Data Security Management

InfoSphere Guardium Data Encryption provides a proven approach to securing data to meet rigorous data governance and compliance requirements. It can be quickly deployed to secure data while requiring no change to applications, the underlying database or hardware infrastructure. Benefits include:

  • Centralized key management, policy management and audit capabilities
  • Strong separation of duties and compliance ready
  • Minimal performance impact to databases and applications
  • Support for all data types and index types
  • Installs quickly in a matter of days and is completely transparent to applications
  • Easily extensible protection to log files, configuration files and other database output

 

Features and benefits

 

Transparent, Rapid Implementation

InfoSphere Guardium Data Encryption encrypts databases and files “in place” and avoids the need to re-architect databases, files, or storage networks. Inserted above the file system and/or logical volume layers, InfoSphere Guardium Data Encryption is transparent to users, applications, databases and storage subsystems. It requires no coding, no modification to applications or databases, and consequently deployments can be managed in weeks rather than months.

 

Structured & Unstructured Data

InfoSphere Guardium Data Encryption can secure structured and unstructured data to satisfy rigorous audit requirements and provide comprehensive protection for sensitive data.

 

High Performance

Benchmarking has demonstrated the InfoSphere Guardium Data Encryption solution has no discernable performance impact for end users. InfoSphere Guardium Data Encryption performs encryption and decryption operations at the optimal location of file system or volume manager and consequently minimizes performance overhead. This approach leverages the I/O profile of databases by only encrypting and decrypting the storage blocks needed for a particular operation.

 

Centralized Management

InfoSphere Guardium Data Encryption minimizes administrative overhead with key and policy management providing a secure, easy to administer method of administering encryption keys. It enables consistent and common best practices for managing the protection of both structured and unstructured data accessed.

 

Fine-grained Auditing

InfoSphere Guardium Data Encryption provides granular and configurable auditing and reporting of access requests to protected data, as well as changes to policies and keys. The system’s audit management reduces audit scope, integrates with existing Security Information & Event Management (SIEM) solutions, and aids compliance with industry and regulatory practices regarding the handling and protection of private and confidential information.

 

Scalability

Organizations can scale InfoSphere Guardium Data Encryption in large and complex environments including thousands of systems and files.

InfoSphere Guardium Data Encryption provides a proven approach to securing data to meet rigorous data governance and compliance requirements. It can be quickly deployed to secure data while requiring no change to applications, the underlying database or hardware infrastructure. Benefits include:

  • Centralized key management, policy management and audit capabilities
  • Strong separation of duties and compliance ready
  • Minimal performance impact to databases and applications
  • Support for all data types and index types
  • Installs quickly in a matter of days and is completely transparent to applications
  • Easily extensible protection to log files, configuration files and other database output

 

Features and benefits

 

Transparent, Rapid Implementation

InfoSphere Guardium Data Encryption encrypts databases and files “in place” and avoids the need to re-architect databases, files, or storage networks. Inserted above the file system and/or logical volume layers, InfoSphere Guardium Data Encryption is transparent to users, applications, databases and storage subsystems. It requires no coding, no modification to applications or databases, and consequently deployments can be managed in weeks rather than months.

 

Structured & Unstructured Data

InfoSphere Guardium Data Encryption can secure structured and unstructured data to satisfy rigorous audit requirements and provide comprehensive protection for sensitive data.

 

High Performance

Benchmarking has demonstrated the InfoSphere Guardium Data Encryption solution has no discernable performance impact for end users. InfoSphere Guardium Data Encryption performs encryption and decryption operations at the optimal location of file system or volume manager and consequently minimizes performance overhead. This approach leverages the I/O profile of databases by only encrypting and decrypting the storage blocks needed for a particular operation.

 

Centralized Management

InfoSphere Guardium Data Encryption minimizes administrative overhead with key and policy management providing a secure, easy to administer method of administering encryption keys. It enables consistent and common best practices for managing the protection of both structured and unstructured data accessed.

 

Fine-grained Auditing

InfoSphere Guardium Data Encryption provides granular and configurable auditing and reporting of access requests to protected data, as well as changes to policies and keys. The system’s audit management reduces audit scope, integrates with existing Security Information & Event Management (SIEM) solutions, and aids compliance with industry and regulatory practices regarding the handling and protection of private and confidential information.

 

Scalability

Organizations can scale InfoSphere Guardium Data Encryption in large and complex environments including thousands of systems and files.