IBM Support

IBM Guardium Data Protection - Usage Reporting

How To


Summary

IBM Security Guardium Data Protection offers solutions to various data security use cases. The attached document provides guidance around usage reporting for Data Activity Monitoring (DAM) and Vulnerability Assessment capabilities.

Document Location

Worldwide

[{"Type":"MASTER","Line of Business":{"code":"LOB76","label":"Data Platform"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSMPHH","label":"IBM Security Guardium"},"ARM Category":[{"code":"a8m0z000000Gp0RAAS","label":"VULNERABILITY ASSESSMENT"}],"ARM Case Number":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"11.4.0"}]

Log InLog in to view more of this document

This document has the abstract of a technical article that is available to authorized users once you have logged on. Please use Log in button above to access the full document. After log in, if you do not have the right authorization for this document, there will be instructions on what to do next.

Document Information

Modified date:
07 July 2022

UID

ibm16579607