Skip to main content

Deployment Guide for InfoSphere Guardium

An IBM Redbooks publication

thumbnail 

Published on 20 March 2014, updated 14 April 2015

  1. .EPUB (13.5 MB)
  2. .PDF (15.4 MB)

Apple BooksGoogle Play BooksRead in Google Books Order hardcopy
Share this page:   

ISBN-10: 0738439355
ISBN-13: 9780738439358
IBM Form #: SG24-8129-00


Authors: Whei-Jen Chen, Boaz Barkai, Joe M DiPietro, Vladislav Langman, Daniel Perlov, Roy Riah, Yosef Rozenblit and Abdiel Santos

    menu icon

    Abstract

    IBM® InfoSphere® Guardium® provides the simplest, most robust solution for data security and data privacy by assuring the integrity of trusted information in your data center. InfoSphere Guardium helps you reduce support costs by automating the entire compliance auditing process across heterogeneous environments. InfoSphere Guardium offers a flexible and scalable solution to support varying customer architecture requirements.

    This IBM Redbooks® publication provides a guide for deploying the Guardium solutions.

    This book also provides a roadmap process for implementing an InfoSphere Guardium solution that is based on years of experience and best practices that were collected from various Guardium experts. We describe planning, installation, configuration, monitoring, and administrating an InfoSphere Guardium environment. We also describe use cases and how InfoSphere Guardium integrates with other IBM products.

    The guidance can help you successfully deploy and manage an IBM InfoSphere Guardium system.

    This book is intended for the system administrators and support staff who are responsible for deploying or supporting an InfoSphere Guardium environment.

    Table of Contents

    Chapter 1. Solutions and architecture

    Chapter 2. Implementation planning

    Chapter 3. Installation and configuration

    Chapter 4. Monitoring and auditing

    Chapter 5. Monitoring setup

    Chapter 6. Access management

    Chapter 7. Ongoing operations

    Chapter 8. Disaster recovery

    Chapter 9. Upgrade best practices

    Chapter 10. Use cases

    Chapter 11. Integration with other IBM products

     

    Others who read this also read