A cloud-based identity-as-a-service solution
What is IBM Security Verify?
Guardium primarily protects this type of data
What is structured data?
This process ensures that only authorized users have access to resources
What is identity governance?
Guardium uses this tool to find sensitive data across databases and files
What is Data Discovery?
Guardium supports these compliance standards out-of-the-box for audits and reports
What are GDPR PCI-DSS HIPAA SOX?
This feature allows users to access multiple apps with one login
What is Single Sign-On (SSO)?
Guardium uses this method to discover sensitive data in databases
What is data classification?
IBM Verify includes this tool for managing periodic user access reviews
What is Access Certification?
Guardium classifies this type of data which includes documents and emails
What is unstructured data?
IBM Verify assists organizations with reporting for these regulatory requirements
What are compliance reports?
A feature adjusting security based on user behavior and risk
What is Adaptive Access?
This Guardium feature monitors database activity in real-time
What is Database Activity Monitoring (DAM)?
This model assigns permissions based on job functions or roles
What is Role-Based Access Control (RBAC)?
This benefit of data classification helps prioritize security efforts
What is risk prioritization?
Guardium generates these reports to track who accessed sensitive data and when
What are audit reports?
This method verifies identity using something you know, have, or are
What is Multi-Factor Authentication (MFA)?
Guardium integrates with this type of system for centralized logging
What is SIEM (Security Information and Event Management)?
IBM Verify helps manage this type of elevated user access
What is Privileged Access Management (PAM)?
Guardium integrates with these environments for cloud data discovery
What are cloud platforms (e.g., AWS and Azure)?
These 'trails' track user activities in IBM Security solutions
What are audit trails?
This type of authentication uses contextual information to determine risk
What is Risk-Based Authentication?
Guardium uses this technology to protect data at rest
What is encryption?
This feature in IBM Verify analyzes user behavior to identify risks
What is Identity Analytics?
Guardium helps organizations comply with this European privacy regulation through data discovery and monitoring
What is GDPR (General Data Protection Regulation)?
Guardium helps prevent violations before they occur by continuously monitoring adherence to these specific types of policies.
What are compliance policies?