Security Flashcards

1
Q

IBM Security® Guardium®

A

IBM Security® Guardium® is a family of data security software in the IBM Security portfolio that uncovers vulnerabilities and protects sensitive on-premises and cloud data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Guardium

A

IBM Guardium is a comprehensive data security platform that provides robust protection for sensitive data across a variety of environments, including databases, data warehouses, big data platforms, and cloud environments. It is particularly designed to help organizations manage and secure their data through automated discovery, classification, and encryption, while also supporting compliance with various regulatory requirements.

Key functionalities of IBM Guardium include:

Data Protection and Compliance: Guardium offers tools for automated data discovery, classification, and vulnerability assessment. It helps organizations comply with regulations such as GDPR, PCI DSS, and HIPAA by automating compliance workflows and providing extensive monitoring and reporting capabilities.
Real-time Monitoring and Protection: The platform provides real-time activity monitoring for databases, data warehouses, and other data sources to detect unauthorized or suspicious activity. It can generate alerts, enforce real-time controls like dynamic data masking, and block or quarantine suspicious user IDs to prevent data leaks.
Advanced Analytics for Threat Detection: Guardium uses machine learning to analyze and score data activity to help security teams identify and prioritize threats. This analytics capability is integral to its approach to reducing the complexity of managing data security and compliance data.
Scalability and Flexibility: Guardium can be scaled to handle different volumes from a single database to thousands of heterogeneous databases across the enterprise. It supports a wide range of environments from on-premises to multi-cloud and hybrid environments.
Integration Capabilities: The platform integrates well with other IT management and security management solutions, providing a holistic approach to data security that includes encryption, access management, and comprehensive audit trails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A

IBM Security QRadar SIEM (Security Information and Event Management) is a powerful cybersecurity tool designed to provide comprehensive security monitoring and management. QRadar assists organizations in detecting, prioritizing, and responding to potential security threats. It integrates multiple layers of AI and automation to enhance alert enrichment, threat prioritization, and incident correlation, allowing security teams to focus on more strategic tasks rather than repetitive manual ones.

The platform offers several key features:

Risk-based alert prioritization: Utilizes advanced AI to apply multiple layers of risk scoring on each observable within a case, ensuring that analysts focus on the most critical issues.
Threat intelligence integration: Combines insights from various sources, including IBM X-Force Threat Intelligence, to enhance detection and response capabilities.
Advanced analytics: Supports real-time threat detection and includes capabilities for user behavior analytics and network traffic analysis to identify suspicious activities.
Comprehensive data integration: Seamlessly integrates with a wide range of data sources and security tools, providing a unified view across the security ecosystem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Guardium Capabilities

A

Discover and classify your sensitive data
Analyze risk with contextual insights and analytics
Protect sensitive data sources
Respond to threats in real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Prospecting: IBM Guardium Insights

A

How are you meeting challenges around long-term data storage requirements for compliance mandates, such as the General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA) or Sarbanes-Oxley (SOX)?

How are you, your data security administrators, or database administrators (DBAs) keeping up with the demands for rapidly delivering data reports to key stakeholders, such as auditors?

Does your infrastructure have the capacity and processing power needed to store large data volumes?

How are you addressing rising storage costs as data storage requirements increase? Are you building a data lake, or do you require an optimized data security hub? OK

What methods are you employing to bring together context-aware data and apply analytics for actionable insights?

How are you monitoring privileged user access and behavior to your databases deployed in cloud platforms such as Azure or AWS?

What are you using for an early warning system to prevent breaches for data stored on cloud platforms?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Prospecting: Guardium Data Protection

A

What are you using for an early warning system to prevent breaches?

How “real time” is your current solution in sending you alerts or actively preventing undesired access to data?

How do you know if internal staff and privileged users are using data?

How do you find and assess database vulnerabilities?

How do you know where sensitive data resides and if it’s copied?

What are you doing about the escalating costs of implementing additional security policies?

How do you prevent someone from accessing data they shouldn’t be looking at?

How do you ensure that authorized employees have access to the right data?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Prospecting: Discover and Classify

A

What are the main challenges or business drivers you’re trying to solve in sensitive data discovery and classification?

How do you do sensitive data discovery today?

What types of sensitive data do you store, share and process? How do you organize the data for business purposes? e.g. California clients vs. European clients?

How confident are you in the accuracy of your insights derived from your current sensitive data discovery process?

How are you using your discovered sensitive data today?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Prospecting: Guardium Data Encryption

A

How are you using data encryption today? Do you use native encryption options? What is your strategy for protecting data-at-rest?

Are you facing any regulatory requirements that recommend you protect, hide, pseudonymize, or encrypt data? How do you provide that data protection today?

How are you protecting your data in light of regulatory requirements, such as General Data Protection Regulation (GDPR)?

How are you protecting sensitive data from unauthorized access, theft, or changes?

Do you have data that’s hosted in third-party cloud environments? How is your data being protected in the cloud and are you in control of that protection?

How do you prevent someone from accessing data they shouldn’t be looking at?

How do you prevent unwanted changes to your data?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Prospecting: IBM Security encryption key offerings

A

Conversation starters – Guardium Key Lifecycle Manager (GKLM)

Are you planning on adding or replacing storage? If so, how is your data protected against loss? Do you need to ensure that critical data is protected and always available?

Are you aware of the requirements for privacy and protection from disclosure that are required for your industry?

Do you collect and store client information and are you, therefore, subject to data privacy breach laws?

Do you maintain high-value intellectual property?

Are you being asked to consolidate encryption key management and are you aware of the new Key Management Interoperability Protocol (KMIP) standard and IBM’s support for that standard?

Conversation starters – Guardium Cloud Key Manager (GCKM, part of Guardium Data Encryption)

Cloud service providers (CSPs) have unfettered access to the sensitive data they host. Are you able to keep CSPs out of your data?

Do you control the keys to the data stored and encrypted by Cloud Service Provider?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Guardium Insights

A

Adapt to changing data environments and monitor modern and traditional data sources flexibly with native agentless streaming or leveraging Guardium Data Protection agents

Centralize protection and visibility across disparate cloud and on-premises data sources

Accelerate compliance by defining policies, goals, and streamlining the audit and reporting process

Enrich risk insights with intelligent analytics, helping to uncover and respond to threats quicker — either through Guardium Insights or collaboratively through integration with key security and IT tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Guardium Data Protection

A

Identify and classify sensitive data across hybrid multicloud environments

Visualize and understand risk holistically, and drill down to understand the root cause

Quickly uncover and respond to suspicious insider threats and external breach attempts

Simplify compliance through pre-built or custom policies, workflows, and reporting

Accelerate audit activities and get a tamper-proof audit trail

Integrate with data security and IT service management tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Guardium Vulnerability Assessment

A

Scan the entire data source infrastructure and provide platform-specific static tests, preconfigured vulnerability tests, and dynamic tests for behavioral vulnerabilities

Remediate issues using detailed recommendation plans with simple, actionable steps to harden data sources

Operationalize and orchestrate vulnerability assessment remediation

Available reports include summary security evaluations, deep dives, sign-off, and scheduled assessments with automatic report distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Guardium Data Encryption

A

Granular data encryption at the file, database, or application level for data stored on-premises or in the cloud

Obscure data at rest with tokenization or specific parts of data fields with data masking

Consistent policy enforcement for encryption key management and user access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Guardium Key Lifecycle Manager

A

Centralizes, simplifies, and automates encryption key management

Provides robust key storage, serving, and lifecycle management for IBM and non-IBM self-encrypting solutions

Unifies enterprise key management with support of key exchange standards that include KMIP, IPP, and REST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Guardium Data Risk Manager

A

Identify high-value, business-sensitive assets at risk from internal and external threats with interactive data risk control center

Visualize potential business risks and provide remediation recommendations

Communicate data-risk information across teams, business units and technologies to your board of directors with an executive-ready dashboard and reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

GDE

A

Guardium Date Encryption

17
Q

SED

A

Self encrypting drive

18
Q

SOC

A

Security Operations Center

19
Q
A