Deployment Guide for InfoSphere Guardium Deployment Guide for InfoSphere Guardium

Deployment Guide for InfoSphere Guardium

Publisher Description

IBM® InfoSphere® Guardium® provides the simplest, most robust solution for data security and data privacy by assuring the integrity of trusted information in your data center. InfoSphere Guardium helps you reduce support costs by automating the entire compliance auditing process across heterogeneous environments. InfoSphere Guardium offers a flexible and scalable solution to support varying customer architecture requirements.

This IBM Redbooks® publication provides a guide for deploying the Guardium solutions.

This book also provides a roadmap process for implementing an InfoSphere Guardium solution that is based on years of experience and best practices that were collected from various Guardium experts. We describe planning, installation, configuration, monitoring, and administrating an InfoSphere Guardium environment. We also describe use cases and how InfoSphere Guardium integrates with other IBM products.

The guidance can help you successfully deploy and manage an IBM InfoSphere Guardium system.

This book is intended for the system administrators and support staff who are responsible for deploying or supporting an InfoSphere Guardium environment.

GENRE
Computing & Internet
RELEASED
2015
14 April
LANGUAGE
EN
English
LENGTH
472
Pages
PUBLISHER
IBM Redbooks
SIZE
14.2
MB

More Books by IBM Redbooks

IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
IBM SmartCloud: Becoming a Cloud Service Provider IBM SmartCloud: Becoming a Cloud Service Provider
2012
IBM and Cisco: Together for a World Class Data Center IBM and Cisco: Together for a World Class Data Center
2013
IBM Tivoli Storage Manager as a Data Protection Solution IBM Tivoli Storage Manager as a Data Protection Solution
2014
IBM SmartCloud: Building a Cloud Enabled Data Center IBM SmartCloud: Building a Cloud Enabled Data Center
2013
Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection
2014