Security Experts:

Connect with us

Hi, what are you looking for?



IBM Launches New Application-Level Data Security Software

InfoSphere Guardium 8 automatically monitors structured data and application usage across the enterprise

InfoSphere Guardium 8 automatically monitors structured data and application usage across the enterprise

IBM announced new data security software this week that automatically monitors structured data and application usage across the enterprise and immediately alerts management to unusual activity. The software, dubbed InfoSphere Guardium 8, monitors user activities at the application layer, including activities by administrators and outsourced personnel with access to CRM, human resources, ERP, accounting, finance and other applications that can contain sensitive data.IBM Database Security Software

For example, if a database administrator at an insurance company tries to access a client’s social security number, salary and medical history, the system can generate an alert or, under defined circumstances, immediately block that administrator’s access to the system for a specified period of time.

The system can also execute automated tests to assess security vulnerabilities such as weak permissions that could leave an organization open to data loss or failed compliance audits. It includes pre-packaged report templates for common regulations such as SOX, HIPAA and PCI.

InfoSphere Guardium is designed to protect sensitive data in SAP systems, SharePoint files and IBM DB2 databases running on System z, It also provides monitoring and assessment capabilities for non-IBM database platforms running on the mainframe such as Oracle for Linux on System z.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.


Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...


The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...