Posts
1touch Integration and the Custom Table Builder
integration guardium_data_protection classificationAuthor: John Haldeman 1touch and IBM have entered into a close partnership to work together to expand their security capabilities. Results from 1touch’s renowned data classification capabilities can now be easily imported into IBM Security Guardium Insights. See this link under “Import and export data” for more details on how to do that. Additionally, formal integration points are coming soon for Guardium Data Protection, the traditional Guardium database activity monitoring suite.
SOX Policies in Guardium Insights
sox privileged_user data_integrity guardium_insights policiesAuthor: John Haldeman
In our previous post we talked about SOX reporting. In this post we’ll discuss what a SOX policy might look like for similar requirements.
SOX Reporting in Guardium Insights
sox privileged_user data_integrity guardium_insights reportsAuthor: John Haldeman
Our first post! Guardium Insights GA’d last week, so let’s talk about some bread and butter Guardium requirements and see how they’re implemented in Insights. SOX monitoring, in my experience, is one of the most common requirements for customers using Guardium. Now, it is less common that it’s the only requirement, but it is likely that SOX or requirements that are similar to SOX’s are somewhere in the mix. Here, we’re looking at privileged users and threats to data integrity (ie: modifications).