Вы находитесь на странице: 1из 4

IBM Security Guardium Tech Talks

Updated Sept 2019

This document lists all the Guardium Tech Talks that have been held over the past several years,
organized by date. The links go to the IBM Security youtube channel.
Here’s the complete Guardium Tech Talk playlist.

2019

• What's New in IBM Security Guardium Data Protection 10.6 (January 15, 2019)
• Facilitating Secure Hybrid Cloud Adoption with Guardium (April 2, 2019)
• Encryption is the Fastest way to Protect Data (April 16, 2019)
• An Integrated Approach to Data Risk Management (May 14, 2019)
• Protecting Sensitive Data with Tokenization (June 4, 2019)
• What's New in Guardium V11 (June 25, 2019)
• Improve your Data Security with Guardium Vulnerability Assessment V11: Overview (Part 1) July 30,
2019)
• Improve your Data Security with Guardium Vulnerability Assessment V11: CyberArk Integration
(Part 2) (Aug 27, 2019)

2018

• What is new in Guardium 10.1.4 - Simplicity, Capability, and Compliance (January 25, 2018)
• Latest updates in cloud data protection from Guardium (February 27, 2018)
• Guardium Big Data Intelligence for Data Security Insights and Integration Part 1 (March 27, 2018)
• Guardium Big Data Intelligence for Data Security Insights and Integration Part 2 (April 25, 2018)
• What is new in Guardium v10.5 (May 17, 2018)
• Encrypting your Object Data Store without giving away your keys to the CSP (June 28, 2018)
• Your first Guardium app - Using the new Ecosystem technologies (July 25, 2018)
• Get GDPR Compliant with Guardium Analyzer (August 22, 2018)
• Succeeding with Guardium - Part 1 (Sept 26, 2018)
• How are you Protecting your Unstructured Data? (Oct 25, 2018)
• Succeeding with Guardium - Part 2 (Nov 28, 2018)
2017

• Mapping Guardium Insights to Business Risk (January 19, 2017)


• Data Protection for Cloudera Hadoop using IBM Security Guardium - A deep dive (February 8, 2017)
• Data Protection for Hortonworks Hadoop using Guardium - A deep dive (February 23, 2017)
• Expert Panel Discussion - Best Practices for Accelerating Your Path to Guardium Success (April 18,
2017)
• Are you drifting from your monitoring mandate (May 11, 2017)
• Technical Overview of Multi-Cloud Data Encryption (June 22, 2017)
• Making cloudy skies clear again. What can you do with Guardium Data Protection on the cloud?
(July 20, 2017)
• 10.1.3 Overview - Speed compliance and simplify deployments (April 24, 2017)
• 4 Reasons to love the new Guardium Data Encryption (October 3, 2017)
• Hints and tips for a successful V10 upgrade (October 24, 2017)
• Guardium 10.1.3 enhancements for mainframe data protection (November 16, 2017)

2016

• How to maximize efficiency and effectiveness of Guardium data classification (Feb 4, 2016)
• Dynamic data access using fine-grained access control & live demo (Feb 18, 2016)
• DB2 for i data security and compliance - Part 1, Part 2, Part 3 & live demo (March 17, 2016)
• Guarding against insider threats in Hadoop - Part 1 (Intro) Part 2 (deployment), Part 3 (demo)
(April 7, 2016)
• Guardium for DB2 for zOS - Best practices for optimizing data collection (May 26, 2016)
• Smarter way to Data Security - What's new in Guardium 10.1 - Part 1, Part 2, Deployment health
view demo (June 2, 2016)
• Rest easy by automating SAP HANA Vulnerability Assessments using IBM Security Guardium -
Part 1 Part 2 (live demo) (June 21, 2016)
• Managing Whitelists-tips and tricks (July 21, 2016)
• Rolling your own UI in 3 easy steps (August 18, 2016)
• Behind the scenes of the security immune system demo - Guardium integration
architecture (September 22, 2016)
• Hints and Tips for IMS Data Security and Compliance (October 12, 2016)
2015

• Managing Your Linux KTAPs - Part 1, Part 2, Part 3 (January 29, 2015)
• Technical Demonstration of Guardium Data Encryption for DB2 and IMS (Feb 12, 2015)
• Encrypting Data at Rest in IMS using InfoSphere Guardium Data Encryption - Part 1, Part 2 (April 7,
2015)
• PART 2 - Technical Overview of DB2 Encryption on zOS - part 1 Part 2, Part 3 (April 22, 2015)
• Practical tips for managing data security risk with Guardium data security solutions - Part 1, Part 2
(June 25, 2015)
• Guardium integration capabilities: A use-case based discussion and deep dive - Part 1, Part 2, Part
3 (July 30, 2015)
• The best kept secrets of Guardium supportability - Part 1, Part 2 (August 13, 2015)
• Guardium and QRadar – Enhancing insights using bidirectional integration - Part 1, Part 2
(September 8, 2015)
• What's new in Guardium DAM V10- A Technical Overview - Part 1, Part 2, Part 3, Part 4 (September
17, 2015)
• Guardium Activity Monitor for Files Technical Overview Part 2, Part 3 (October 22, 2015)
• What is new for Vulnerability Assessment V10 - Part 1, Part 2, Part 3 (MongoDB demo) (November
5, 2015)
• Hints and tips on upgrading to V10 - Part 1, Part 2, Part 3 (November 19, 2015)
• 4 things to know about the new V10 IBM Guardium for z/OS - Part 1 (Introduction), Part 2 (DB2
z/OS), Part 3 (IMS), Part 4 (Data Sets) (December 3, 2015)

2013-2014

• Deploying Guardium Part 1: Planning the deployment - Part 1.1, Part 1.2, Part 1.3, Part 1.4
• Deploying Guardium Part 2: Monitoring setup and guidelines - Part 2.1, Part 2.2
• Implementing a data security and compliance solution for IBM i - Part 1 (Intro), Part 2 (Architecture),
Part 3 (use cases), Part 4 (Policies and reports)
• How to audit and protect SAP systems with InfoSphere Guardium Data Activity Monitor
• Reporting 101 - Part 1, Part 2
• Advanced Reporting - Part 1 (Timestamps and audit processes), Part 2 (data marts), Part 3
(distributed reports and summary)
• Using Guardium APIs to speed deployment and automate repetitive tasks
• Taking a RESTful look at InfoSphere Guardium APIs
• Tech Talk - Getting Started with InfoSphere Guardium Vulnerability Assessment
• Making the most of InfoSphere Guardium Vulnerability Assessment
• Managing SOX Compliance - People, processes, and technology - Part 1 (Overview), Part 2,
Part 3, Part 4
• Encryption is fundamental- A technical overview of InfoSphere Guardium Data Encryption - Part 1,
Part 2, Part 3

Вам также может понравиться