Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
High-performance database security software Data-Centric. Compliance with SOX and HIPAA, GDPR and PCI DSS, as well as other privacy laws and standards. Hybrid and Multicloud Database Security Proxy on AWS Azure, Google, and On-Prem Active protection, discovery, and auditing of sensitive and PII data. Data Auditing allows for real-time monitoring of user actions and data changes to ensure compliance and increased visibility. Database Firewall, role-based and location-aware Data Access Control & Protection. Protect corporate databases in the cloud and on-prem from hostile, negligent actions. Secures sensitive data in testing and development environments; Encryption completely eliminates the possibility of reverse engineering the masked data. Production data can be hidden using real-time location and role-based data masking. Protects sensitive privacy data from being exposed even if production data is not physically altered.
Description
Simplifies data regulations, improves visibility and streamlines the monitoring
IBM®, Guardium®, Data Compliance helps organizations meet regulatory compliance and audit requirements faster and easier, while safeguarding regulated information wherever it is located.
IBM Guardium Data Compliance, available in IBM®, Guardium®, Data Security Center, can reduce audit prep times for data compliance regulations and provide continuous visibility of data security control. It also solves data compliance and data monitoring challenges.
API Access
Has API
API Access
Has API
Integrations
IBM Cloud Pak for Security
IBM Guardium
IBM Verify
Recruitee
ServiceNow
Vertica
Integrations
IBM Cloud Pak for Security
IBM Guardium
IBM Verify
Recruitee
ServiceNow
Vertica
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
DataSunrise
Founded
2014
Country
United States
Website
www.datasunrise.com
Vendor Details
Company Name
IBM
Founded
1911
Country
United States
Website
www.ibm.com/products/guardium-data-compliance
Product Features
Database
Backup and Recovery
Creation / Development
Data Migration
Data Replication
Data Search
Data Security
Database Conversion
Mobile Access
Monitoring
NOSQL
Performance Analysis
Queries
Relational Interface
Virtualization
Product Features
Compliance
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
GDPR Compliance
Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
HIPAA Compliance
Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management
PCI Compliance
Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management