IBM InfoSphere Guardium

The IBM InfoSphere Guardium products provide a simple, robust solution designed to prevent unauthorized data access, changes, and leaks from databases and files, helping to ensure the integrity of information in the data center and automate compliance controls (PCI DSS, HIPA, ISO 27001/2, etc.). They are designed to secure and continuously monitor access to data in enterprise databases (IBM Informix, IBM DB2, MySQL, PostgreSQL, Microsoft SQL Server, etc.), data warehouses (Netezza, Teradata, etc.), file shares, document-sharing solutions (Microsoft Windows file share, Microsoft SharePoint) , and big data environments such as Hadoop. Additionally, they are designed to assist you to enforce your policies for sensitive data access across the enterprise using a scalable platform.

The IBM data security solution prevents unauthorized or suspicious activities by privileged insiders and potential hackers. It also monitors for potential fraud by users of enterprise applications such as Oracle E-Business Suite, PeopleSoft, SAP and custom applications.

But as remarkable as this solution is for what it does, it’s equally remarkable for what it doesn’t do. It has negligible impact on performance, does not require changes to your data sources and does not rely on native logs or auditing utilities. A centralized audit repository designed to maximize security, combined with an integrated application that automates compliance workflow, enables the products to help you streamline compliance validation activities across a wide variety of mandates.

InfoSphere Guardium Database Activity Monitor products can help you monitor data activity and protect sensitive data by:
Automatically locating databases and discovering and classifying sensitive information within them
Enabling high visibility at a granular level into database, file share, warehousing, document-sharing, and Hadoop transactions that involve sensitive data
Tracking activities of end users who access data indirectly through enterprise applications
Monitoring and enforcing a wide range of policies, including sensitive data access, database change control, and privileged user actions
Creating a single, secure centralized audit repository for large numbers of heterogeneous systems and databases
Automating the entire compliance auditing process, including creating and distributing reports as well as capturing comments and signatures

IBM InfoSphere Guardium Vulnerability Assessment harden database infrastructure against vulnerabilities by:
Automatically assessing database vulnerabilities and configuration flaws
Locking down configurations after recommended changes are implemented
Discovering existing entitlements to data to assess appropriate access rights

IBM InfoSphere Guardium Data Redaction protects sensitive information buried in unstructured documents and forms from unintentional disclosure. The automated solution lends efficiency to the redaction process by detecting sensitive information and automatically removing it from the version of the documents made available to unprivileged readers. It supports many document formats, including scanned documents, PDF, TIFF, XML and Microsoft Word.

IBM InfoSphere Guardium Data Encryption provides encryption capabilities to help you safeguard structured and unstructured data and comply with industry and regulatory requirements. This software performs encryption and decryption operations with minimal performance impact and requires no changes to databases, applications or networks.

Drawing1

 

Top