Você está na página 1de 11

IBM Security Guardium Analyzer

Why You Should Care About Discovery & Classification

You can’t protect what you


don’t know you have!

Discovery & classification are


the first steps to compliance &
comprehensive protection

Demand for discovery &


classification is increasing with
resurgence of privacy mandates

2 IBM Security ©2019-01-21 IBM Corporation


IBM Security Guardium Analyzer

Efficiently identify security and compliance risk associated with


regulated data
Identify databases that contain personal and sensitive personal information and minimize risk using
next-generation classification techniques and vulnerability scanning to
prioritize on-premises and cloud databases containing at-risk data via a software-as-a-service model

NAME

Find Regulated Data Uncover Risk Take Action


A next-generation Specialized risk-scoring Risk details
classification engine and pre- techniques, applied to the and remediation
built data patterns help results of the vulnerability recommendations help you
efficiently find and classify scans and classification understand how to address
regulated data effort, provide prioritized risk vulnerabilities and data risks
information

3 IBM Security ©2019-01-21 IBM Corporation


Guardium Analyzer: Next Generation Data Classification
WHAT

New, IBM Research-developed classification engine (“System T”) provides more rigorous data
classification rules and lookup

HOW

Classification engine scans and analyzes the actual text in databases to discover and classify
personal and sensitive personal data:

• Extracts data from a table


• Crawls the data
• Applies taxonomy and performs dictionary lookup
• Identifies personal and sensitive personal data based on Guardium Analyzer’s out-of-the-box
patterns

Note: Users can leverage IBM’s pre-built GDPR data patterns, user-provided patterns, or a
combination of both

WHY
Using this classification approach, data classification rules may be more expressive, improving
accuracy

Note: Accuracy of classification ultimately depends on the accuracy of the rules that the
classification is based on.

4 IBM Security ©2019-01-21 IBM Corporation


Key Value Props for IBM Security Guardium Analyzer

1. SaaS offering that helps customers:


 Find private/sensitive data in on-premises and cloud databases
 Uncover risk by assessing vulnerabilities and GDPR personal and sensitive personal
(aka ‘special category’) data patterns
 Take action based on a prioritized list of at-risk DBs and remediation
recommendations
2. Empowers enterprises of all sizes and in any vertical to begin the “assess”
process in support of GDPR
3. Allows customers focus on their business, no need to invest in IT or
hardware resources to deploy
 SaaS based solution
 Monthly subscription based pricing
4. Delivers an intuitive dashboard view of insights
 End-user designed screens
 Click through view of databases at risk, classified data, vulnerabilities, and more

5 IBM Security ©2019-01-21 IBM Corporation


IBM Security Guardium Analyzer:
Data Classification Patterns: Out of the Box

Out of the box, Guardium supports discovery and classification for GDPR, and PII, and
more. The pre-built patterns are supported by our next generation classification engine.

Examples* of out-of- Examples of out-of- Examples of out-of-


the-box patterns: the-box patterns: the-box patterns:
GDPR PCI DSS HIPAA/eHA

• Name • Name • Name


• Address (postal) • Credit Card Number • Postal address
• Email address • Social Security Number
• National identification • Email Address
number • Phone Number
• Drivers license number • US Medical Identifiers
• National insurance number
• IBAN
• IP address
• Location
• Gender
• Religion/Faith
• Sexual orientation

6 IBM Security ©2019-01-21 IBM Corporation


IBM Security Guardium Analyzer:
Find regulated data. Uncover risks. Take action.

7 IBM Security ©2019-01-21 IBM Corporation


Architecture Overview

Connector

On-Prem DBs

Connector Guardium
Cloud DBs
Analyzer

8 IBM Security ©2019-01-21 IBM Corporation


JDBC Connector is just a
communications protocol – basically
our cloud has no idea how to login or
access your DBs. The connector
allows us to work as a client and
connect to your DBs.
How can you get started?
Sign up for our Free Trial (Available now)

Marketplace Page

Trial Home Page

10 IBM Security ©2019-01-21 IBM Corporation


THANK YOU
FOLLOW US ON:

ibm.com/security

securityintelligence.com

xforce.ibmcloud.com

@ibmsecurity

youtube/user/ibmsecuritysolutions

© Copyright IBM Corporation 2019-01-21. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's
current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other
company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered,
destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be
completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,
products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.

Você também pode gostar