The IBM Security Guardium solution is offered in two versions:
-
IBM Security Guardium Database Activity Monitoring (DAM)
-
IBM Security Guardium File Activity Monitoring (FAM) - Use Guardium file activity monitoring to extend monitoring capabilities to file servers.
Guardium products can help you:
-
Automatically locate databases and discover and classify sensitive information within them;
-
Automatically assess database vulnerabilities and configuration flaws;
-
Ensure that configurations are locked down after recommended changes are implemented;
-
Enable high visibility at a granular level into database transactions that involve sensitive data;
-
Track activities of end users who access data indirectly through enterprise applications;
-
Monitor and enforce a wide range of policies, including sensitive data access, database change control, and privileged user actions;
-
Create a single, secure centralized audit repository for large numbers of heterogeneous systems and databases; and
-
Automate the entire compliance auditing process, including creating and distributing reports as well as capturing comments and signatures.
This Article Was Written & published by Meena R, Senior Manager - IT, at Luminis Consulting Services Pvt. Ltd, India.
Over the past 16 years, Meena has built a following of IT professionals, particularly in Cybersecurity, Cisco Technologies, and Networking...
She is so obsessed with Cybersecurity domain that she is going out of her way and sharing hugely valuable posts and writings about Cybersecurity on website, and social media platforms.
34,000+ professionals are following her on Facebook and mesmerized by the quality of content of her posts on Facebook.
If you haven't yet been touched by her enthusiastic work of sharing quality info about Cybersecurity, then you can follow her on Facebook:
Click Here to follow her: Cybersecurity PRISM