Detailed System Requirements
Abstract
This document summarizes the recommended hardware, supported databases, and operating systems for IBM Guardium v11.3
Content
- Supported platforms database
- Cloud database service protection
- Data discovery and classification
- External S-TAP
- IBM i
- Vulnerability assessment
- Application monitoring
- Which Guardium products support which data sources?
- Supported web browsers
- File Activity Monitoring
- Guardium deployment on cloud
- Hardware and virtual machine requirements
- End of service information
Links to system requirements and supported platforms documentation for other versions of Guardium: http://www.ibm.com/support/docview.wss?uid=ibm10876538
Attention: Guardium Data Protection tries to support new versions of existing data sources as quickly as possible. Typically, new versions are supported within three (3) months of release, but support for some data sources may take longer.
Supported platforms database
For Guardium V11.0 and later, most supported platforms information is available through the Guardium supported platforms database.
Information about data sources supported by External S-TAP and about IBM i support is documented in the following sections.
Cloud data service protection
Guardium supports the following data sources for data streaming. with cloud data service protection. For more information see Cloud database service protection.
For Amazon Web Services
AWS data source | Version | Notes |
---|---|---|
5.7.mysql_aurora.2.07.2 | Datastreams only | |
11.9 | Datastreams only | |
12, 18 and 19 |
Native audit only
|
Azure data source | Version | Notes |
---|---|---|
Microsoft SQL Azure (RTM) - 12.0.2000.8 | Default | |
Default version | ||
Default version | ||
Default version | ||
Default version | ||
Default version |
Data discovery and classification
For the complete list of supported datasources for data discovery and classification, see www.ibm.com/support/pages/node/6326077.
External S-TAP
External S-TAP is a component of Guardium that can intercept traffic for cloud and on-premises database services without installing an inspection agent on the database server. For more information, see Guardium External S-TAP in the IBM Documentation website.
Data source |
Supported versions |
Notes |
---|---|---|
Amazon Aurora Mysql | All Versions | Available for Amazon RDS cloud. |
Amazon Aurora PostgreSQL | All Versions | Available for Amazon RDS cloud. |
Amazon Redshift | All Versions | Available for Amazon Redshift. |
Amazon DynamoDB | All Versions | Available for Amazon DynamoDB |
AWS Fargate | All Versions | Available for AWS Fargate |
CockroachDB | v20.1.1 | Available for on-premises |
Db2 Warehouse (SSL enabled and non-SSL enabled) |
9.7, 10.1, 10.5, 11.1 |
Available for on-premises and for IBM cloud. Native encryption (DATA_ENCRYPT) not supported. |
Elasticsearch | 6.8, 7.4 |
Elastic search 6.8 available on IBM cloud.
Elastic search 7.4 available on AWS.
|
ElastiCache for Redis | All Versions | Available for AWS. |
Greenplum | 6.1 | Available for on-premises. |
GoogleCloud for Kubernetes | All Versions | Available for GoogleCloud for Kubernetes |
MariaDB (SSL enabled and non-SSL enabled) |
All Versions |
Available for on-premises and for Amazon RDS cloud. Work with proxy protocol v2 supported Stap. |
MemSQL | 7.0 | Available for on-premises. |
Microsoft SQL Server (SSL enabled only) |
All Versions |
Available for on-premises and for Microsoft Azure cloud, Amazon RDS cloud, and GoogleCloud SQL |
MongoDB (SSL enabled and non-SSL enabled) |
2.6, 3.0, 3.2, 3.4, 3.6, 4.0, 4.2 |
MongoDB 2.6 to 4.2 Available for on-premises.
MongoDB 4.2 available for on-premises, IBM cloud, AWS, and Azure
|
MySQL (SSL enabled and non-SSL enabled) |
5.6, 5.7, 8.0 |
Available for on-premises, for Amazon RDS cloud, Microsoft Azure and GoogleCloud SQL. |
Netezza Performance Server | 11.2 | Available for on-premises |
Oracle (SSL enabled and non-SSL enabled) | 11gR1, 11gR2, 12.1, 12.2, 18.0, 18c Exadata, 19c | Available for on-premises and for Amazon RDS cloud. Note: Oracle ASO (native network encryption) is not supported. |
Oracle Autonomous Database | All Versions | Available for Oracle Cloud Infrastructure (OCI) |
PostgreSQL (SSL enabled and non-SSL enabled) |
9.x, 10.x, 11.x,12.x |
Available for on-premises, for Amazon RDS cloud,Microsoft Azure, IBM cloud, and GoogleCloud SQL. |
Redis | 3.x, 4.x, .x and 6.x | Available for on-premises and Cloud. |
S3 | All Versions | Available for AWS |
SAP HANA | 2.0/SPS4/45 | Available for on-premises for encrypted traffic. |
Snowflake DB | 5.x | Available for Microsoft Azure and Amazon AWS |
SQL Data Warehouse | All Versions |
Available for Microsoft Azure cloud.
|
Sybase | 15.x, 16.x | Available for on-premises. |
Sybase IQ | 15.x, 16.x | Available for on-premises. |
Vertica | 9.3 | Available for on-premises. |
IBM i
Guardium supports the following IBM i operating system versions and databases:
- IBM i 6.1, 7.1, 7.2, 7.3
- IBM DB2 for i 7.1, 7.2, 7.3
Support is provided by Db2 for i S-TAP.
Vulnerability assessment
IBM Security Guardium provides vulnerability assessment for the following data sources.
Data source | Supported versions |
---|---|
Amazon RDS data sources | Oracle, SQL Server, MySQL, PostgreSQL |
Aster | 6, 6.1 |
Azure SQL DB | All Versions |
DataStax Cassandra | 5.1, 6.0, 6.7 |
Cloudera Hadoop | 5.x, 6.x |
IBM Db2 (LUW) | 9.7, 10.1, 10.5, 11.1, 11.5 |
IBM DB2 for i | 6.1, 7.1, 7.2, 7.3 |
IBM Db2 for z/OS | 10, 11, 12 |
IBM Informix | 11.50, 11.70, 12.10, 14.10 |
IBM Netezza | 6.0, 6.02, 7.0, 7.1, 7.2 |
Microsoft SQL Server | 2012, 2014, 2016, 2017, 2019 |
MongoDB | 2.6, 3.0, 3.2, 3.4, 4.0 |
Oracle |
11gR1, 11gR2, 12.1, 12.2, 18c, 19c
|
Oracle MySQL | 5.5, 5.6, 5.7 |
PostgreSQL | 9.x, 10.x, 11.x, 12.x |
SAP HANA | 1.0, 2 |
SAP Sybase ASE | 15.7, 16 |
SAP Sybase IQ | 15.4, 16 |
Teradata | 14.10, 15, 15.10, 16 |
Couchbase | 6.0, 6.5, 6.6 |
Application Monitoring
Guardium identifies potential fraud by tracking activities of users who access critical tables by using multitier enterprise applications rather than direct access to the database. This technique is especially important for applications that use connection pooling where all user traffic is aggregated within a few database connections, which masks the identity of users.
Guardium offers support for major enterprise applications (see table), and provides built-in tools to configure and add user identification for niche application and home-grown applications. Note: most applications require some basic configuration to tailor the solution to your environment.
Supported Enterprise Applications |
Supported Application Server Platforms
|
---|---|
Oracle E-Business Suite |
IBM WebSphere |
PeopleSoft |
BEA WebLogic |
Siebel |
Oracle Application Server (AS) |
SAP |
JBoss Enterprise Application Platform |
Cognos |
+ Others based on customer demand |
Business Objects Web Intelligence |
|
+ Others based on customer demand |
Which Guardium products support which data sources?
Guardium offers monitoring solutions for several types of data sources, including databases, data warehouses, file systems, big data platforms, and z/OS.
Company |
Monitored product |
Data source type |
Guardium product |
---|---|---|---|
Apache Software |
CouchDB |
NoSQL |
Data Protection for Big Data |
Apache Software |
Cassandra |
NoSQL |
Data Protection for Big Data |
Cloud-based datasources (DB-as-a-service) | AWS S3 and others | Database services | Data Protection for Database Services |
Cloudera |
Cloudera |
Hadoop |
Data Protection for Big Data |
DataStax |
DataStax Enterprise |
NoSQL |
Data Protection for Big Data |
EMC |
GreenPlum DB |
Data Warehouse |
Data Protection for Data Warehouses |
EMC |
GreenPlum HD |
Hadoop |
Data Protection for Big Data |
EMC |
Pivotal |
Hadoop |
Data Protection for Big Data |
Generic |
HTTP |
Application protocol |
Data Protection for Databases |
Generic |
FTP |
File System Protocol |
Data Protection for Files |
Hortonworks |
Hortonworks |
Hadoop |
Data Protection for Big Data |
HP |
HP Vertica |
Data Warehouse |
Data Protection for Data Warehouses |
HP |
HP-UX File System |
File System |
Data Protection for Files |
IBM | IBM Cloud Pak for Data | Database services | Data Protection for Database Services |
IBM |
IBM Db2 |
Database |
Data Protection for Databases |
IBM |
IBM Db2 Purescale |
Database |
Data Protection for Databases |
IBM |
IBM PureFlex |
Database |
Data Protection for Databases |
IBM |
IBM DB2 for i |
Database |
Data Protection for Databases |
IBM |
IBM Informix |
Database |
Data Protection for Databases |
IBM |
IBM Db2 for z/OS |
Database |
Data Protection for z/OS (Db2) |
IBM |
IBM Db2 Analytic Accelerator for z/OS |
Data Warehouse |
Data Protection for z/OS (Db2) |
IBM |
IBM Db2 Warehouse |
Data Warehouse |
Data Protection for Data Warehouses |
IBM |
IBM IMS |
Database |
Data Protection for z/OS (IMS) |
IBM |
IBM z/OS Data Sets (VSAM, XDAP, BDAM, BSAM, QSAM, BPAM, ISAM, OAM) |
File System |
Data Protection for z/OS (Data Sets) |
IBM |
IBM PureData System for Transaction (PDTX) |
Database |
Data Protection for Databases |
IBM |
IBM PureApplication System |
Database |
Data Protection for Databases |
IBM |
IBM Netezza |
Data Warehouse |
Data Protection for Data Warehouses |
IBM |
IBM PureData for Analytics |
Data Warehouse |
Data Protection for Data Warehouses |
IBM |
IBM PureData System for Operational Analytics (PDOA) |
Data Warehouse |
Data Protection for Data Warehouses |
IBM |
IBM BLU Acceleration |
Data Warehouse |
Data Protection for Data Warehouses |
IBM |
IBM BigInsights |
Hadoop |
Data Protection for Big Data |
IBM |
IBM InfoSphere Optim Archival |
Database Tool |
Data Protection for Databases |
IBM |
IBM Master Data Management |
Database Tool |
Data Protection for Databases |
IBM |
IBM Data Stage |
Database Tool |
Data Protection for Databases |
IBM |
AIX File System |
File System |
Data Protection for Files |
IBM |
AIX GPFS |
File System |
Data Protection for Files |
MariaDB Foundation |
MariaDB |
Database |
Data Protection for Databases |
MemSQL Inc. |
MemSQL |
NoSQL |
Data Protection for Big Data |
Microsoft |
MS SQL Server |
Database |
Data Protection for Databases |
Microsoft |
MS SQL Server Cluster |
Database |
Data Protection for Databases |
Microsoft |
Microsoft Analytics Platform System (APS) |
Data Warehouse |
Data Protection for Data Warehouses |
Microsoft |
Windows File Share (WFS) |
File System Protocol |
Data Protection for Files |
Microsoft |
MS File System |
File System |
Data Protection for Files |
MongoDB |
MongoDB |
NoSQL |
Data Protection for Big Data |
Novell |
SuSe File System |
File System |
Data Protection for Files |
Oracle |
Oracle Database |
Database |
Data Protection for Databases |
Oracle |
Oracle Database RAC |
Database |
Data Protection for Databases |
Oracle |
Oracle Sun MySQL |
Database |
Data Protection for Databases |
Oracle |
Oracle Sun MySQL Cluster |
Database |
Data Protection for Databases |
Oracle |
Oracle Exadata |
Data Warehouse |
Data Protection for Data Warehouses |
PostgreSQL |
PostgreSQL |
Database |
Data Protection for Databases |
Red Hat |
Red Hat File System |
File System |
Data Protection for Files |
SAP |
SAP Sybase ASE |
Database |
Data Protection for Databases |
SAP |
SAP Sybase IQ |
Database |
Data Protection for Databases |
SAP |
SAP HANA |
In-memory Database |
Data Protection for SAP HANA |
SAP |
SAP HANA Appliance |
In-memory Data Warehouse |
Data Protection for SAP HANA |
Teradata |
Teradata |
Data Warehouse |
Data Protection for Data Warehouses |
Teradata |
Teradata Aster DB |
Hadoop |
Data Protection for Big Data |
Ubuntu |
Ubuntu File System |
File System |
Data Protection for Files |
Supported web browsers
- Microsoft Edge version 90.0.818.56 and later
- Firefox ESR 52 and later
- Chrome 70 and later
- Display resolution 1366 x 768 or greater
Guardium deployment on cloud
Guardium supports deployment on several cloud platforms.
- For more information about deploying Guardium on Amazon AWS, Google, IBM Cloud, Microsoft Azure, and Oracle OCI, see http://www.ibm.com/support/docview.wss?uid=swg27049576
- For more information about deploying IBM Guardium Vulnerability Assessment on Amazon RDS, see http://www.ibm.com/support/docview.wss?uid=swg27050667
Hardware and virtual machine requirements
Guardium is available as a hardware or software offering, ensuring easy deployment in a wide variety of environments. As a hardware offering, the solution comes with licensed software fully loaded and tested on a physical appliance provided by IBM (hardware appliance). When delivered as a software offering, the solution comes as software images ready for deployment by the user on their own hardware (software appliance), either directly or as virtual appliances.
IBM Security Guardium is installable on Red Hat Enterprise Virtualization, VMware Virtualization, and Microsoft Hyper-V.
For more information about technical requirements, see https://www.ibm.com/support/pages/node/6335779
End of service information
Guardium supports database and operating system versions up to their End-of-Service (EOS), Premier, or Mainstream support end dates. For more information about IBM systems, see http://www-01.ibm.com/software/support/lifecycle/ . For other vendors, contact your vendor representative to confirm their support end dates. IBM offers optional extended service support after EOS. Contact your IBM representative for further information. Guardium supports the hardware system it is running on up to the End-of Marketing (EOM) date plus 5 years or end of support date, whichever is sooner.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.
Was this topic helpful?
Document Information
Modified date:
22 December 2023
UID
ibm16334261