IBM has launched its first technology since the acquisition by IBM last year.
With the introduction of InfoSphere Guardium 8, which it said allows organisations to simplify security and compliance regulations with a set of automated and centralised controls, it said that it is helping businesses protect customer data and other sensitive information from security breaches.
Phil Neray, VP of security product strategy and marketing at Guardium, told SC Magazine that this is a major product release and that it ‘really demonstrates one of the key differentiators for enterprise products because of the depth of products'.
The software enables organisations to embed data security and privacy capabilities into all of their enterprise databases and applications, such as CRM, human resources, ERP, accounting, finance and other applications.
It also said that in addition to its automated monitoring capabilities, the new software helps clients more easily meet compliance mandates by delivering stronger information governance controls to ensure the privacy and integrity of corporate data, while simplifying audits.
Neray said: “We have all focused on perimeter security but little on protecting the data inside. So with Guardium 8 we have expanded support for the mainframe and also added blocking that is more proactive, so it will block a user from accessing all data until it is resolved. It sits in the appliance and in the database and monitors transactions.”
New features in InfoSphere Guardium 8 include fraud protection for SAP systems, support for the mainframe and protection of SharePoint files. Integration with Tivoli software is also added due to the ownership by IBM, although Neray admitted that the technology had been in development for two years and the support for the mainframe had come from specialised technology and the integration with Tivoli.
Guardium also said that it adds improved compliance and audit processes, as businesses will have improved flexibility to define custom workflows and share specific audit information with relevant audiences in their organisations.
Neray pointed to recent Verizon Business findings that revealed that 92 per cent of all breached records come from database servers. He said: “The vast majority of stolen details come from breaches, not from stolen laptops.”
Mike Gibbons, principal in enterprise risk services at Deloitte, said: “From organised crime syndicates stealing credentials and hacking into databases to unauthorised access by employees, businesses are facing an overwhelming volume of sophisticated data security threats.
“Organisations must now implement additional layers of security such as real-time database activity monitoring because traditional perimeter security approaches such as network firewalls and anti-virus systems are no longer sufficient.”