IBM InfoSphere Guardium DAM (Data Activity Monitor)


Guardium Logo

Monitor and audit data access and automate compliance controls in the era of big data


IBM® InfoSphere® Guardium® Data Activity Monitor prevents unauthorized data access, alerts on changes or leaks to help ensure data integrity, automates compliance controls and protects against internal and external threats. Continuous monitoring and real time security policies protect data across the enterprise without changes to databases or applications or performance impact. InfoSphere Guardium Data Activity Monitor is a market leader for big data security solutions delivering a 239% ROI in less than 6 months and protects data at the source where controls are the most scalable and effective.

InfoSphere Guardium Data Activity Monitor can:

  • Monitor and audit all data activity for all platforms and protocols.
  • Enforce security policies in real time for all data access, change control and user activities.
  • Create a centralized repository of audit data for enterprise compliance, reporting and forensics.
  • Support heterogeneous environments all leading platforms, file shares and operating systems, including big data environments.

The following video details the main issues faced by large enterprises related to database security:

Monitor and audit all data activity

  • Understand and develop complete visibility into all transactions for all platforms and protocols by users including database administrators, developers, outsourced personnel and applications
  • Identify application users who make unauthorized changes from common service accounts
  • Provide user and application access monitoring independent of native database logging and audit functions
  • Improve data security by detecting unusual database read and update activity from the application layer
  • Automate sensitive data discovery and classification

Enforce security policies in real time

  • Monitor and enforce security policies for sensitive data access, privileged user actions, change control, application user activities and security exceptions
  • Use access policies to identify anomalous behavior by comparing data activity to a normal behavior baseline
  • Support exception policies based on definable thresholds such as SQL errors
  • Use extrusion policies to examine data leaving the database for specific value patterns such as credit card numbers
  • Support policy-based actions such as near real time security alerts, software blocking and user quarantines

Create a centralized repository of audit data

  • Aggregate data throughout your enterprise for compliance auditing and reporting, correlation and forensics without enabling native database audit functions
  • Provide a tamper-proof audit trail that supports the separation of duties required by auditors
  • Deliver customizable compliance workflow automation to generate compliance reports and distribute them to oversight teams for electronic sign-offs and escalation

Support heterogeneous environments

  • Monitor and audit Hadoop-based systems such as IBM InfoSphere BigInsights™ and Cloudera
  • Support enterprise databases and operating systems including IBM DB2®, Teradata, IBM PureSystems, Sybase, Microsoft SQL Server, UNIX and Linux
  • Support key enterprise resource planning and customer relationship management applications as well as custom and packaged applications
  • Provide capabilities to track file-sharing activities on major platforms including Microsoft SharePoint
  • Discover and classify sensitive enterprise data for all platforms and protocols

Our Differentials

  • 11+ years with Guardium in Brazil
  • 250+ Appliances installed in Brazil
  • 38.000+ hours of Guardium services
  • Sole partner in the Americas (including USA) with SPP certification (only 2 worldwide)
  • Sole IBM-LATAM partner certified for Mainframe Environments
  • Extensive experience in complex implementations including Mainframe, Multiple Appliances, Aggregators, Central Management and DR, SIEM integration

Downloads

Data Sheet: IBM InfoSphere Guardium Data Activity Monitor

Whitepaper: Tooltips for securing Big Data environments

Solution Brief: Securing and protecting the organization’s most sensitive data


Success Cases

Video: Volkswagen Financial Services
(in Portuguese)

Success Story: Volkswagen Financial Services

About LEADCOMM and IBM InfoSphere GUARDIUM

LEADCOMM identified the Guardium technology soon after its creation and brought that technology to Brazil in 2004 as the sole distributor for Brazil, a fact which lasted until the company's acquisition by IBM in November 2009. From this date, LEADCOMM has become the main partner for IBM Guardium technology in Brazil and one of the main partners in the world, recognized by IBM through the following authorizations:

IBM PREMIER BUSINESS PARTNER

 

IBM Premium Partner
 
 

OsPremier Business Partners have demonstrated superior skills and market success. They actively collaborate with IBM to deliver significant client value through innovative solutions.

LEADCOMM is one of only two S.P.P. (Support Providing Partner) approved for IBM InfoSphere GUARDIUM worldwide and is the main services provider for this complex solution.

IBM SVP INDUSTRY AUTHORIZATION - BANKING

 
IBM SVP INDUSTRY
 

Software Value Plus (SVP) Industry Authorization is an initiative for IBM's most highly industry skilled Business Partners.

SVP Industry Authorization recognizes and rewards industry focused Business Partners who sell value-add solutions that implement the business capability of an IBM Industry Solution Offering. Industry Solution Offerings are prescriptive IBM software offerings when combined with Business Partner’s value-add deliver targeted solutions to industry clients’ challenges and opportunities.

IBM SVP CAPABILITY AUTHORIZATION - SECURITY

 
IBM SVP CAPABILITY
 

Software Value Plus (SVP) Security Authorization is an initiative for Business Partners focused on delivering value-add security solutions protecting client’s IT systems and assets.

SVP Security Authorization recognizes and rewards Business Partners who sell their proven value-add security solutions. These solutions, enabled by IBM software products, address both foundational and high-growth security solutions including mobile, big data and advanced attacks.