Security Experts:

Connect with us

Hi, what are you looking for?



IBM Launches New Application-Level Data Security Software

InfoSphere Guardium 8 automatically monitors structured data and application usage across the enterprise

InfoSphere Guardium 8 automatically monitors structured data and application usage across the enterprise

IBM announced new data security software this week that automatically monitors structured data and application usage across the enterprise and immediately alerts management to unusual activity. The software, dubbed InfoSphere Guardium 8, monitors user activities at the application layer, including activities by administrators and outsourced personnel with access to CRM, human resources, ERP, accounting, finance and other applications that can contain sensitive data.IBM Database Security Software

For example, if a database administrator at an insurance company tries to access a client’s social security number, salary and medical history, the system can generate an alert or, under defined circumstances, immediately block that administrator’s access to the system for a specified period of time.

The system can also execute automated tests to assess security vulnerabilities such as weak permissions that could leave an organization open to data loss or failed compliance audits. It includes pre-packaged report templates for common regulations such as SOX, HIPAA and PCI.

InfoSphere Guardium is designed to protect sensitive data in SAP systems, SharePoint files and IBM DB2 databases running on System z, It also provides monitoring and assessment capabilities for non-IBM database platforms running on the mainframe such as Oracle for Linux on System z.

Written By

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Application Security

Google’s Threat Analysis Group (TAG) has shared technical details on an Internet Explorer zero-day vulnerability exploited in attacks by North Korean hacking group APT37.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...