Search

1 to 10 of 98
Sort by

Event
IBM Security Virtual Master Skills University 2020

Let's learn together, even though we’re apart! Mark your calendar for Virtual Master Skills University and get ready for four days of deep-dive technical sessions, educational self-paced hands-on labs, virtual networking, and more. More details coming soon! #i2 #MaaS360 #Resilient ...

 Mon September 21, 2020 09:00 AM - Thu September 24, 2020 05:00 PM ET


Event
Virtual Tech Talk: Guardium Vulnerability Assessment v11.2 — Overview and Latest New Features

The latest release of Guardium Vulnerability Assessment, v11.2, has many new features. This Tech Talk will provide an overview of these features, which include: support for Microsoft Azure cloud databases, support for new CVE's, custom upload of datasources, SSL support for data-source...

 Thu July 16, 2020 | 11:00 AM - 12:00 PM ET


Event
Zero Trust and Your Data, Part 2: Securing Databases and Managing Vulnerabilities

A successful enterprise digital transformation or zero trust strategy depends on how you handle your most sensitive data. As the reliance on data and the volume of data grows exponentially, the need to secure your data becomes paramount. A comprehensive, smart approach to data security can...

 Tue July 14, 2020 | 11:00 AM - 12:00 PM ET


Blog Entry
Resilient and Guardium Data Protection: Together at last!

There is a new integration between IBM Security Resilient and IBM Security Guardium Data Protection , IBM’s leading data security solution that helps organizations discover, classify, monitor, protect and report on their organization’s critical data both on-premise and in the cloud. As...


Blog Entry
IBM Security Guardium Data Encryption now formally supports SAP HANA and Teradata

Files and databases centrally aggregate data, and in turn, present a focal point for thieves. This data can vary widely and include sensitive, regulated information. If not properly secured with measures such as data encryption, there is potential for insider abuse, as well as advanced...


Blog Entry
Files Collected by Windows S-TAP Must Gather V2

Windows S-TAP Must Gather V2 provides much more contents than before. This blog article explains what are supposed to be gathered. Typical output of Windows S-TAP Must Gather V2 In my last blog , we learned how to gather diagnostic files using Windows S-TAP Must Gather. Today's goal is...


Event
Webinar: Why Holistic Enterprise Data Security Requires Guardium z/OS

When the “Tip of the Iceberg” is Not a Cliché: Why Holistic Enterprise Data Security Requires Guardium z/OS ... It looked simple enough. The SOC team picked up a breach event triggered in the SIEM stream and all clues pointed to Bill the DB2 Admin. Bill loves cars. He’s a gear head and he...

 Wed July 22, 2020 | 02:00 PM - 03:00 PM ET


Event
Webinar: Encryption Key Management for Data at Rest... with SKLM

This event belongs to a series of webinars dedicated to mainframe security and will provide people a big picture of of IBM Security Key Lifecycle Manager (SKLM), focusing also on mainframe. Data protection is a primary security goal and several organizations are moving closer to the data...

 Wed June 24, 2020 | 03:00 PM - 04:00 PM CET


Event
Guardium Data Encryption Virtual User Group - Pacific Time Zone Event

This virtual event will replace our planned, in-person regional user groups. This user group will allow existing Guardium Data Encryption (GDE) customers the opportunity to participate in a roundtable discussion with IBM SME's, as well as other GDE customers, to understand the best use of the...

 Thu July 30, 2020 | 09:30 AM - 12:30 PM PT


Event
Guardium Data Encryption Virtual User Group - Eastern Time Zone Event

This virtual event will replace our planned, in-person regional user groups. This user group will allow existing Guardium Data Encryption (GDE) customers the opportunity to participate in a roundtable discussion with IBM SME's, as well as other GDE customers, to understand the best use of the...

 Wed July 29, 2020 | 09:30 AM - 12:30 PM ET