IBM Support

System Requirements/ Platforms supported for IBM Guardium v11.3

Detailed System Requirements


Abstract

This document summarizes the recommended hardware, supported databases, and operating systems for IBM Guardium v11.3

Content

Links to system requirements and supported platforms documentation for other versions of Guardium: http://www.ibm.com/support/docview.wss?uid=ibm10876538


 

Supported platforms database

For Guardium V11.0 and later, most supported platforms information is available through the Guardium supported platforms database.

Information about data sources supported by External S-TAP and about IBM i support is documented in the following sections.


 

External S-TAP

External S-TAP is a component of Guardium that can intercept traffic for cloud and on-premises database services without installing an inspection agent on the database server. For more information, see Guardium External S-TAP in the IBM Documentation website.

The External S-TAP service for Cloud Pak for Data can target all databases supported by External S-TAP as well as databases hosted on Cloud Pak for Data for compliance monitoring and data securityFor more information, see Guardium External S-TAP in the Cloud Pak for Data content on the IBM Documentation website.

Data source

Supported versions

Notes

Amazon Aurora Mysql All Versions Available for Amazon RDS cloud.
Amazon Aurora PostgreSQL All Versions Available for Amazon RDS cloud.
Amazon Redshift All Versions Available for Amazon Redshift.
Amazon DynamoDB All Versions Available for Amazon DynamoDB
AWS Fargate All Versions Available for AWS Fargate
CockroachDB v20.1.1 Available for on-premises
Db2 Warehouse (SSL enabled and non-SSL enabled)
 
9.7, 10.1, 10.5, 11.1
 
Available for on-premises and for IBM cloud.

Native encryption (DATA_ENCRYPT) not supported.
Elasticsearch 6.8, 7.4
Elastic search 6.8 available on IBM cloud.
Elastic search 7.4 available on AWS.
ElastiCache for Redis All Versions Available for AWS.
Greenplum 6.1 Available for on-premises.
GoogleCloud for Kubernetes All Versions Available for GoogleCloud for Kubernetes
MariaDB (SSL enabled and non-SSL enabled)
 
All Versions
 
Available for on-premises and for Amazon RDS cloud.
 
MemSQL 7.0 Available for on-premises.

Microsoft SQL Server (SSL enabled only)

All Versions

Available for on-premises and for Microsoft Azure cloud, Amazon RDS cloud, and GoogleCloud SQL

SSL-enabled encrypted connections are supported (including Force Protocol Encryption).

MongoDB (SSL enabled and non-SSL enabled)
 
2.6, 3.0, 3.2, 3.4, 3.6, 4.0, 4.2
 
MongoDB 2.6 to 4.2 Available for on-premises.
MongoDB 4.2 available for on-premises, IBM cloud, AWS, and Azure
MySQL (SSL enabled and non-SSL enabled)
 
5.6, 5.7, 8.0
 
Available for on-premises, for Amazon RDS cloud, and GoogleCloud SQL.
 
Netezza Performance Server 11.2 Available for on-premises
Oracle (SSL enabled and non-SSL enabled) 11gR1, 11gR2, 12.1, 12.2, 18.0, 18c Exadata, 19c Available for on-premises and for Amazon RDS cloud.

Note: Oracle ASO (native network encryption) is not supported.
Oracle Autonomous Database All Versions Available for Oracle Cloud Infrastructure (OCI)
PostgreSQL (SSL enabled and non-SSL enabled)
 
9.x, 10.x, 11.x,12.x
 
Available for on-premises, for Amazon RDS cloud,Microsoft Azure, IBM cloud, and GoogleCloud SQL.
 
Redis 4.x, 5 Available for on-premises and Cloud.
 
S3 All Versions Available for AWS
SAP HANA 2.0/SPS4/45 Available for on-premises for encrypted traffic.
Snowflakes DB 5.x Available for Microsoft Azure and Amazon AWS
SQL Data Warehouse All Versions
Available for Microsoft Azure cloud.
Sybase 15.x, 16.x Available for on-premises.
Sybase IQ 15.x, 16.x Available for on-premises.
Vertica 9.3 Available for on-premises.

IBM i

Guardium supports the following IBM i operating system versions and databases:

  • IBM i 6.1, 7.1, 7.2, 7.3
  • IBM DB2 for i 7.1, 7.2, 7.3
     

Support is provided by Db2 for i S-TAP.


 

Vulnerability assessment

IBM Security Guardium provides vulnerability assessment for the following data sources.

Data source Supported versions
Amazon RDS data sources Oracle, SQL Server, MySQL, PostgreSQL
Aster 6, 6.1
Azure SQL DB All Versions
DataStax Cassandra 5.1, 6.0, 6.7
Cloudera Hadoop 5.x, 6.x
IBM Db2 (LUW) 9.7, 10.1, 10.5, 11.1, 11.5
IBM DB2 for i 6.1, 7.1, 7.2, 7.3
IBM Db2 for z/OS 10, 11, 12
IBM Informix 11.50, 11.70, 12.10, 14.10
IBM Netezza 6.0, 6.02, 7.0, 7.1, 7.2
Microsoft SQL Server 2012, 2014, 2016, 2017, 2019
MongoDB 2.6, 3.0, 3.2, 3.4, 4.0
Oracle
11gR1, 11gR2, 12.1, 12.2, 18c, 19c
Oracle MySQL 5.5, 5.6, 5.7
PostgreSQL 9.x, 10.x, 11.x, 12.x
SAP HANA 1.0, 2
SAP Sybase ASE 15.7, 16
SAP Sybase IQ 15.4, 16
Teradata 14.10, 15, 15.10, 16
Couchbase 6.0, 6.5, 6.6




 

Application Monitoring

Guardium identifies potential fraud by tracking activities of users who access critical tables by using multitier enterprise applications rather than direct access to the database. This technique is especially important for applications that use connection pooling where all user traffic is aggregated within a few database connections, which masks the identity of users.

Guardium offers support for major enterprise applications (see table), and provides built-in tools to configure and add user identification for niche application and home-grown applications. Note: most applications require some basic configuration to tailor the solution to your environment.
 

Supported Enterprise Applications

Supported Application Server Platforms
(for other enterprise & custom developed applications)

Oracle E-Business Suite

IBM WebSphere

PeopleSoft

BEA WebLogic

Siebel

Oracle Application Server (AS)

SAP

JBoss Enterprise Application Platform

Cognos

+ Others based on customer demand

Business Objects Web Intelligence

+ Others based on customer demand




 

Which Guardium products support which data sources?

Guardium offers monitoring solutions for several types of data sources, including databases, data warehouses, file systems, big data platforms, and z/OS.

Company

Monitored product

Data source type

Guardium product

Apache Software

CouchDB

NoSQL

Data Protection for Big Data

Apache Software

Cassandra

NoSQL

Data Protection for Big Data

Cloud-based datasources (DB-as-a-service) AWS S3 and others Database services Data Protection for Database Services

Cloudera

Cloudera

Hadoop

Data Protection for Big Data

DataStax

DataStax Enterprise

NoSQL

Data Protection for Big Data

EMC

GreenPlum DB

Data Warehouse

Data Protection for Data Warehouses

EMC

GreenPlum HD

Hadoop

Data Protection for Big Data

EMC

Pivotal

Hadoop

Data Protection for Big Data

Generic

HTTP

Application protocol

Data Protection for Databases

Generic

FTP

File System Protocol

Data Protection for Files

Hortonworks

Hortonworks

Hadoop

Data Protection for Big Data

HP

HP Vertica

Data Warehouse

Data Protection for Data Warehouses

HP

HP-UX File System

File System

Data Protection for Files

IBM IBM Cloud Pak for Data Database services Data Protection for Database Services

IBM

IBM Db2

Database

Data Protection for Databases

IBM

IBM Db2 Purescale

Database

Data Protection for Databases

IBM

IBM PureFlex

Database

Data Protection for Databases

IBM

IBM DB2 for i

Database

Data Protection for Databases

IBM

IBM Informix

Database

Data Protection for Databases

IBM

IBM Db2 for z/OS

Database

Data Protection for z/OS (Db2)

IBM

IBM Db2 Analytic Accelerator for z/OS

Data Warehouse

Data Protection for z/OS (Db2)

IBM

IBM Db2 Warehouse

Data Warehouse

Data Protection for Data Warehouses

IBM

IBM IMS

Database

Data Protection for z/OS (IMS)

IBM

IBM z/OS Data Sets (VSAM, XDAP, BDAM, BSAM, QSAM, BPAM, ISAM, OAM)

File System

Data Protection for z/OS (Data Sets)

IBM

IBM PureData System for Transaction (PDTX)

Database

Data Protection for Databases

IBM

IBM PureApplication System

Database

Data Protection for Databases

IBM

IBM Netezza

Data Warehouse

Data Protection for Data Warehouses

IBM

IBM PureData for Analytics

Data Warehouse

Data Protection for Data Warehouses

IBM

IBM PureData System for Operational Analytics (PDOA)

Data Warehouse

Data Protection for Data Warehouses

IBM

IBM BLU Acceleration

Data Warehouse

Data Protection for Data Warehouses

IBM

IBM BigInsights

Hadoop

Data Protection for Big Data

IBM

IBM InfoSphere Optim Archival

Database Tool

Data Protection for Databases

IBM

IBM Master Data Management

Database Tool

Data Protection for Databases

IBM

IBM Data Stage

Database Tool

Data Protection for Databases

IBM

AIX File System

File System

Data Protection for Files

IBM

AIX GPFS

File System

Data Protection for Files

MariaDB Foundation

MariaDB

Database

Data Protection for Databases

MemSQL Inc.

MemSQL

NoSQL

Data Protection for Big Data

Microsoft

MS SQL Server

Database

Data Protection for Databases

Microsoft

MS SQL Server Cluster

Database

Data Protection for Databases

Microsoft

Microsoft Analytics Platform System (APS)

Data Warehouse

Data Protection for Data Warehouses

Microsoft

Windows File Share (WFS)

File System Protocol

Data Protection for Files

Microsoft

MS File System

File System

Data Protection for Files

MongoDB

MongoDB

NoSQL

Data Protection for Big Data

Novell

SuSe File System

File System

Data Protection for Files

Oracle

Oracle Database

Database

Data Protection for Databases

Oracle

Oracle Database RAC

Database

Data Protection for Databases

Oracle

Oracle Sun MySQL

Database

Data Protection for Databases

Oracle

Oracle Sun MySQL Cluster

Database

Data Protection for Databases

Oracle

Oracle Exadata

Data Warehouse

Data Protection for Data Warehouses

PostgreSQL

PostgreSQL

Database

Data Protection for Databases

Red Hat

Red Hat File System

File System

Data Protection for Files

SAP

SAP Sybase ASE

Database

Data Protection for Databases

SAP

SAP Sybase IQ

Database

Data Protection for Databases

SAP

SAP HANA

In-memory Database

Data Protection for SAP HANA

SAP

SAP HANA Appliance

In-memory Data Warehouse

Data Protection for SAP HANA

Teradata

Teradata

Data Warehouse

Data Protection for Data Warehouses

Teradata

Teradata Aster DB

Hadoop

Data Protection for Big Data

Ubuntu

Ubuntu File System

File System

Data Protection for Files




 

Supported web browsers

The Guardium UI supports the following web browsers and display resolutions:
  • Internet Explorer 11 (IE11) and later on Windows 7 (turn off "Compatibility View" setting)
  • Firefox ESR 52 and later
  • Chrome 70 and later
  • Display resolution 1366 x 768 or greater

File Activity Monitoring (FAM)
With the Guardium File Activity Monitor, you can monitor, discover, and classify sensitive data residing in files and directories. For more information about platforms, servers, and devices supported for file monitoring, see https://www.ibm.com/support/pages/node/6245402

 

Guardium deployment on cloud

Guardium supports deployment on several cloud platforms.  



 

Hardware and virtual machine requirements

Guardium is available as a hardware or software offering, ensuring easy deployment in a wide variety of environments. As a hardware offering, the solution comes with licensed software fully loaded and tested on a physical appliance provided by IBM (hardware appliance). When delivered as a software offering, the solution comes as software images ready for deployment by the user on their own hardware (software appliance), either directly or as virtual appliances. 

IBM Security Guardium is installable on Red Hat Enterprise Virtualization, VMware Virtualization, and Microsoft Hyper-V.

For more information about technical requirements, see https://www.ibm.com/support/pages/node/6335779

 


 

End of service information

Guardium supports database and operating system versions up to their End-of-Service (EOS), Premier, or Mainstream support end dates. For more information about IBM systems, see http://www-01.ibm.com/software/support/lifecycle/ . For other vendors, contact your vendor representative to confirm their support end dates. IBM offers optional extended service support after EOS. Contact your IBM representative for further information. Guardium supports the hardware system it is running on up to the End-of Marketing (EOM) date plus 5 years or end of support date, whichever is sooner.
 


Not all functionality is available in all configurations. For more information, contact an IBM Security Sales Representative at https://www.ibm.com/connect/ibm/us/en/?lnk=fcw

Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.
VMware, the VMware logo, VMware Cloud Foundation, VMware Cloud Foundation Service, VMware vCenter Server, and VMware vSphere are registered trademarks or trademarks of VMware, Inc. or its subsidiaries in the United States or other jurisdictions.

[{"Line of Business":{"code":"LOB24","label":"Security Software"},"Business Unit":{"code":"BU008","label":"Security"},"Product":{"code":"SSMPHH","label":"IBM Security Guardium"},"ARM Category":[{"code":"a8m0z000000Gp0VAAS","label":"SYSTEM REQUIREMENTS"}],"ARM Case Number":"","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"},{"code":"PF035","label":"z/OS"}],"Version":"11.3.0"}]

Document Information

Modified date:
10 May 2021

UID

ibm16334261