Question & Answer
Question
This video introduces Guardium aggregators and the aggregation process.
Data security monitoring is resource-intensive. Production databases produce many transactions. Policy criteria defines the actions that must run quickly. Additionally, users must analyze and generate reports on the state of the database environment.
All these tasks tax RAM, disk, and CPU.
Guardium uses aggregators to offload reporting functions from collectors, which reduces the load on collector resources. Aggregators offload data from many collectors, which provides an overreaching view of the enterprise data environment.
Duration: 5 Minutes
Follow the link in related information to view the course on the IBM Security Learning Academy
[{"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSMPHH","label":"IBM Security Guardium"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"All Version","Edition":" ","Line of Business":{"code":"LOB76","label":"Data Platform"}}]
Log InLog in to view more of this document
This document has the abstract of a technical article that is available to authorized users once you have logged on. Please use Log in button above to access the full document. After log in, if you do not have the right authorization for this document, there will be instructions on what to do next.
Was this topic helpful?
Document Information
Modified date:
10 August 2021
UID
ibm16477202