Welcome to IBM Security Guardium Analyzer!

Similar documents
IBM Security Guardium Analyzer

Access Governance in a Cloudy Environment. Nabeel Nizar VP Worldwide Solutions

IBM services and technology solutions for supporting GDPR program

Oracle Database Security Assessment Tool

Device Discovery for Vulnerability Assessment: Automating the Handoff

McAfee Database Security

Securing Your Cloud Introduction Presentation

Cloud Customer Architecture for Securing Workloads on Cloud Services

Best Practices in Securing a Multicloud World

<Insert Picture Here> Oracle Database Security

Qualys Cloud Platform

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Copyright 2018, Oracle and/or its affiliates. All rights reserved.

Microsoft Security Management

Everything visible. Everything secure.

Citrix Workspace Cloud

IBM Internet Security Systems Proventia Management SiteProtector

Netwrix Auditor. Know Your Data. Protect What Matters. Roy Lopez Solutions Engineer

HiveManager Local Cloud

Total Protection for Compliance: Unified IT Policy Auditing

SIEMLESS THREAT DETECTION FOR AWS

Fabrizio Patriarca. Come creare valore dalla GDPR

Practical Patch Compliance

IPLocks Vulnerability Assessment: A Database Assessment Solution

Document Title: IT Security Assessment Questionnaire

Service Description VMware Workspace ONE

Qualys Cloud Platform

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Chapter 5: Vulnerability Analysis

Service Description VMware Horizon Cloud Service on Microsoft Azure

Using Cohesity with Amazon Web Services (AWS)

VMware Workspace ONE Intelligence. VMware Workspace ONE

Vulnerability Management

Qualys Cloud Suite 2.x

Trustwave Managed Security Testing

Edge Device Manager Quick Start Guide. Version R15

Qualys Cloud Platform

Netwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer

IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ]

Data Protection for Virtualized Environments

ORACLE DEPLOYMENT DECISION GUIDE: COMPARING YOUR DEPLOYMENT OPTIONS

Automated, Real-Time Risk Analysis & Remediation

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

<Insert Picture Here> Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g

CyberPosture Intelligence for Your Hybrid Infrastructure

PATCH MANAGER AUTOMATED PATCHING OF MICROSOFT SERVERS AND 3RD-PARTY APPS

Lab Test Report DR110208B. McAfee Risk Management Solution. February 8, 2011

CAN MICROSOFT HELP MEET THE GDPR

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

Edge Device Manager R15 Release Notes

SYMANTEC DATA CENTER SECURITY

Tenable.io User Guide. Last Revised: November 03, 2017

The Oracle Trust Fabric Securing the Cloud Journey

Vulnerability Management

Additional License Authorizations

What have we been up to? Ephesoft Transact 4.5 Overview New Features and Improvements

November 1, 2018, RP Provision of Managed Security Services on an Annual Contract ADDENDUM #2

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Oracle Database Cloud for Oracle DBAs Ed 3

Additional License Authorizations

The Freedom to Choose

Hackproof Your Cloud: Preventing 2017 Threats for a New Security Paradigm

Dell Client Manager 2.0 FAQ

Continuously Discover and Eliminate Security Risk in Production Apps

ALERT LOGIC LOG MANAGER & LOG REVIEW

Additional License Authorizations. For Cloud Center and Helion Cloud Suite software products

QuickSpecs. HPE Insight Online. Overview. Retired

CHARLES DARWIN, CYBERSECURITY VISIONARY

Le sfide di oggi, l evoluzione e le nuove opportunità: il punto di vista e la strategia IBM per la Sicurezza

Informatica Enterprise Information Catalog

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

What is. Thomas and Lori Duncan

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Progress DataDirect For Business Intelligence And Analytics Vendors

Dell Wyse Management Suite. Version 1.0 Quick Start Guide

Closing the Hybrid Cloud Security Gap with Cavirin

Title: Planning AWS Platform Security Assessment?

SharePoint Online for Administrators

Community Edition Getting Started Guide. July 25, 2018

Microsoft SharePoint Online for Administrators

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight

Modernizing Business Intelligence and Analytics

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

QuickSpecs. Available Packs and Purchase Information. ProLiant Essentials Vulnerability and Patch Management Pack v2.1. Overview.

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

Why the cloud matters?

Oracle Security Products and Their Relationship to EBS. Presented By: Christopher Carriero

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

Backup & Recovery on AWS

Container Deployment and Security Best Practices

Masking Engine User Guide. October, 2017

idiscover RELATIONSHIPS Next find any documented relationships (database level). Ex., foreign keys

Breaking Through the Cloud: A LABORATORY GUIDE TO CLOUD COMPUTING

Data Privacy and Protection GDPR Compliance for Databases

COMPUTE CLOUD SERVICE. Moving to SPARC in the Oracle Cloud

Docker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications

Top 5 NetApp Filer Incidents You Need Visibility Into

The Nasuni Security Model

Transcription:

Welcome to IBM Security Guardium Analyzer! To help you get started with IBM Security Guardium Analyzer, please refer to these frequently asked questions: What is IBM Security Guardium Analyzer? Guardium Analyzer is a software-as-a-service offering that helps users efficiently find regulated data (such as PII, personal and sensitive personal data, and more), understand data and database exposures, assess risk, and act to address issues and minimize risk. How does IBM Security Guardium Analyzer work? The service applies next-generation data classification, as well as vulnerability scanning, to uncover risks associated with such data in cloud-based and on-premises databases. It then applies risk scoring to the classification and scanning results to identify and prioritize the databases that may be most likely to fail an audit, so you can act to minimize your risk. What data sources does Guardium Analyzer scan? Today, Guardium Analyzer supports the following on-premises and cloud databases: IBM db2, Oracle, Microsoft SQL Server, and MySQL. More platforms will be added over time. Are the classification and vulnerability scans different scans, or can these be combined as one scan? If one, can data and vulnerability scans be segregated? The goal of a scan is to create an overall risk assessment that is based on the risks associated with the amount of regulated and/or sensitive data in the environment combined with the vulnerabilities associated with each database within which the regulated and/or sensitive data resides. Because the scan results are used to derive the risk score, the classification results and the vulnerability assessment results are tied together and may not be separated. How do you take care of non-supported DBs? Can custom connections be developed for nonsupported DBs? There is no option to add drivers or connections for unsupported DBs - we will be adding support for more DBs as we go. Customers may try to connect to unsupported databases or databases that have fallen out of support: However, if the connection to such a database is successful, customers will be using those databases at their own risk, the scan results likely will not be accurate because the database may not be getting the latest security patches and updates, and IBM cannot provide support or product updates specific to those databases. For a full list of supported platforms, refer to: the IBM Security Guardium Analyzer Knowledge Center. 1

Can Guardium Analyzer scan data hosted by cloud vendors (such as data in AWS, Azure, etc)? In addition to supporting on-prem databases, Guardium Analyzer can also scan databases that are installed on an Infrastructure-as-a-Service (IaaS) solution (a cloud vm, for example). We also support AWS RDS Oracle. Guardium Analyzer *may* work with other db2, Oracle, SQL Server, or MySQL databases hosted by a cloud provider, but they are not officially supported at this time. For a full list of supported platforms, refer to: the IBM Security Guardium Analyzer Knowledge Center. What do I need to have to use Guardium Analyzer? You need to have access to a Windows-based server to run the downloaded IBM Security Guardium Data Connector, which will connect to your databases and to Guardium Analyzer. You also must have userlevel access to the databases you wish to connect. You can download the connector on MacOS but you need to run the executable on a Windows-based machine or virtual machine. Where can I find documentation for Guardium Analyzer? You can find product documentation and more at the IBM Security Guardium Analyzer Knowledge Center. Is there a free trial for Guardium Analyzer? Yes today, we offer a freemium version of Guardium Analyzer that supports unlimited scans for up to three databases for as long as you want. Please go to the IBM Security Guardium Analyzer Marketplace page to register and get access. Please note: To successfully set up the trial, you need to have: database access privileges to scan the desired database(s) AND access to a Windows machine, to download and run the IBM Security Guardium Data Connector. What languages does the Guardium Analyzer classification engine support? Today, the Guardium Analyzer classification dictionary supports English, French, German, Spanish, Italian, and Japanese. Additional languages will be added over time. What languages is the Guardium Analyzer globalized and translated into (the product itself, the UIs, etc)? Guardium Analyzer went live in English, and it has been globalized and translated for French, Spanish, German, Japanese. Additional languages will be added over time. What technology is the new data classification engine in Guardium Analyzer based on? How is it different than what s been in the market? The new classification engine inside Guardium Analyzer is based on an IBM Research asset called System T. System T has been proven as part of IBM Watson offerings, and now we are embedding it in Guardium Analyzer. Please note that System T does not involve or include machine learning or artificial intelligence. Here s a breakdown of different classification methods available today: Catalog-based search (no customization): Lowest Accuracy Based on searching table column names only 2

Column names often do not match content, so results aren t accurate Example: Sensitive at-risk data identified via metadata search as SSN actually had no SSN info in table. If column names were changed to A and B, if SSN info DID appear inside the table, no results would be found through metadata search Regular Expression: Moderate Accuracy Catalog-based search, or data sampling search, with simple regular expression Better accuracy than metadata search Greater richness in the number of rules and expressions considered Can look for tokens, but does not allow for dictionary lookup System T (inside Guardium Analyzer): Next generation data classification highest accuracy Extracts data from a table, crawls it, applies taxonomy, and supports dictionary lookup Data classification rules and dictionaries can be more expressive Performs rules based matching then applies a checksum algorithm to validate the match, which creates higher accuracy Is IBM Security Guardium Analyzer the same as Guardium Data Protection? No, these offerings are not the same. Guardium Analyzer specifically focuses on finding regulated (PII, PCI, PHI) data in on-premises and Cloud databases (only), assessing vulnerabilities and risks to that data, and providing users with a prioritized list of at-risk DBs and remediation recommendations to take action. It is not a substitute for data activity monitoring, file activity monitoring, or masking, blocking, or alerting data protection capabilities. What core features are part of Guardium Analyzer? Guardium Analyzer is targeted for use by compliance managers, IT managers, and DBAs. The key features delivered as part of Guardium Analyzer include: Connectivity to cloud and on-premises databases Next-generation data classification capabilities Vulnerability scanning Risk scoring Prioritized remediation recommendations Progress dashboard For more details about these capabilities, please visit the Details tab on the IBM Security Guardium Analyzer Marketplace page. 3

How is Guardium Analyzer different from Guardium Vulnerability Assessment? Guardium Analyzer is a SaaS offering that may be installed and ready to perform databases scans in under 15 minutes (depending on network latency and other environmental issues). It is for use by Compliance Managers, IT Managers, and DBAs to understand risk and prioritize a course of action based on the risk result from the databases scanned. Guardium Analyzer is a risk assessment service that helps users understand which databases are most likely to fail an audit. To create this risk assessment, Analyzer uses a risk scoring algorithm, advanced data classification techniques, vulnerability assessment tests, and provides users with remediation recommendations. Analyzer is not a deep, standalone vulnerability assessment product. Today, Guardium Analyzer supports 4 databases, with additional data sources coming in the future. Guardium Vulnerability Assessment is an on-premises offering that focuses heavily on vulnerability assessment. It is for use by Guardium Admins and DBAs and provides a full and complete spectrum of vulnerability assessment tests (including privilege tests and support for CAS, neither of which is supported by Guardium Analyzer), as well as deeper and more advanced functionality around VA (the ability to add exceptions, for example). Guardium Vulnerability Assessment also supports a significantly larger array of data sources. If I am already a Guardium Data Protection customer and have Guardium Vulnerability Assessment entitlements, what added value can I get from Guardium Analyzer? The added value an existing Guardium client can obtain from leveraging Guardium Analyzer is three-fold: 1) Guardium Analyzer can provide an easy to consume picture of data risk when layered on top of Data Protection and Vulnerability Assessment, allowing clients to quickly and continuously assess risks related to the structured data that is being tested, monitored, and protected by Guardium Data Protection and Guardium Vulnerability Assessment 2) Guardium Analyzer s next generation classification capabilities improve classification accuracy beyond what is typically achieved through Guardium Data Protection s classification engine (for structured data) 3) For clients who have purchased Guardium Data Protection but not yet deployed, Guardium Analyzer can serve as a quick way to prioritize deployment of protective measures by highlighting the databases that contain the highest levels of risk What does the IBM Security Guardium Data Connector do? The Data Connector is provided with the Guardium Analyzer service, and it helps clients efficiently connect to their cloud and on-premises databases to uncover regulated data and vulnerabilities related to that data. Clients can connect to multiple databases simultaneously using one Data Connector, and nothing needs to be installed on database servers to do so. As part of the connection and scanning process, encryption techniques are applied to protect the data, and no personal data is uploaded to the cloud. For more details about the Data Connector, watch this short video. 4

How long will it take me to download the Data Connector? It can take a few minutes to download the Data Connector. In some regions of the world, it may take up to 10 minutes to download the Data Connector (depending on internet connectivity and speeds). How do I install the Data Connector, and where does it sit? The connector should be installed on a Windows-based server within your local data center. After it is installed it will be able to connect to your on-premises and cloud databases and to Guardium Analyzer. DO NOT install the Data Connector on the database server(s). Think of it as a secure gateway to the service. Does Guardium Analyzer move any of my regulated data to the cloud? No. Guardium Analyzer does not move any regulated data to the cloud. Guardium Analyzer scans for regulated data and vulnerabilities in your databases, but only the results and insights gains are sent to the cloud-based Guardium Analyzer dashboard. What data is being sent to cloud from the connector? What parameters are sent? Are they sent over a secure channel? All communication is over HTTPS/TLS only. The data returned is only metadata: table name, column name, name of pattern found (e.g. tb_employees.emp_name: "First Name"), and any VA test that failed (ID only). While HTTPS/TLS is the industry standard for most internet communication and is highly secure, even if a hacker is able to decrypt this information, the transmitted data does not provide any value as the hacker cannot use this information to point out the location of the client Database. Also, the VA ID is only understood by the Guardium Analyzer service and cannot be correlated back to the actual CVE ID. How is the data about DBs (metadata) being stored locally on the connector? Is it encrypted if sensitive information is gathered through the scan? The connector stores only the connection data (db type, port/ip user/password) in a local encrypted database. No scan data is saved. How can I add, modify, delete or import my own custom data classification patterns? To change, update, or import new data classification patterns, you must first be subscribed to the Guardium Analyzer Professional Plan. Classification customization is not supported for Standard Plan subscribers. For those with the Professional Plan, you can add either a regex or a dictionary based custom pattern to your classification by going to settings -> manage patterns 5

What is the ideal set up recommendation for the best Guardium Analyzer trial experience? We recommend using Google Chrome for accessing Guardium Analyzer. As mentioned above, users also must have access to a Windows machine to download and run the Data Connector, as well as user entitlement to connect to and scan their databases. What is the ideal configuration for the Data Connector? What kind of performance should I expect? Do not install the Data Connector on database servers. We recommend a windows server with at least 8GB of RAM and 4 cores to run the Guardium Data Connector. On a single windows server, you should only have 1 connector installed. You may have multiple data connectors installed throughout your environment, but each needs to be on its own windows server. When you set your scan window, schedule scans for off-peak hours. While the scans are running, analyzer will use most of the available CPUs. Scan times will depend upon the number of tables in the database(s) that you connect (and number of columns within those tables), as well as the latency and network speed between the connector and the database(s). Please allow for a large enough scan window to allow database scanning to complete. As an example, in our lab environment, it took 7 hours to scan a database with 500,000 tables. For a database with a few hundred columns to scan across all tables and on a local LAN, the scan time is typically less than 10 minutes. Are there any deployment configuration recommendations, recommended not-to-exceed database sizes, or other specifics that can help me maximize performance? Allow enough time for the scan windows you are setting up, so that the connector can scan all connected databases. We recommend you determine the average scan time for your databases first, before deciding how many databases to connect, and then factor in an appropriate scan window; it is best to establish a baseline by scanning a sample database, and then using that scan time to derive what expected time would be for larger databases. Note that poorly optimized database tables will contribute to longer scan times. How many DBs can be connected to one connector? At what point do you recommend installing another connector? We recommend connecting no more than 100 DBs to a single Data Connector. You should install additional connectors after that point. If you know that the databases you are connecting to the Data Connector are filled with very dense tables, we would recommend connecting fewer than 100 databases per Data Connector, for performance purposes. 6

How is Guardium Analyzer priced and sold? For pricing and packaging information, please visit the IBM Security Guardium Analyzer Marketplace page and click on the Purchase tab. As of October 2018, clients also have the option of purchasing Guardium Analyzer directly from the Marketplace page. 7