IBM® InfoSphere® Guardium® provides the simplest, most robust solution for data security and data privacy by assuring the integrity of trusted information in your data center. InfoSphere Guardium helps you reduce support costs by automating the entire compliance auditing process across heterogeneous environments. InfoSphere Guardium offers flexible and scalable solution to support varying customer architecture requirements. This IBM Redbooks® publication provides a guide for deploying the Guardium solutions.
This book provides a roadmap process for implementing an InfoSphere Guardium solution based on years of experiences and best practices collected from a number of Guardium experts. We describe planning, installation, configuration, monitoring, and administration of an InfoSphere Guardium environment. We also describe use cases and how InfoSphere Guardium integrates with other IBM products.
The guidance can help you for a successful deployment and management of an IBM InfoSphere Guardium system.
This book is intended for the system administrators and supports who have the responsibilities in deploying or supporting an InfoSphere Guardium environment.
Table of contents
Chapter 1. Solution and architecture
Chapter 2. Implementation planning
Chapter 3. Installation and configuration
Chapter 4. Monitoring and auditing
Chapter 5. Monitoring setup
Chapter 6. Access management
Chapter 7. Ongoing operations
Chapter 8. Disaster recovery
Chapter 9. Upgrade best practices
Chapter 10. Use cases
Chapter 11. Integration with other IBM products
These pages are Web versions of IBM Redbooks- and Redpapers-in-progress. They are published here for those who need the information now and may contain spelling, layout and grammatical errors.
This material has not been submitted to any formal IBM test and is published AS IS. It has not been the subject of rigorous review. Your feedback is welcomed to improve the usefulness of the material to others.
IBM assumes no responsibility for its accuracy or completeness. The use of this information or the implementation of any of these techniques is a customer responsibility and depends upon the customer's ability to evaluate and integrate them into the customer's operational environment.