Do you want to protect your data against loss, misuse, human error and other possible dangers?
We will help you implement IBM Security Gardium. We will propose a configuration and licensing, perform an analysis and focus in particular on:
- data risk analysis,
- data protection, not only sensitive data,
- easy adaptation to changes in your IS.
Where does IBM Security Guardium fit in?
- Into databases,
- into file systems,
- into application data,
- into the cloud.
The IBM Security Guardium products
- IBM Security Guardium Data Protection for Databases - it monitors access to data sources, automates the control of compliance with security regulations, protects sensitive data.
- IBM Security Guardium Analyzer - it searches for personal data, helps to understand the risk of leakage of sensitive information, provides analysis „GDPR compliance-as-a-service“.
- IBM Security Guardium Data Protection for Files - it continuously monitors access to unstructured information and protects sensitive data in the corporate environment.
- IBM Guardium Multi-Cloud Data Protection - it protects data from misuse, whether it is in a separate cloud, multi-cloud or hybrid environment.
- IBM Multi-Cloud Data Encryption - it encrypts data stored in a separate cloud, multi-cloud or hybrid environment.
- IBM Security Guardium Big Data Inteligence - it will enrich existing information security solutions with optimized, smart functions „Security Big Data Lake“.
- IBM Security Key Lifecycle Manager - it centralizes, simplifies and automates the management of encryption keys to minimize risks and make operations cheaper.
- IBM Security Guardium Data Protection for Big Data - it will create a scalable architecture for a complete overview of access to information, stored in both Hadoop and NoSQL.
- IBM Security Guardium Vulnerability Assessment - it plans and reports regular scanning and detection of data storage vulnerabilities.
Our focus is especially on databases, where Gardium uses Guardium Data Protection for Databases, which:
- monitors and audits all data activity in real time,
- enforces compliance with security policies,
- aggregates and normalizes audit data in an enterprise environment,
- regularly, automatically generates scalable reports with support for heterogeneous environments.
It quickly adapts to changes in the data environment and can be combined with other products IBM Security Guardium.
The architecture is made by:
- S-TAP agent - software, installed on server, which monitors activities, creates and main data events for auditing. It blocks activities that correspond to defined events and edits SQL queries or returned values in real time.
- K-TAP – module to the kernel
- Less system load than native auditing.
- A-TAP – application-level tapping - monitors internal DB communication.
- Guargium Collector - manages S-TAP agents (installs, updates, changes configuration, …), collects and collects audit events from S-TAP agents. It normalizes audit data, generates reports, monitors changes in the configuration, looks for changes in the DB infrastructure. It provides a user interface and can serve as an infrastructure node of the security system.
- Guargium Aggregator - centralizes the management (Guardium Collectors, as well as individual S-TAP agents), collects audit events from Guardium Collectors. It normalizes audit data, generates reports and provides a user interface.
