Seller Presentation (Guardium Insights L2)
Seller Presentation (Guardium Insights L2)
Guardium Insights
Matt Simons
Product Manager
IBM Security Guardium Insights
matt.simons@ibm.com
Javaid Rajmohamed
WW Technology Enablement
IBM Security
javaid@ibm.com
Before you start
this seller
presentation,
review the
client presentation
The client
presentation discusses:
– Offering description
– IBM’s value
– Key contacts
and resources
Understand the
Opportunity
and Competition
Compliance
– Enforce governance policies consistently
– Demonstrate compliance
– Lower costs and effort with no impact on business processes
Protection
– Protect sensitive data dynamically, on-premises and in the cloud,
Market opportunity Market CAGR from unauthorized access, theft, or changes
– Enable digital transformation by providing consistent protection as
$3.9 B 14%
the data environment evolves
KuppingerCole Key findings: OVERALL
LEADER
2023 Leadership
FOLLWER
IBM retains overall leadership
Compass:
MICROSOFT SECUPI
DATASUNRIS E IMPERVA
AXIOMATICS ORACLE
– Market Leader
Big Data security – Product Leader CHALLENGER
– Innovation Leader Figure 1: The Overall Leadership rating for the Database and Big Data Security market segment
Update :
Responsibilities: Responsibilities:
• Manage data security for his small or medium enterprise • Maintain the data security infrastructure in his medium or large enterprise
• Set up compliance programs to adhere to relevant regulations • Understand and manage the data security posture
• Other IT tasks • Use a risk-based approach to investigate anomalies
• Support compliance initiatives
Characteristics:
• Will spend approximately 20% of his time managing data security Characteristics:
• Doesn’t have a database background • Data security is his full-time job
• No experience setting up compliance programs and is unsure what the right steps are • Familiarity with databases and SQL
• Finds existing tools too complex and flexible • Takes advantage of advanced integration features for detection and response
10
Multiple editions
• Compliance
• Compliance
Use case • Compliance • Risk analytics
• Starter security
• Threat
• Marketplace • Upgrades from Essentials • Upgrades from Standard (land and expand)
RTM • Digital • Digital (w/DSRs) • Channel
• Channel • Channel • Direct
Security
Compliance
Easy checkbox compliance, Checkbox compliance with a desire Full Guardium Insights
no security goals to start down the data security path experience in SaaS
11
IBM Security Guardium Insights
SaaS DSPM
Data Vulnerabilities
- Are my data controls sufficient?
- Is data being exposed due to posture issues?
- How do I prioritize and remediate these vulnerabilities?
DSPM differentiates itself in Cloud Data Security
Cloud stack Data flow Easy to deploy with
support and lineage quick time-to-value
Supports major cloud Unique ability to map both Cloud-native and simple user
providers (e.g., AWS, Azure, potential and actual flows of experience means customers are
Google Cloud Platform), and data, allowing the customer up-and-running quickly. With
also SaaS applications to not only see what policy only the need for enterprise-level
(e.g., Slack) and data lake and configuration would cloud credentials, Polar Security
services (e.g., Snowflake), allow, but also what is begins crawling cloud accounts
providing superior coverage actually occurring within minutes of deployment
IBM Security Guardium Insights DSPM
Quick and easy Automated data Data movements Continuous
deployment inventory and access monitoring
No agents needed. Deploying Automate discovery and
Track potential and actual Detect data security
minimum cloud assets in your classification of cloud data in
data movement based on vulnerabilities and potential
cloud workload, having Zero- your Cloud workloads or
access and permissions compliance violations
performance impact for your SaaS applications
critical business applications
Deployment architecture
Fast and automated Data residency
DSPM takes only minutes The DSPM Analyzer ensures data remains resident in the
to provision, with insights customer’s cloud, while only metadata is retrieved;
beginning within hours of Analyzers are deployed regionally to ensure geographic
data discovery sovereignty of data
Risks Risks
PII in OneDrive exposed to 3rd party PII leaked from Production to Development
PII and IP data copied from OneDrive to S3 which had Database with PII was leaked from a production
a data flow exposed to a 3rd party account to a development account
Risks Risks
Plaintext Passwords in Slack Publicly facing PII in Postman
AWS tokens and plaintext passwords were API development environment was publicly facing
found in a shared slack channel with thousands of driver licenses and passwords
Better together
As a part of the GI SaaS platform, DSPM is powered by the GI
SaaS platform and leverages some of GI SaaS capabilities:
• Tenant creation (including AWS marketplace*)
DSPM customer wants to add monitoring Monitoring customer wants to add DSPM
Problem Problem
I installed DSPM and found 10 super I am monitoring 50 databases with
sensitive data stores that needs advanced 19 Advanced Edition but I'm concerned there's
monitoring more out there I don't know about
Solution Solution
Add-on GI SaaS monitoring for these Add DSPM (as an independent component) to
specific 10 data stores to get the bigger scan your cloud accounts and locate shadow
advantage of GI SaaS data and hidden sensitive objects
DSPM Learning more & next steps
Get enabled on DSPM Opportunity Qualification / Lead Passing: How to earn money:
Primarily the influencers These middle tier executives Key influencers and validators
in a large organizations but are the most frequent buyers of the technology during the
can be the buyer in a small of the technology but can also buying process
to medium enterprise influence a purchase – Database Administrator,
– CIO/CISO – SVP / VP of IT Database Manager
– CCO/CGO/CPO/CRO – SVP / VP of Security – Data Security Administrator
– CTO/CDO – Compliance or Risk Manager – IT Manager
– CEO/President – Security Analyst
(commercial clients)
IBM Security For Guardium Data For cloud-first For organizations
Guardium Insights Protection customers organizations new to Guardium
(Amazon Web Service
Kinesis or Azure)
... the resulting Accessing from anywhere Data is a shared resource Servers and networks distributed
using any device for users and applications across hybrid cloud environments
complexity degrades
security and trust
Zero trust offers a
framework for securing
through the complexity
Align
your security Assess | Prioritize | Plan
strategy to
your business
IBM Security Zero Trust Acceleration Services | IBM Security Risk Quantification Services
Modernize
your security with Open collaboration | Unify tools and connect data | Take action quickly with AI-infused analytics
an open, hybrid IBM Cloud Pak for Security
cloud platform
Data and tool sprawl
create security challenges
on-premises environments
Vulnerability
– Responding to threats more Management
Reporting
efficiently across security teams
to boost collaboration and Threat detection
& remediation
reduce alert fatigue
What problems are
you facing today?
Data security teams need help… How do you know where sensitive data
lives in your organization?
– Discovering sensitive data
and centralizing data security
How do you know how data is utilized
across diverse cloud and
on-premises environments
across all of your data sources?
Data security teams need help… How do you meet compliance and
privacy regulations?
– Discovering sensitive data
and centralizing data security
How do you communicate between
across diverse cloud and
on-premises environments
security and compliance teams today?
Data security teams need help… How do you identify risky users and
control data access?
– Discovering sensitive data
and centralizing data security
How do you respond to an insider
across diverse cloud and
on-premises environments
threat today?
But why do you even need data security? Encryption is a powerful tool but not
enough to ensure critical assets are
– “I encrypt all of my data, and that’s enough.” protected from attacks or exposure
– “We have the data monitoring and logging tools
that came with our cloud subscription.”
But why do you even need data security? Many cloud monitoring tools lack risk
analytics and lead to fragmented
– “I encrypt all of my data, and that’s enough.” visibility if multiple cloud vendors
are in one environment
– “We have the data monitoring and logging tools
that came with our cloud subscription.”
But why do you even need data security? The SIEM does not provide visibility into
activity at the database level and can
– “I encrypt all of my data, and that’s enough.” become overloaded with excess event
noise, slowing threat response times
– “We have the data monitoring and logging tools
that came with our cloud subscription.”
But why do you even need data security? While it is important for data
responsibility to be shared, security is
– “I encrypt all of my data, and that’s enough.” typically the first to blame for a breach—
not a careless line of business owner
– “We have the data monitoring and logging tools
that came with our cloud subscription.”
But why do you even need data security? Even in an unregulated industry,
customers expect responsibility data
– “I encrypt all of my data, and that’s enough.” handling—and business-to-business
customers still present third-party risk
– “We have the data monitoring and logging tools
that came with our cloud subscription.”
if data is shared
But why do you even need data security? Do you have other concerns?
– “I encrypt all of my data, and that’s enough.”
Flexibly deploy.
Flexibly monitor. Maintain oversight of your data security deployment
Health dashboards to understand the health of
Guardium Data Protection central managers and agents
Enhance your Gain visibility only into the data you care about
Guardium power.
Fully customizable monitoring dashboards tailor the
user interface to customers’ unique data security needs
Automate cloud
compliance and
streamline data
Automate to meet and maintain compliance
Define what and how monitoring data is collected with
compliance policy creation, and result-set policy
Cut down on costly collectors Reduce the hours needed for Decrease data storage costs Minimize the need for
with long-term data storage to full time employees to run with contextual analytics, aggregators, freeing up
quickly and cost-effectively audits and reports sending less, but more computing resources
meet compliance actionable event data to
the SIEM
Protect cloud data
with IBM Security
Guardium Insights
With all this in mind, Consolidate audit data Better contextualize Create an audit process
let’s talk about… and activity from many user data interactions, so teammates and
types of data sources understanding which stakeholders can
Define compliance policy users are accessing quickly receive and sign
around monitoring and which data sources off on recurring reports
suspicious behaviour and why
Scott
Data security specialist
Rubi
Compliance specialist
After performing poorly Consolidate audit data Better contextualize Create an audit process
at an audit, Scott and and activity from many user data interactions, so teammates and
Rubi need to create a types of data sources understanding which stakeholders can
plan to support Define compliance policy users are accessing quickly receive and sign
compliance reporting
around monitoring and which data sources off on recurring reports
suspicious behaviour and why
With limited data
security tooling
currently, Scott
struggles to…
After performing poorly Consolidate audit data Better contextualize Create an audit process
at an audit, Scott and and activity from many user data interactions, so teammates and
Rubi need to create a types of data sources understanding which stakeholders can
plan to support Define compliance policy users are accessing quickly receive and sign
compliance reporting
around monitoring and which data sources off on recurring reports
suspicious behaviour and why
With limited data
security tooling
currently, Scott
struggles to…
After performing poorly Consolidate audit data Better contextualize Create an audit process
at an audit, Scott and and activity from many user data interactions, so teammates and
Rubi need to create a types of data sources understanding which stakeholders can
plan to support Define compliance policy users are accessing quickly receive and sign
compliance reporting
around monitoring and which data sources off on recurring reports
suspicious behaviour and why
With limited data
security tooling
currently, Scott
struggles to…
How do you discover
and protect sensitive
data across multiple
data sources?
Retain data for years to inform and comply
Long-term data retention stores audit and event data for years
to meet regulations and feed analytics
Automation and pre-built Pre-built compliance Reduce the cost of your SIEM Monitor modern and traditional
integrations help clients templates mean security team by only sharing relevant, data sources in a lightweight,
cost-effectively support don’t have to be experts in data high-risk data security agentless way to support
compliance requirements security to get started on the monitoring events that audit requirements
audit journey are more actionable
IBM Security Guardium
A modernized, end-to-end
data security platform
Adaptive
Flexibly deploy.
Flexibly monitor. Maintain oversight of your data security deployment
Health dashboards to understand the health of Guardium Data
Protection central managers and agents
Strengthen your Gain visibility only into the data you care about
Fully customizable monitoring dashboards tailor the user
interface to customers’ unique data security needs
your first response Long-term data retention stores audit and event data for years
to meet regulations, feed analytics, and help cut collector costs
Traditional approach
Incident of Correlate Remediate risk Close issue Manual process across siloed views
compromise user data across silos and store audit &
Takes days or weeks to complete
compliance data
Platform services
– Data connections – Case management – Automation
– Asset enrichment – Orchestration – Development tools
“Guardium is a huge product “We can take advantage “Our old solution did not scale “Because we are using
for us to utilize… prior to of that built-in as well. Now, we add more Guardium and it’s
having that, there was a lot of functionality to give databases and the same monitoring 24x7,
mystery around what was us a faster start, size team can absorb that I sleep a lot better
happening with our data. without having to into their daily workload, at night—and
What we’ve gained is a view build up things without us having to hire so does my
into where our data’s going from scratch.” new people.” management team.”
and what it’s being used for”
Vice president, Data security engineer,
Senior governance specialist,
cyber security management, insurance provider
IT security domain architect, insurance company
financial services institution
insurance provider
End-to-end data security services
to accelerate your journey toward
smarter data security
Regulatory Compliance
OVERALL
LEADER
FOLLOWER
MICROSOFT SECUPI
DATASUNRISE IMPERVA
AXIOMATICS ORACLE
DELPHIX IBM
AWS THALES
COMFORTE
CHALLENGER
Figure 1: The Overall Leadership rating for the Database and Big Data Security market segment
Imperva Weakness Probing question Show in demo
Imperva is strongly biased on Lack of comprehensive data How many real monitoring How all the next generation
protection process and vision. They customers do they have? Ensure data security functions fit
their Web Application Firewall
business is strongly biased on their they do not quote the WAF install together and protect for the
install base. Monitoring is Web Application Firewall (WAF) base as their market presence. Do future. Show Guardium
secondary and receives install base. Monitoring is secondary they have all functions to fill the Data Protection
less focus. and receives less focus. data security journey? and Insights.
In October 2020, Imperva Analytics support is new and Do I get full visibility of threats across Showcase quick search, data
does not cover all data sources. all my data sources? Can I customize threat analytics use cases,
acquired jSonar to bring
Counterbreach does not allow for analytics to fit my environment outlier detection, risky user
additional cloud offering, more customization on the data threats requirements or my policy scope? spotter, Insights reporting
automation and integrations, models. Weak analytics tools. How do I get insights into and analytics.
and agentless monitoring. my audit data?
They have gaps in portfolio How do you ensure consolidating of Show GDE function and
like, encryption or data you data security journey? How do value. Show DRM function
risk management. you prioritize and socialize risk to your and value.
data resources to all stakeholders?
Limited data source support How do you support NoSQL systems Show Guardium Data Protection
(breadth and depth). Limited and all their protocols? What audit for z, and Big Data, DBaaS
protection for Cloud data sources. volumes do you handle from monitoring options,
Unstable mainframe support. mainframe? Support for DBaaS is reports and dashboards.
just collecting logs?
Higher resource usage, lack What do you do to be able to analyze Show Insights for
of correlation, and scalability volume of long term retention of audit long term retention
issues due to flat file collection logs? Can you easily get analysis of reporting/analytics.
of audit data. insights from your data collection? Show GDP footprint.
Oracle Weakness Probing question Show in demo
Oracle offers a cloud Oracle security solutions Does your long-term IT architecture Show how Guardium can centralize
are tightly integrated into consist of multi-cloud, hybrid security controls, scanning, and
solution, with cloud-based
Oracle’s cloud and solutions or can it truly be risk reporting across multiple
security offerings. application solutions. Oracle-only? clouds and platforms.
Oracle’s security tools are Oracle is limited in data Where is your data stored? Do you Show how a data discovery scan
designed for Oracle databases discovery, security scanning, have backups, duplicate copies, can identify risks from uncontrolled
and applications, and do not and risk reporting transient data, etc.? data stores. Show how security
integrate across other across platforms. scanning and reporting will provide
Do you even know how much there an integrated risk analysis in
platforms and applications.
may be? How will you manage a single tool. Show DRM as
security controls across all these a dashboard approach
locations, and report on the to managing and
effectiveness of these controls? reporting issues.
Oracle is limited in Ask about their IT architecture – Show Guardium’s data activity
data activity monitoring. how will they recognize improper monitoring and reporting.
data usage/movement across
multiple platforms, clouds, etc.?
*These chart also apply to AWS and Azure since they only support native monitoring
Google* Weakness Probing question Show in demo
Google security tools are Google security solutions Does your long-term IT architecture Show how Guardium can centralize
are tightly integrated into consist of multi-cloud, hybrid security controls, scanning, and risk
designed for Google cloud and
Google’s cloud and solutions or can it truly be Google- reporting across multiple clouds
G Suite, and do not integrate G Suite. only? Can your data security solution and platforms. Show Guardium
across other platforms properly be limited to only the capabilities which are not in
and applications. functions which G Suite offers? G Suite, such as data discovery.
Data discovery, classification, Google is limited in data How much of your data is in Show how Guardium can:
and encryption do not cover discovery, security scanning, locations such as backups, 1) perform data discovery scan
and risk reporting across duplicate copies, transient can identify risks from uncontrolled
other platforms beyond theirs.
heterogenous data sources. data, etc.? Do you even know data stores, 2) Guardium can
how much? How will you handle unstructured data sources,
manage security controls 3) security scanning and reporting
across all of these locations, will provide an integrated risk
and report on the analysis in a single tool, and
effectiveness of these 4) DRM as a dashboard approach
security controls? to managing and reporting.
Google is limited in data activity Ask about their IT architecture – Show Guardium’s data activity
monitoring, being able to monitor how will they recognize improper monitoring and reporting. Show how
email, attachments, and phishing. data usage/movement across this enable data security for a class
multiple platforms, clouds, etc.? of risks (improper data movement)
not covered by G Suite.
*These charts also apply to AWS and Azure since they only support native monitoring
IBM Guardium’s
Competitive Differentiators
1 Broadest range of platform support across databases, 6 Insights Data Security hub that can collect logs from
data warehouses, Big Data, Database Services, and Z/OS other third-party solutions
2 Only solution providing clients three alternative methods 7 Only Guardium has the largest market share with
to monitor nearly any data source – via lightweight agent, highest number of clients in nearly every market
proxy-based tap, or agentless connectors
8 Only IBM Guardium can also provide complementary data
3 Only solution flexible and scalable for the hybrid cloud encryption, tokenization, and key management solutions
supporting management frameworks such as
Kubernetes and OpenShift 9 Only IBM Security Services and Expert Labs provide the most
advanced capabilities for installations, consultancy and
4 Most comprehensive Database Vulnerability managed services to meet clients’ business objectives
Assessment available
10 Only Guardium has active Guardium User Groups
5 Most advanced security analytics and communities in nearly every market enabling clients
threat detection capabilities to interact and provide advice
Understand the
solution: Pricing
Guardium Data Protection
pricing models over the years
Processor Value Unit With Resource Value Unit (RVU) based With Resource Unit
(PVU) licensing is licensing, Guardium products are licensed (RU) based licensing,
estimated to be the same using either count of data sources - Managed Guardium offerings are
as the count of processor Virtual Servers (MVS) or Managed Activated made available under
cores referred to as CPU, Processor Core (MAPC) - used by data Cloud Pak for Security
vCPU or CPU cores. sources that are under active production (CP4S) licensing model
monitoring. MAPC metric was adopted as data using a singe part
PVUs have been around started to shift to cloud and clients needed a number that can be
for a long time. Many way to count what Guardium was monitoring. used flexibly with
clients have them, and Guardium portfolio and
they don’t know how RVUs provide a special discount table to other offerings built on
to count them. PVUs help reduce the list prices and allow for Cloud Pak for Security.
are tied to on-prem bulk-purchase discounting to reduce the
deployments. need for special bidding.
In 2021, new licensing
was adopted to align with
Cloud Pak for Security
QRadar Data
Store
Cloud Pak for
Security (GEN 3)
Make it easy for customers to buy and expand
Ratio Table Objective: deployments for cross portfolio use cases
– Client References
• IBM Client Success
Central → (IBM only)
Contacts Ian Wight
Worldwide Guardium
Matt Simons
Product Manager,
IBM Security Data Security Segment Leader IBM Security Guardium Insights
ianw@ibm.com matt.simons@ibm.com
Guardium Insights
Leslie Wiggins Javaid Rajmohamed
Program Director, Learning Content Development,
Data Security Product Management BM Security Guardium
wigginsl@us.ibm.com javaid@ibm.com
For more information
Slack channels