SlideShare a Scribd company logo
IBM GUARDIUM
WHEN NETWORK
SECURITY IS NOT
ENOUGH
Artjoms Krumins, ALSO Solution expert and Advisor
ChristianLousLange
Technology is a useful servant
but a dangerous master.
We are not alone
8% to 31%
ITfunctionsareoutcourced
5760
NewSocialMediaUsersPerDay
DSS ITSCEC| YEAR 2018
Small Companies
Big Problems
DSS ITSCEC| YEAR 2018
WRONG CONTROL OF DATA IS COSTLY
Violation of Principle of
Data Minimization
Violation fo Principle if
Integrity and
Confidentiality
Inability to ensure
Confidentiality and
Integrity
100000€150000€150000€
DSS ITSCEC| YEAR 2018
Control and audit
the closer you get to data more control
needed
Thedefendantacteddeliberately,knowingthatitwasobligedto
applythetechnicalandorganizationalmeasuresnecessaryfor
theidentificationandauthenticationofusers,aswellasfor
themanagementanddelimitationoftheiraccessto
informationprofiles,stratifyingthemaccordingtothe
differentprivilegesofaccesscorrespondingtotheprofessional
categoriesofitsworkersandalsototheguaranteeofthe
securityoftheinformation,besidescompetingtohavea
systemofreliableauditofsuchidentifications,accesses
andguaranteesofsecurity",
itreferstothedeterminationoftheCNPD.
DSS ITSCEC| YEAR 2018
GDPRandHighleveldataclassification:
StructuredandUnstructured
Whichtablesholdpersonalandsensitivepersonaldata?
Whoaccessthatdata?
Howmuchandwhentheyaccessdata?
Howtoprotectthatdata?
WhocontrolsYourprivilegedusers(administrators)whoaccessYourdata?
When network security is not enough
When network security is not enough
Colector:Centralmanagementunit-createpoliciesandactions,rundatadiscoveryprocesesindatabases-monitor
databases
GuardiumAGENT:Isalightweightsoftwareagent,monitorsdatabasetrafficandforwardsinformationaboutthattrafficto
aGuardiumsystem,Preventsorblockingprivilegedusersfromaccessingsensitiveinformation
3keycapabilitiesforDatabaseSecurity
When network security is not enough
IBMSecurityGuardiumtoolshelpstoanalyzeanddescribethenatureofthe
personaldatabreach,includingthenumberandcategoriesofdatasubjects
andpersonaldatarecordsaffected.
(GDPRArticle33(1)).
ALSO IBM
Excellence
center
EXCELLENCEISNOTASKILL,IT'SANATTITUDE.
TRY,TESTANDCONSULTONLEADINGIBM
TECHNOLOGIESWITHALSOEXCELLENCE
CENTEREXPERTS.
EXCELLENCEISNOTANACT,BUTAHABIT.
MEETUSTODAY
When network security is not enough
IBM GUARDIUM
DEMONSTRATION
Martins Zeipe, DPO, ALSO Excellence Center security
expert

More Related Content

PDF
A Focus on Data, Best's Review, September 2018
PPTX
Cybersecurity Service Provider
PDF
MCGlobalTech Capability Statement
PPTX
Wilson Consulting Group
PPTX
Wilson Consulting Group: A Cybersecurity Company
PPTX
Find the best cyebersecurity services
PPTX
Windstream Cloud Security Presentation
PPTX
Global Forum on Digital Security for Prosperity December 2018 event photo book
A Focus on Data, Best's Review, September 2018
Cybersecurity Service Provider
MCGlobalTech Capability Statement
Wilson Consulting Group
Wilson Consulting Group: A Cybersecurity Company
Find the best cyebersecurity services
Windstream Cloud Security Presentation
Global Forum on Digital Security for Prosperity December 2018 event photo book

Similar to When network security is not enough (20)

PDF
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
PDF
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
PPTX
How Vulnerable is Your Critical Data?
PDF
Avoiding the Data Compliance "Hot Seat"
PDF
Guardium Data Activiy Monitor For C- Level Executives
PDF
Data security in a big data environment sweden
PPT
Data security in the cloud
PDF
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
PDF
Ibm security guardium
PDF
Whitepaper IBM Guardium Data Activity Monitor
PDF
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
PDF
Bridging the Data Security Gap
PDF
Bridging the Gap Between Your Security Defenses and Critical Data
PDF
Identity Governance: Not Just For Compliance
PPTX
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
PPTX
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
PPTX
CrossIdeas Roadshow IBM IAM Governance Andrea Rossi
PDF
Security and Audit for Big Data
PDF
IBM Security - 2015 - Client References Guide
PDF
Scot Secure 2019 Edinburgh (Day 2)
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
How Vulnerable is Your Critical Data?
Avoiding the Data Compliance "Hot Seat"
Guardium Data Activiy Monitor For C- Level Executives
Data security in a big data environment sweden
Data security in the cloud
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
Ibm security guardium
Whitepaper IBM Guardium Data Activity Monitor
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
Bridging the Data Security Gap
Bridging the Gap Between Your Security Defenses and Critical Data
Identity Governance: Not Just For Compliance
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
CrossIdeas Roadshow IBM IAM Governance Andrea Rossi
Security and Audit for Big Data
IBM Security - 2015 - Client References Guide
Scot Secure 2019 Edinburgh (Day 2)
Ad

More from DATA SECURITY SOLUTIONS (20)

PPTX
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
PPTX
MLM or how to look at company users with new eyes
PPTX
The artificial reality of cyber defense
PPTX
How to maintain business equality secured in network and cloud
ODP
Forensic tool development with rust
PPTX
IBM Q-radar security intelligence roadmap
PPTX
Transform your enterprise branch with secure sd-wan
PPTX
How to discover vulnerabilities in business and mission critical systems
PPT
Protecting web aplications with machine learning and security fabric
PPTX
Patching: answers to questions you probably were afraid to ask about oracle s...
PPTX
Practical approach to NIS Directive's incident management
PPTX
New security solutions for next generation of IT
PPT
Botprobe - Reducing network threat intelligence big data
PDF
Network is the Firewall
PDF
Let's hack your mobile device. Yes we can. And many other do.
PDF
Secure enterprise mobility
PDF
North European Cybersecurity Cluster - an example of the regional trust platf...
PDF
IoT Technologies for Context-Aware Security
PDF
Cyber crime as a startup
PDF
Services evolution in cybercrime economics
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
MLM or how to look at company users with new eyes
The artificial reality of cyber defense
How to maintain business equality secured in network and cloud
Forensic tool development with rust
IBM Q-radar security intelligence roadmap
Transform your enterprise branch with secure sd-wan
How to discover vulnerabilities in business and mission critical systems
Protecting web aplications with machine learning and security fabric
Patching: answers to questions you probably were afraid to ask about oracle s...
Practical approach to NIS Directive's incident management
New security solutions for next generation of IT
Botprobe - Reducing network threat intelligence big data
Network is the Firewall
Let's hack your mobile device. Yes we can. And many other do.
Secure enterprise mobility
North European Cybersecurity Cluster - an example of the regional trust platf...
IoT Technologies for Context-Aware Security
Cyber crime as a startup
Services evolution in cybercrime economics
Ad

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Electronic commerce courselecture one. Pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
Teaching material agriculture food technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Approach and Philosophy of On baking technology
PDF
KodekX | Application Modernization Development
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Machine learning based COVID-19 study performance prediction
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Spectroscopy.pptx food analysis technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Electronic commerce courselecture one. Pdf
Review of recent advances in non-invasive hemoglobin estimation
Diabetes mellitus diagnosis method based random forest with bat algorithm
Agricultural_Statistics_at_a_Glance_2022_0.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Teaching material agriculture food technology
NewMind AI Weekly Chronicles - August'25 Week I
Programs and apps: productivity, graphics, security and other tools
Approach and Philosophy of On baking technology
KodekX | Application Modernization Development
Digital-Transformation-Roadmap-for-Companies.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
The AUB Centre for AI in Media Proposal.docx
MYSQL Presentation for SQL database connectivity
Machine learning based COVID-19 study performance prediction
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation_ Review paper, used for researhc scholars
Spectroscopy.pptx food analysis technology
Chapter 3 Spatial Domain Image Processing.pdf

When network security is not enough