Control over sensitive organization data has become a real priority for system teams. That’s why the importance of solutions like IBM Guardium has become increasingly crucial. Thanks to this revolutionary technology, discovering, classifying, analyzing, protecting and controlling access to sensitive data can be a relatively simple and secure process.
With the help of our experts and you will be able to detect potential vulnerabilities, controlling your critical data and files. During the course we will show you how to create reports and audits. Not forgetting about alerts, metrics, and other compliance monitoring processes for different security policies.
- IBM Guardium core functions.
- Key components of the IBM Guardium architecture.
- User interface and command line.
- Management of users and groups.
- Management Console.
- Policy rules for processing information collected from the database and file servers.
- Configuration auditing. Vulnerability assessment and database detection.
- Consultations and reports to examine trends of interest.
- Automation of compliance workflows.
- Monitoring file access to track files on your servers.
This course is intended for system and database administrators.