Trust But Verify
Masking Tape
You down with IDG
Yeah - you know me
Reporting for Duty
200

This feature allows users to authenticate using their mobile device as a token or second factor

What is Mobile Push Authentication?

200

This Guardium component provides real-time alerts when suspicious database activity occurs

What are Anomaly Detection Alerts?

200

This process ensures that users only have access to the resources they need at any given time

What is least privilege?

200

Guardium scans databases for sensitive information using these predefined rulesets

What are classification policies?

200

Guardium includes built-in templates for generating reports that meet these regulatory frameworks

What are GDPR HIPAA PCI-DSS templates?

400

This service provides centralized identity management for hybrid cloud environments

What is Identity-as-a-Service (IDaaS)?

400

Guardium uses this technique to mask sensitive data in non-production environments

What is Dynamic Data Masking?

400

This IBM Verify feature helps automate the removal of orphaned accounts

What is automated de-provisioning?

400

These utilities are used by organizations to categorize sensitive documents based on content sensitivity

What are document classification tools?

400

IBM Verify generates compliance reports helping address these processes that happen at a regular frequency.

What are regulatory audits?

600

IBM Verify offers this feature to allow passwordless authentication

What is FIDO2/WebAuthn?

600

This type of encryption ensures that even administrators cannot view sensitive data

What is Transparent Data Encryption (TDE)?

600

This governance model focuses on managing access based on business needs rather than technical roles

What is business-role-based governance?

600

Guardium integrates with these third-party tools for enhanced data classification capabilities

What are third-party DLP solutions?

600

This Guardium templates allows organizations to create custom output based findings tailored to their specific compliance needs.

What are custom report templates?

800

This protocol enables secure token-based authentication for web apps

What is OAuth2?

800

Guardium integrates with these cloud-native databases for comprehensive monitoring

What are AWS RDS Azure SQL Database?

800

This concept ensures appropriate account creation, modification and removal principles are followed based on a user's access business needs

What is Identity Lifecycle Management?

800

This feature allows Guardium to automatically update its policies based on new threats or regulations

What are dynamic classification updates?

800

These logs track all user activities within IBM Security solutions

What are audit logs?

1000

IBM Verify integrates with these types services to provide social login options for users

What are social identity providers (e.g., Google Facebook)?

1000

This feature allows Guardium to monitor activity across multiple database types from a single console

What is cross-database monitoring?

1000

These types of approvals are required when dealing with sensitive access requests requiring more scrutiny

What are risk-based approvals?

1000

Guardium’s classification engine supports these types of rulesets, not included out of the box, for industry-specific compliance needs.

What are custom compliance rulesets?

1000

Guardium provides continuous monitoring and reporting for these types of industry-specific regulations.

What are industry-specific regulations e.g SOX GLBA?