SlideShare a Scribd company logo
© 2014 IBM Corporation 
October 2014 
Big Data – Big Risk 
How do you protect your sensitive data? 
David Valovcin 
dvalovcin@us.ibm.com
A New Era of Smart 
The Big Data opportunity comes with big security risks 
What is big data? 
Requirement: 
 All kinds of data 
 Large volumes 
 Valuable insight, but difficult to extract 
 Often extremely time sensitive 
Extracting insight from an immense volume, variety and 
velocity of data, in a timely and cost-effective manner. 
• What kind of information is stored in big data? 
• Who’s watching big data access? 
• How do you ensure compliance? 
• Security is the key to enabling enterprise rollouts of big data 
• If it’s not secure, it can be breached. 
2 © 2014 IBM Corporation
A New Era of Smart 
Data breaches are in the news every week 
A “Fear Factor” is causing some orgs to hold back on new mobile, cloud, and big data initiatives 
Data-breach costs take 
toll on Target profit 
… its profit in the fourth quarter fell 46 
percent on a revenue decline of 5.3 
percent as the breach scared off 
customers worried about 
the security of their private 
data. 
Canadian Breach: 
Sorting Out the 
Cause 
Gaps in carrying out 
security policies led 
Account 
to the exposure of 
Takeover: 
583,000 records 
Bank Faces 
last year at 
Two Suits 
Employment and 
Social Development 
totaling $1.5 million 
Canada, Health Breach Tally: 
30 Million Victims 
More than 30.6 million 
individuals have been affected 
by major healthcare data breaches 
since September 2009 
in allegedly 
fraudulent wires 
3 © 2014 IBM Corporation
A New Era of Smart 
Risks are increasing . . . 
4 © 2014 IBM Corporation
A New Era of Smart 
5 © 2014 IBM Corporation
A New Era of Smart 
6 © 2014 IBM Corporation
A New Era of Smart 
Time span of events by percent of breaches 
http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf?CMP=DMC-SMB_Z_ZZ_ZZ_Z_TV_N_Z038 
7 © 2014 IBM Corporation 
7 
Minutes to compromise, months to discover & remediate 
Time span of events by percent of breaches
A New Era of Smart 
Compliance – many regulations both internal & external 
8 
© 2014 IBM Corporation 
8
A New Era of Smart 
Key drivers for data security can be compliance 
HIPAA 
Health Insurance Portability and Accountability Act. 
The Privacy Rule and Security Rule specifies 
protections of sensitive patient information. 
PCI-DSS 
Payment Care Industry Data Security Standard. 
Technical and operational requirements to protect 
cardholder data. 
SOX 
Sarbanes-Oxley Act. Response to financial 
fraud, most concerned with financial data 
integrity and transparency. 
9 
© 2014 IBM Corporation
A New Era of Smart 
10 © 2014 IBM Corporation
A New Era of Smart 
Key questions to ask . . . 
Discovery 
Classification 
Dormant Data 
Security 
Policies 
Dormant 
Entitlements 
Discover Harden Assess Monitor Report 
Where is the 
sensitive data? 
Alerting 
Outliers 
How to prevent 
unauthorized 
activities? 
Identity & Access 
Masking/ 
Assessment Encryption 
How to protect 
sensitive data 
to reduce risk? 
How to secure 
the repository? 
Management 
Activity 
Monitoring 
Who should 
have access? 
What is actually 
happening? 
Compliance Reporting 
& 
Security Alerts 
Data Protection 
& 
Enforcement 
11 © 2014 IBM Corporation
A New Era of Smart 
Security and compliance concerns in Big Data environments 
Structured 
Unstructured 
Streaming 
Big Data Platform 
• Who is running big data requests? 
• What is being accessed? 
• Is there an exceptional number of file 
permission exceptions? 
• Are these jobs part of an authorized 
program list accessing the data? 
• Has some new query application 
been developed that you were 
previously unaware existed (extracting 
sensitive data)? 
Hadoop Cluster 
Clients 
12 © 2014 IBM Corporation
A New Era of Smart 
InfoSphere Data Privacy for Hadoop 
Define and share big data project blueprints, data definitions 
Discover and classify sensitive big data 
Mask and redact sensitive data within and for Hadoop systems 
Monitor Hadoop Data Activity 
Big Data Repositories Analytics 
Information 
Ingestion 
and 
Integration 
Real-time 
Analytics 
Data 
Exploration 
Archive 
Data 
Exploration 
Enterprise 
Warehouse 
Data Marts 
Information Governance, Security and Business 
Continuity 
Sources 
Structured 
Unstructured 
Streaming 
Cognitive 
Learn Dynamically? 
Prescriptive 
Best Outcomes? 
Predictive 
What Could Happen? 
Descriptive 
What Has Happened? 
Exploration and 
Discovery 
What Do You Have? 
InfoSphere 
BigInsights 
13 © 2014 IBM Corporation
A New Era of Smart 
Real-time data activity monitoring for security & compliance 
 Continuous, policy-based, real-time 
monitoring of all data traffic activities 
 Database infrastructure scanning for 
vulnerabilities and mis-configured privileges 
 Data protection compliance automation 
Data nodes 
(databases, warehouses, file 
shares, Big Data) 
Host-based 
probes (S-TAPs) 
Key Characteristics 
 Non-invasive/disruptive, cross-platform architecture 
 Minimal performance impact 
 Prepackaged vulnerability knowledge base and compliance reports 
 Detect or block unauthorized & suspicious activity 
 Granular, real-time policies – who, what when & how 
 Dynamically scalable 
 100% visibility into data transactions 
Collector 
Appliance 
14 © 2014 IBM Corporation
A New Era of Smart 
Extend real-time data activity monitoring across Big Data environments 
InfoSphere 
BigInsights 
DATABASES 
D ATAB AS E Exadata 
FTP 
HANA 
Optim 
Archival 
Siebel, 
PeopleSoft, 
E-Business 
Master Data 
Management 
Data 
Stage 
CICS 
InfoSphere Guardium 
15 © 2014 IBM Corporation
A New Era of Smart 
IBM InfoSphere Guardium 
Open  
Task Launcher View 
Find, view, and filter information about monitored objects, systems, and users. Learn More 
  Audit Trail Summary  HR/PROD/Europe  View  More  
 Filters 
 Tasks 
Apply 
Where 
Group: HR/Prod/Europe  
Server: 15  
Database: 189  
Object: Select object  
Outliers tab shows the 
summary over time 
What 
Policy: PCI  
Rule: Select rule  
Error: Select type  
SQL: Select type  
Who 
User ID: Select user id  
Group: Select group  
Role: Select role  
Grantor: Select grantor  
When 
History: 3 Hours  
Start: Select date / time  
End: Select date / time  
Summary Details Outliers Errors Alerts Violations Report 
16 
© 2014 IBM Corporation
A New Era of Smart 
Report: Identify unauthorized jobs 
Unauthorized 
program! 
Predefined and 
customizable reports 
17 
© 2014 IBM Corporation
A New Era of Smart 
Guardium integrates with IT Infrastructure for seamless operations 
Directory Services 
(Active Directory, LDAP, TDS, etc) 
SIEM 
(IBM QRadar, Arcsight, RSA 
Envision, etc) SNMP Dashboards 
(Tivoli Netcool, HP Openview, etc) 
Change Ticketing 
Systems 
(Tivoli Request Mgr, Remedy, 
Peregrine, etc) 
Vulnerability 
Standards 
(CVE, STIG, CIS Benchmark, 
SCAP) 
Authentication 
(RSA SecurID, Radius, Kerberos, 
LDAP) 
Data Classification 
and Leak Protection 
(Credit Card, Social Security, phone, 
custom, etc) 
Security Management 
Platforms 
(IBM QRadar, McAfee ePO ) 
Application Servers 
(IBM Websphere, IBM Cognos, Oracle 
EBS, SAP, Siebel, Peoplesoft, etc ) 
Web Application 
Firewalls 
(F5 ASM) 
Long Term Storage 
(IBM TSM, IBM Nettezza, EMC Centera, 
FTP, SCP, Optim Archive etc) 
Send Alerts 
(CEF, CSV, 
Syslog, etc) Send 
Events 
• STAP 
Software Deployment 
(IBM Tivoli Provisioning Manager, RPM, 
Native Distributions) 
18 © 2014 IBM Corporation
A New Era of Smart 
19 
19 © 2014 IBM Corporation
A New Era of Smart 
Learn more about protecting Big Data and removing risk 
Schedule a Client Value Engagement (CVE) at no cost to you 
• Business and IT: Narrow the communication gap 
• Easy to follow programmatic client-centric approach – determine possible benefits 
from solution 
• Fast time to completion: Less than a weeks– deliverables easy to follow and 
understand 
Visit a lab for a deeper dive with our Product Managers and R&D teams 
• In-depth technical discussions & product demonstrations 
• Product roadmap discussions; get the latest on innovations and research 
• Collaborate with our best experts on your problems and potential solutions 
Visit the web for more about InfoSphere solutions 
• Understanding and selecting data masking solutions 
• Understanding encryption requirements of PCI DSS 
• Managing compliance to protect enterprise data 
• Top tips for security big data environments 
• Three guiding principals to improve data security 
You Tube: InfoSphere Guardium 
@IBM_Guardium 
20 © 2014 IBM Corporation
© 2014 IBM Corporation 
Thank You 
David Valovcin 
dvalovcin@us.ibm.com

More Related Content

PPTX
Using hadoop for enterprise data management
PDF
Enabling Big Data with IBM InfoSphere Optim
PPT
Value proposition for big data isv partners 0714
PDF
Archive First: An Intelligent Data Archival Strategy, Part 1 of 3
PPTX
Hadoop: Making it work for the Business Unit
PPT
Making the Case for Hadoop in a Large Enterprise-British Airways
PPTX
Increase your ROI with Hadoop in Six Months - Presented by Dell, Cloudera and...
PPTX
Harnessing the Power of Big Data at Freddie Mac
Using hadoop for enterprise data management
Enabling Big Data with IBM InfoSphere Optim
Value proposition for big data isv partners 0714
Archive First: An Intelligent Data Archival Strategy, Part 1 of 3
Hadoop: Making it work for the Business Unit
Making the Case for Hadoop in a Large Enterprise-British Airways
Increase your ROI with Hadoop in Six Months - Presented by Dell, Cloudera and...
Harnessing the Power of Big Data at Freddie Mac

What's hot (20)

PDF
Overview - IBM Big Data Platform
PPTX
Perspectives on Ethical Big Data Governance
PPTX
Keynote: The Journey to Pervasive Analytics
PPTX
The 5 Biggest Data Myths in Telco: Exposed
PPTX
How Cloudera SDX can aid GDPR compliance 6.21.18
PDF
Seagate: Sensor Overload! Taming The Raging Manufacturing Big Data Torrent
PDF
Storing Archive Data to meet Compliance Challenges
PPTX
Hadoop and Manufacturing
PDF
Hortonworks Hybrid Cloud - Putting you back in control of your data
PDF
How to create a successful data archiving strategy for your Salesforce Org.
PDF
GE’s Industrial Data Lake Platform
PPTX
Data Governance, Compliance and Security in Hadoop with Cloudera
PPTX
Open Source in the Energy Industry - Creating a New Operational Model for Dat...
PPTX
The 5 Keys to a Killer Data Lake
PPTX
Delivering improved patient outcomes through advanced analytics 6.26.18
PPTX
Big Data Solutions Executive Overview
PPTX
IBM Industry Models and Data Lake
PDF
Data Lakes - The Key to a Scalable Data Architecture
PDF
Making Big Data Analytics with Hadoop fast & easy (webinar slides)
PPTX
Who changed my data? Need for data governance and provenance in a streaming w...
Overview - IBM Big Data Platform
Perspectives on Ethical Big Data Governance
Keynote: The Journey to Pervasive Analytics
The 5 Biggest Data Myths in Telco: Exposed
How Cloudera SDX can aid GDPR compliance 6.21.18
Seagate: Sensor Overload! Taming The Raging Manufacturing Big Data Torrent
Storing Archive Data to meet Compliance Challenges
Hadoop and Manufacturing
Hortonworks Hybrid Cloud - Putting you back in control of your data
How to create a successful data archiving strategy for your Salesforce Org.
GE’s Industrial Data Lake Platform
Data Governance, Compliance and Security in Hadoop with Cloudera
Open Source in the Energy Industry - Creating a New Operational Model for Dat...
The 5 Keys to a Killer Data Lake
Delivering improved patient outcomes through advanced analytics 6.26.18
Big Data Solutions Executive Overview
IBM Industry Models and Data Lake
Data Lakes - The Key to a Scalable Data Architecture
Making Big Data Analytics with Hadoop fast & easy (webinar slides)
Who changed my data? Need for data governance and provenance in a streaming w...
Ad

Viewers also liked (6)

PDF
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
PDF
Data security in a big data environment sweden
PDF
Protect the data - Cyber security - Breaches - Brand/Reputation
PPTX
Graphics for big data reference architecture blog
PDF
Delivering Apache Hadoop for the Modern Data Architecture
PDF
Data analysis using spss
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
Data security in a big data environment sweden
Protect the data - Cyber security - Breaches - Brand/Reputation
Graphics for big data reference architecture blog
Delivering Apache Hadoop for the Modern Data Architecture
Data analysis using spss
Ad

Similar to David valovcin big data - big risk (20)

PDF
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
PDF
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
PDF
Bridging the Gap Between Your Security Defenses and Critical Data
PPTX
Smarter cyber security v8
PPT
Data security in the cloud
PDF
Ibm big data-platform
PDF
Security and Audit for Big Data
PPTX
Proven Practices to Protect Critical Data - DarkReading VTS Deck
PPTX
ISSA Atlanta - Emerging application and data protection for multi cloud
PPT
Robert Lecklin - BigData is making a difference
PDF
Bridging the Data Security Gap
PPTX
Secure Systems of Engagement
PDF
Why You Need to Govern Big Data
PDF
Big Data LDN 2017: Applied AI for GDPR
PDF
Guardium Data Activiy Monitor For C- Level Executives
PPTX
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
PPTX
Innovation Without Compromise: The Challenges of Securing Big Data
PPTX
MYTHBUSTERS: Can You Secure Payments in the Cloud?
PPTX
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
PDF
Dataguise hortonworks insurance_feb25
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Bridging the Gap Between Your Security Defenses and Critical Data
Smarter cyber security v8
Data security in the cloud
Ibm big data-platform
Security and Audit for Big Data
Proven Practices to Protect Critical Data - DarkReading VTS Deck
ISSA Atlanta - Emerging application and data protection for multi cloud
Robert Lecklin - BigData is making a difference
Bridging the Data Security Gap
Secure Systems of Engagement
Why You Need to Govern Big Data
Big Data LDN 2017: Applied AI for GDPR
Guardium Data Activiy Monitor For C- Level Executives
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
Innovation Without Compromise: The Challenges of Securing Big Data
MYTHBUSTERS: Can You Secure Payments in the Cloud?
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Dataguise hortonworks insurance_feb25

More from IBM Sverige (20)

PDF
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
PDF
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
PDF
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

PDF
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
PDF
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
PDF
Multiresursplanering - Karolinska Universitetssjukhuset
PPTX
Solving Challenges With 'Huge Data'
PPTX
Blockchain explored
PPTX
Blockchain architected
PPTX
Blockchain explained
PDF
Grow smarter project kista watson summit 2018_tommy auoja-1
PDF
Bemanningsplanering axfood och houston final
PDF
Power ai nordics dcm
PDF
Nvidia and ibm presentation feb18
PDF
Hwx introduction to_ibm_ai
PPTX
Ac922 watson 180208 v1
PDF
Watson kista summit 2018 box
PDF
Watson kista summit 2018 en bättre arbetsdag för de många människorna
PDF
Iwcs and cisco watson kista summit 2018 v2
PDF
Ibm intro (watson summit) bkacke
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
Multiresursplanering - Karolinska Universitetssjukhuset
Solving Challenges With 'Huge Data'
Blockchain explored
Blockchain architected
Blockchain explained
Grow smarter project kista watson summit 2018_tommy auoja-1
Bemanningsplanering axfood och houston final
Power ai nordics dcm
Nvidia and ibm presentation feb18
Hwx introduction to_ibm_ai
Ac922 watson 180208 v1
Watson kista summit 2018 box
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Iwcs and cisco watson kista summit 2018 v2
Ibm intro (watson summit) bkacke

Recently uploaded (20)

PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPTX
1_Introduction to advance data techniques.pptx
PDF
Clinical guidelines as a resource for EBP(1).pdf
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PPT
Reliability_Chapter_ presentation 1221.5784
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PDF
Foundation of Data Science unit number two notes
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PPTX
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
PDF
Mega Projects Data Mega Projects Data
PPTX
Business Acumen Training GuidePresentation.pptx
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPT
Miokarditis (Inflamasi pada Otot Jantung)
PPTX
Moving the Public Sector (Government) to a Digital Adoption
PDF
Lecture1 pattern recognition............
PDF
Launch Your Data Science Career in Kochi – 2025
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
1_Introduction to advance data techniques.pptx
Clinical guidelines as a resource for EBP(1).pdf
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
Reliability_Chapter_ presentation 1221.5784
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
Foundation of Data Science unit number two notes
STUDY DESIGN details- Lt Col Maksud (21).pptx
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
Mega Projects Data Mega Projects Data
Business Acumen Training GuidePresentation.pptx
IBA_Chapter_11_Slides_Final_Accessible.pptx
Acceptance and paychological effects of mandatory extra coach I classes.pptx
Miokarditis (Inflamasi pada Otot Jantung)
Moving the Public Sector (Government) to a Digital Adoption
Lecture1 pattern recognition............
Launch Your Data Science Career in Kochi – 2025

David valovcin big data - big risk

  • 1. © 2014 IBM Corporation October 2014 Big Data – Big Risk How do you protect your sensitive data? David Valovcin dvalovcin@us.ibm.com
  • 2. A New Era of Smart The Big Data opportunity comes with big security risks What is big data? Requirement:  All kinds of data  Large volumes  Valuable insight, but difficult to extract  Often extremely time sensitive Extracting insight from an immense volume, variety and velocity of data, in a timely and cost-effective manner. • What kind of information is stored in big data? • Who’s watching big data access? • How do you ensure compliance? • Security is the key to enabling enterprise rollouts of big data • If it’s not secure, it can be breached. 2 © 2014 IBM Corporation
  • 3. A New Era of Smart Data breaches are in the news every week A “Fear Factor” is causing some orgs to hold back on new mobile, cloud, and big data initiatives Data-breach costs take toll on Target profit … its profit in the fourth quarter fell 46 percent on a revenue decline of 5.3 percent as the breach scared off customers worried about the security of their private data. Canadian Breach: Sorting Out the Cause Gaps in carrying out security policies led Account to the exposure of Takeover: 583,000 records Bank Faces last year at Two Suits Employment and Social Development totaling $1.5 million Canada, Health Breach Tally: 30 Million Victims More than 30.6 million individuals have been affected by major healthcare data breaches since September 2009 in allegedly fraudulent wires 3 © 2014 IBM Corporation
  • 4. A New Era of Smart Risks are increasing . . . 4 © 2014 IBM Corporation
  • 5. A New Era of Smart 5 © 2014 IBM Corporation
  • 6. A New Era of Smart 6 © 2014 IBM Corporation
  • 7. A New Era of Smart Time span of events by percent of breaches http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf?CMP=DMC-SMB_Z_ZZ_ZZ_Z_TV_N_Z038 7 © 2014 IBM Corporation 7 Minutes to compromise, months to discover & remediate Time span of events by percent of breaches
  • 8. A New Era of Smart Compliance – many regulations both internal & external 8 © 2014 IBM Corporation 8
  • 9. A New Era of Smart Key drivers for data security can be compliance HIPAA Health Insurance Portability and Accountability Act. The Privacy Rule and Security Rule specifies protections of sensitive patient information. PCI-DSS Payment Care Industry Data Security Standard. Technical and operational requirements to protect cardholder data. SOX Sarbanes-Oxley Act. Response to financial fraud, most concerned with financial data integrity and transparency. 9 © 2014 IBM Corporation
  • 10. A New Era of Smart 10 © 2014 IBM Corporation
  • 11. A New Era of Smart Key questions to ask . . . Discovery Classification Dormant Data Security Policies Dormant Entitlements Discover Harden Assess Monitor Report Where is the sensitive data? Alerting Outliers How to prevent unauthorized activities? Identity & Access Masking/ Assessment Encryption How to protect sensitive data to reduce risk? How to secure the repository? Management Activity Monitoring Who should have access? What is actually happening? Compliance Reporting & Security Alerts Data Protection & Enforcement 11 © 2014 IBM Corporation
  • 12. A New Era of Smart Security and compliance concerns in Big Data environments Structured Unstructured Streaming Big Data Platform • Who is running big data requests? • What is being accessed? • Is there an exceptional number of file permission exceptions? • Are these jobs part of an authorized program list accessing the data? • Has some new query application been developed that you were previously unaware existed (extracting sensitive data)? Hadoop Cluster Clients 12 © 2014 IBM Corporation
  • 13. A New Era of Smart InfoSphere Data Privacy for Hadoop Define and share big data project blueprints, data definitions Discover and classify sensitive big data Mask and redact sensitive data within and for Hadoop systems Monitor Hadoop Data Activity Big Data Repositories Analytics Information Ingestion and Integration Real-time Analytics Data Exploration Archive Data Exploration Enterprise Warehouse Data Marts Information Governance, Security and Business Continuity Sources Structured Unstructured Streaming Cognitive Learn Dynamically? Prescriptive Best Outcomes? Predictive What Could Happen? Descriptive What Has Happened? Exploration and Discovery What Do You Have? InfoSphere BigInsights 13 © 2014 IBM Corporation
  • 14. A New Era of Smart Real-time data activity monitoring for security & compliance  Continuous, policy-based, real-time monitoring of all data traffic activities  Database infrastructure scanning for vulnerabilities and mis-configured privileges  Data protection compliance automation Data nodes (databases, warehouses, file shares, Big Data) Host-based probes (S-TAPs) Key Characteristics  Non-invasive/disruptive, cross-platform architecture  Minimal performance impact  Prepackaged vulnerability knowledge base and compliance reports  Detect or block unauthorized & suspicious activity  Granular, real-time policies – who, what when & how  Dynamically scalable  100% visibility into data transactions Collector Appliance 14 © 2014 IBM Corporation
  • 15. A New Era of Smart Extend real-time data activity monitoring across Big Data environments InfoSphere BigInsights DATABASES D ATAB AS E Exadata FTP HANA Optim Archival Siebel, PeopleSoft, E-Business Master Data Management Data Stage CICS InfoSphere Guardium 15 © 2014 IBM Corporation
  • 16. A New Era of Smart IBM InfoSphere Guardium Open  Task Launcher View Find, view, and filter information about monitored objects, systems, and users. Learn More   Audit Trail Summary  HR/PROD/Europe  View  More   Filters  Tasks Apply Where Group: HR/Prod/Europe  Server: 15  Database: 189  Object: Select object  Outliers tab shows the summary over time What Policy: PCI  Rule: Select rule  Error: Select type  SQL: Select type  Who User ID: Select user id  Group: Select group  Role: Select role  Grantor: Select grantor  When History: 3 Hours  Start: Select date / time  End: Select date / time  Summary Details Outliers Errors Alerts Violations Report 16 © 2014 IBM Corporation
  • 17. A New Era of Smart Report: Identify unauthorized jobs Unauthorized program! Predefined and customizable reports 17 © 2014 IBM Corporation
  • 18. A New Era of Smart Guardium integrates with IT Infrastructure for seamless operations Directory Services (Active Directory, LDAP, TDS, etc) SIEM (IBM QRadar, Arcsight, RSA Envision, etc) SNMP Dashboards (Tivoli Netcool, HP Openview, etc) Change Ticketing Systems (Tivoli Request Mgr, Remedy, Peregrine, etc) Vulnerability Standards (CVE, STIG, CIS Benchmark, SCAP) Authentication (RSA SecurID, Radius, Kerberos, LDAP) Data Classification and Leak Protection (Credit Card, Social Security, phone, custom, etc) Security Management Platforms (IBM QRadar, McAfee ePO ) Application Servers (IBM Websphere, IBM Cognos, Oracle EBS, SAP, Siebel, Peoplesoft, etc ) Web Application Firewalls (F5 ASM) Long Term Storage (IBM TSM, IBM Nettezza, EMC Centera, FTP, SCP, Optim Archive etc) Send Alerts (CEF, CSV, Syslog, etc) Send Events • STAP Software Deployment (IBM Tivoli Provisioning Manager, RPM, Native Distributions) 18 © 2014 IBM Corporation
  • 19. A New Era of Smart 19 19 © 2014 IBM Corporation
  • 20. A New Era of Smart Learn more about protecting Big Data and removing risk Schedule a Client Value Engagement (CVE) at no cost to you • Business and IT: Narrow the communication gap • Easy to follow programmatic client-centric approach – determine possible benefits from solution • Fast time to completion: Less than a weeks– deliverables easy to follow and understand Visit a lab for a deeper dive with our Product Managers and R&D teams • In-depth technical discussions & product demonstrations • Product roadmap discussions; get the latest on innovations and research • Collaborate with our best experts on your problems and potential solutions Visit the web for more about InfoSphere solutions • Understanding and selecting data masking solutions • Understanding encryption requirements of PCI DSS • Managing compliance to protect enterprise data • Top tips for security big data environments • Three guiding principals to improve data security You Tube: InfoSphere Guardium @IBM_Guardium 20 © 2014 IBM Corporation
  • 21. © 2014 IBM Corporation Thank You David Valovcin dvalovcin@us.ibm.com