This feature allows users to authenticate using their mobile device as a token or second factor
What is Mobile Push Authentication?
This Guardium component provides real-time alerts when suspicious database activity occurs
What are Anomaly Detection Alerts?
This process ensures that users only have access to the resources they need at any given time
What is least privilege?
Guardium scans databases for sensitive information using these predefined rulesets
What are classification policies?
Guardium includes built-in templates for generating reports that meet these regulatory frameworks
What are GDPR HIPAA PCI-DSS templates?
This service provides centralized identity management for hybrid cloud environments
What is Identity-as-a-Service (IDaaS)?
Guardium uses this technique to mask sensitive data in non-production environments
What is Dynamic Data Masking?
This IBM Verify feature helps automate the removal of orphaned accounts
What is automated de-provisioning?
These utilities are used by organizations to categorize sensitive documents based on content sensitivity
What are document classification tools?
IBM Verify generates compliance reports helping address these processes that happen at a regular frequency.
What are regulatory audits?
IBM Verify offers this feature to allow passwordless authentication
What is FIDO2/WebAuthn?
This type of encryption ensures that even administrators cannot view sensitive data
What is Transparent Data Encryption (TDE)?
This governance model focuses on managing access based on business needs rather than technical roles
What is business-role-based governance?
Guardium integrates with these third-party tools for enhanced data classification capabilities
What are third-party DLP solutions?
This Guardium templates allows organizations to create custom output based findings tailored to their specific compliance needs.
What are custom report templates?
This protocol enables secure token-based authentication for web apps
What is OAuth2?
Guardium integrates with these cloud-native databases for comprehensive monitoring
What are AWS RDS Azure SQL Database?
This concept ensures appropriate account creation, modification and removal principles are followed based on a user's access business needs
What is Identity Lifecycle Management?
This feature allows Guardium to automatically update its policies based on new threats or regulations
What are dynamic classification updates?
These logs track all user activities within IBM Security solutions
What are audit logs?
IBM Verify integrates with these types services to provide social login options for users
What are social identity providers (e.g., Google Facebook)?
This feature allows Guardium to monitor activity across multiple database types from a single console
What is cross-database monitoring?
These types of approvals are required when dealing with sensitive access requests requiring more scrutiny
What are risk-based approvals?
Guardium’s classification engine supports these types of rulesets, not included out of the box, for industry-specific compliance needs.
What are custom compliance rulesets?
Guardium provides continuous monitoring and reporting for these types of industry-specific regulations.
What are industry-specific regulations e.g SOX GLBA?