Search

1 to 10 of 110
Sort by

Blog Entry
Database Activity Monitoring: Agent-based vs. Native Logging

Introduction The emergence of cloud database services has driven several Database Activity Monitoring (DAM) solutions to enable and consume native database auditing in order to provide visibility into user activities. Traditionally, DAM solutions have provided this visibility independently...


Event
Guardium Vulnerability Assessment Virtual User Group - All Areas

This virtual event will replace our planned, in-person regional user groups. Please register for a virtual event in your area! This user group will allow existing Guardium Vulnerability Assessment customers the opportunity to participate in a roundtable discussion with IBM SME's, as well as...

 Wed August 12, 2020 | 11:00 AM - 02:30 PM ET


Event
Webinar: Detecting Guardium Database Login Failures

Guardium data security policies help flag suspicious database activity and events. This session will demonstrate how to create a policy that detects and alerts on database login failures that occur multiple times over a short time period, which may indicate an attempting cybersecurity attack. ...

 Tue July 14, 2020 | 12:00 PM - 01:00 PM ET


Event
IBM Security Virtual Master Skills University 2020

Let's learn together, even though we’re apart! Mark your calendar for Virtual Master Skills University and get ready for four days of deep-dive technical sessions, educational self-paced hands-on labs, virtual networking, and more. More details coming soon! #i2 #MaaS360 #Resilient ...

 Mon September 21, 2020 09:00 AM - Thu September 24, 2020 05:00 PM ET


Library Entry
Take Action from your SOAR Platform to Keep Your Data Secure

Protecting your most critical asset — your data — is a top priority. Failing to do so could lead to a data breach and bring undesired consequences, such as significant costs ranging from loss of business to expensive fines. Investing in technologies that help improve the ability to rapidly...


Event
Virtual Tech Talk: Guardium Vulnerability Assessment v11.2 — Overview and Latest New Features

The latest release of Guardium Vulnerability Assessment, v11.2, has many new features. This Tech Talk will provide an overview of these features, which include: support for Microsoft Azure cloud databases, support for new CVE's, custom upload of datasources, SSL support for data-source...

 Thu July 16, 2020 | 11:00 AM - 12:00 PM ET


Event
Zero Trust and Your Data, Part 2: Securing Databases and Managing Vulnerabilities

A successful enterprise digital transformation or zero trust strategy depends on how you handle your most sensitive data. As the reliance on data and the volume of data grows exponentially, the need to secure your data becomes paramount. A comprehensive, smart approach to data security can...

 Tue July 14, 2020 | 11:00 AM - 12:00 PM ET


Blog Entry
Discover a new integration between IBM Security Resilient and IBM Security Guardium Data Protection

There is a new integration between IBM Security Resilient and IBM Security Guardium Data Protection , IBM’s leading data security solution that helps organizations discover, classify, monitor, protect and report on their organization’s critical data both on-premise and in the cloud. As...


Blog Entry
Resilient and Guardium Data Protection: Together at last!

There is a new integration between IBM Security Resilient and IBM Security Guardium Data Protection , IBM’s leading data security solution that helps organizations discover, classify, monitor, protect and report on their organization’s critical data both on-premise and in the cloud. As...


Blog Entry
IBM Security Guardium Data Encryption now formally supports SAP HANA and Teradata

Files and databases centrally aggregate data, and in turn, present a focal point for thieves. This data can vary widely and include sensitive, regulated information. If not properly secured with measures such as data encryption, there is potential for insider abuse, as well as advanced...

CYNTHIA LUU's profile image