Use Cases and Deployment Scope
IBM Guardium Data Protection and Vulnerability Assessment has helped me gain visibility into who, how, where, when, and in what ways sensitive data is being accessed within the organization. Usually, our sensitive data is stored in relational databases and non-relational, storage systems with unstructured sensitive data. Being able to discover vulnerabilities that could impact sensitive data has been another huge achievement. This has allowed us to understand the level of risk in accessing sensitive data. We have also been able to identify and trace all operations of database administrators and users who have access to sensitive data.
Other Software Used
IBM Security QRadar SOAR, IBM Verify, IBM Security QRadar SIEM