systems with cognitive analytics detecting unusual activity around sensitive data. Continuous monitoring and real-time security and protection policies guard unstructured data across the enterprise and enable teams to minimize compliance costs with auditable reporting and workflows.

    Learn more