Escort Information security: IBM Guardium into the big data age

Source: Internet
Author: User
Keywords Security information security large data age providing

November 22, IBM announced the world's leading database security software IBM Guardium fully into the field of large data, the use of intelligent, integrated and expert products and services for various industries to provide large data security management and information security solutions, to help enterprises effectively respond to the large data age of information security challenges To grab the data value of the new heights.

"There is no doubt that the new data platform created by the big Data age offers more potential opportunities for businesses, as well as unprecedented challenges for information security governance-more authentic and credible data to be judged," said Dr Ron Ben Natan, vice president and chief technology officer at IBM Guardium. More, More serious security and compliance issues need to be addressed. Forrester's 2011 "The Forrester Wave: Database Audit and Realtime protection" survey shows that IBM Guardium has become the leader in the database audit and real-time protection market. With its valuable experience and leading performance in database security over the past 10 years, IBM Guardium has pioneered a large data governance and information security solution that has become a ' convoy ' of the big data age with its high ease of use and compatibility. ”

Big Data: New data value brings new security challenges

IDC research shows that there are 1.8 trillion gigabytes of data in the digital field. Corporate data is growing at a rate of 55% per cent a year. In the big data age, the combination of security and business data can be of great value, and Gartner predicts that by 2016 40% of companies – mainly in the banking, insurance, pharmaceutical and defense industries – will actively analyze at least 10TB of data to identify potentially dangerous activities.

IBM believes that "big data" has become an important feature of the times, the large data quality of scale (Volume), diversification (produced) and high speed (velocity) means that enterprises will face greater challenges in extracting analytical value and time sensitivity, and how to obtain authentic data , avoiding risk and realizing the authenticity of data (veracity) is of paramount importance.

To help enterprises comprehensively deal with the information security challenges brought by large data, IBM provides intelligent, integrated and expert products and services to enterprises through a complete set of IBM Security Management Framework System. and set up a global information security related institutions, including: Security incident Processing Center, Information Security Research Institute, Security Solutions Development Center, Information Advanced Research Institute.

IBM Guardium: Escort Large data security

As a security platform in the database age, Database activity Monitoring (DAM) system is an advanced security platform to monitor the misuse of relational database. Dam system technology is unique, can be near real-time speed Analysis database query, distinguish normal operation and attack. Over the past 10 years, IBM has been a leader in the dam market and has been committed to helping businesses solve the security problems and pitfalls of traditional database environments and data warehouses. Into the big Data age, IBM has a forward-looking technology and platform advantage in database security to extend to large data categories. Hadoop activity Monitoring (HAM), as a security platform for the large data age, is the result of dam's advance into large data areas, and was added to the latest version of IBM Guardium in October 2012 to provide customers with comprehensive and real-time data protection.

Through the integration of IBM Guardium and IBM's large data analysis tools Biginsights Core products IBM Security Management architecture, the Hadoop Activity Monitoring (HAM) feature helps organizations minimize the impact on large data server resources without altering the configuration of large data systems, At the same time, it contains the detailed review and tracking of fine-grained database activities, has real-time alerting function, minimizes the impact on the network, realizes 100% visibility of large data activity and provides heterogeneous support.

IBM Software Group Greater China Information Management software data security Governance sales Director Ganjaling said: "From the leader of database security to the pioneer in the field of large data security, IBM Guardium has been committed to enterprise information data security, providing audit compliance reports and best practices for enterprises." Prior to entering the Chinese market, IBM Guardium's leading experience has been running through the world's leading companies to protect their vital data. The world's top companies include the top 5 banks in the world, 2 top 3 retail companies, 5 top 6 leading insurers, top PC business Companies, global 4 healthcare companies, top government agencies, and 8 of the world's top 10 telecoms companies. In the time of entering the Chinese market for more than a year, IBM Guardium realized the remarkable development from 0 to 72 customers, providing advanced information security technology and rich practical experience for enterprises from all walks of life, such as banking, insurance, manufacturing, aviation, government, medical, Internet and so on. As the pioneer of data security, IBM is taking practical action to escort the enterprise information security in the increasingly complex and large data environment. ”

About IBM Guardium

As the only solution to the security and compliance/auditing problems of the entire database at present, IBM Guardium provides enterprises with real-time activity monitoring and automated compliance reports for large data security to help enterprises prevent data leaks by providing the visibility of large data processing and automated compliance reports, Reduce corporate compliance costs and ensure data integrity. At the same time to meet enterprise data security and audit requirements from four aspects:

Discovery and Classification: Understand the access mode of database in database network, identify and classify sensitive data, update security policy, prevent embedded malware

Assessment and Reinforcement: vulnerability/vulnerability assessment management; configuration audit; Test database security performance against best practice standards (STIG, CIS, CVE)

Monitoring and execution: Preventing network attacks, monitoring, restricting privileged users, setting security baselines, blocking exception operations, Siem Logging integration, alerting and tracking, detecting application layer fraud, implementing change control, heterogeneous environment support

Audit and report: centralized report management; Audit process workflow; Audit information compliance; event analysis and mining; information preservation and issuance; independent of database management

Unlike most security solutions, IBM Guardium has a distinct technical advantage, including: through the collection of network data, analysis, identification, real-time monitoring of the database in the network all Access operations; It discovers all kinds of illegal database operation behavior, timely alarm response, whole process operation reduction, realizes the accurate whole track and location of security incident, and comprehensively guarantees the security of database system.

The extensible architecture of IBM Guardium supports a wide range of operating environments, enabling centralized collection and specification of enterprise-wide audit data and centralized management of security policies through the network console. Its Cross-platform solution supports all the major DBMS platforms and protocols that run on large operating systems, including Windows, UNIX, Linux, and z/OS.

"Guardium plays a pivotal role in IBM's overall security solution and is the core product of the data security dimension," said Ron Ben Natan, vice president and chief technology officer of IBM Guardium. Guardium not only provides deep data protection, but also enables synergies with other parts of IBM's overall security solution. ”

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.