IBM Guardium Data Detection and Response Features
Administration (7)
Supported Databases
Supports different database platforms and data types. Typically integrates with a variety of existing databases.
Data Management
Administrators can access and organize data related to incidents to produce reports or make data more navigable.
Logging and Reporting
Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
API / integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Auditing
Documents access and alterations of the database for analytics and reporting.
Data Discovery
Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems.
Access Control
Supports LDAP Protocol to enable access control and governance.
Governance (1)
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Protection (4)
Database Activity Monitoring
Documents the actions related to the database. Alerts users of incidents and abnormal activities and documents the access point.
Firewall
Protects database and sensitive information from a variety of attacks and malware threats.
Data Masking
Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.
Audits
Perform ad-hoc or ongoing IT audits at different levels of the company.
Data Protection (4)
Data Masking
Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.
Data Encryption/Security
Manages policies for user data access and data encryption.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Analysis (3)
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.
User Analytics
Allows for reporting and documentation of individual user behavior and privileges.





