Documente Academic
Documente Profesional
Documente Cultură
Overview
Revised for Guardium 11
Waves of information,
regulations and security tools
create…
Data Compliance Privacy Operational
Uncertainty Requirements Risks Complexity
Effective
External threats Internal threats
operations
Sharp rise in external attacks Ongoing risk of careless Growing need to address a steadily
from non-traditional sources. and malicious insider behavior. increasing number of mandates.
Malicious or
criminal attack 51% System glitches 25% Human error 24%
The Journey: the Data Security cloud transformation is underway, and it will happen fast.
Built on Innovation
• Data labeling (Blockchain)
• Data protection on endpoints
(mobile/IOT)
• Real-time monitoring
WAVE 1 WAVE 2 WAVE 3
• Compliance Accelerators
• Centralized scale
On-Prem Data Hybrid-cloud Data Data Explosion Everywhere
…customers will be looking to leverage Cloud and Cognitive technology to make data security a business decision on risk and privacy
management
IBM Security Guardium Family
Enabling market to
adopt Data Security
• Quick Start Guides
• Cloud based deployment (BYOL Catalog AWS and Azure)
• Support for Cloud DBaaS (native audit log support + External TAP)
• RESTAPI completeness and flexibility
• Guardium AppExchange
Guardium Data Protection • Dashboarding and Analytics
• GDPR Accelerator (discovery/classification, rules/policies, reports)
• Globalization to 8 new languages
• Documentation
• Deployability enhancements: STAP autoconfiguration, automatic Load balancing
• Managed Services for Guardium DP
• Pricing simplification
•
Guardium Data Protection for Files •
Support for NAS and Sharepoint
GDPR Accelerator
Guardium Data Encryption • Protects data from misuse on-premise, cloud, hybrid, or multi-cloud
• Encryption for: Files and Databases, Applications, Teradata environments
Data Risk Manager • Business visibility and automatic handling of data risk
On-Premise, in Cloud
Management Assessment Analytics Management
and Big Data
Response
Data Lakes
REACTIVE
Ecosystem
Compliance Data Data Activity
Reporting Discovery Classification Monitoring Files
(systems)
On-Premise, in Cloud
Resilient Management Assessment
VA* Analytics Management
and Big Data
Response
Data Lakes
REACTIVE
Ecosystem
Guardium Data
Compliance
Guardium Data Guardium Data Protection (DAM,
Activity
AppExchange Classificatio
Reporting
Accelerators Discovery FAM) Monitoring Files
n
(systems)
Discovery, classification,
vulnerability assessment, Applications
entitlement reporting
Encryption, masking,
and redaction Big Data
platforms
IBM
Data and file activity monitoring Security
Guardium
Databases and
data warehouses
Dynamic blocking and masking,
alerts, and quarantine
Compliance automation
and auditing
Mainframes File systems
IBM Security Guardium Data Protection
Monitor – Enforce – Comply
Guardium Data Protection safeguards sensitive data using automated discovery, classification, monitoring, real-time
controls and cognitive analytics, and streamlines compliance with prebuilt reports and workflows
KEY BENEFITS
12
IBM Security Data Risk Manager
Identify – Visualize – Communicate
Data Risk Manager provides executives and their teams with a business-consumable data risk control
center that helps to uncover, analyze, and visualize data-related business risks so they can effectively
collaborate and take action to protect their business.
KEY BENEFITS
13
IBM Security Guardium Analyzer (SaaS)
Find regulated data – Uncover risk – Take action
Guardium Analyzer (SaaS) identifies databases that contain personal and sensitive personal information
and helps teams minimize risk using next-generation classification techniques and vulnerability scanning
to prioritize on-premises and cloud databases containing at-risk data via a software-as-a-service model
KEY BENEFITS
14
IBM Security Guardium Vulnerability Assessment
Detect – Report – Remediate
KEY BENEFITS
15
IBM Security Guardium Big Data Intelligence
Agility – Retention – Insights
Guardium Big Data Intelligence augments your existing data security solution, enriching it with the
ability to quickly create an optimized security data lake that retains large quantities of historical data
over long time horizons to deliver new, enriched analytics insights while reducing costs and delivering
near-real time reporting.
KEY BENEFITS
16
IBM Security Guardium Encryption Portfolio
Protect – Control – Manage
Guardium Data Encryption and Security Key Lifecycle Manager safeguard data from misuse whether
it resides on premises, in a single cloud, multiple clouds or hybrid environments with file and volume
encryption, tokenization, and security key lifecycle management to maintain control of sensitive data and
help address compliance requirements
KEY BENEFITS
17
Hybrid and multicloud are the new normal
USD 438 billion in 2020 USD 609 billion in 2020
2018–2020 CAGR 15% 2018–2020 CAGR 18%
A real-world look at multicloud
Private
clouds
Public clouds
and SaaS
Dedicated
clouds
94% Share of enterprises using
a mix of cloud models
Traditional
67% Share of enterprises using more
than one public cloud provider
IT
USD 640 billion in 2020
2018–2020 CAGR -9%
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any
statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International
Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper
access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be
considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful,
comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems,
products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.