IBM® InfoSphere® Guardium® Vulnerability Assessment scans database infrastructures to detect vulnerabilities, and suggests remedial actions. The solution identifies exposures such as missing patches, weak passwords, unauthorized changes, misconfigured privileges and other vulnerabilities. Full reports are provided as well as suggestions to address all vulnerabilities. InfoSphere Guardium Vulnerability Assessment also detects behavioral vulnerabilities such as account sharing, excessive administrative logins and unusual after hours activity. Database vulnerability assessment identifies threats and security holes in databases which could be exploited by intruders and hackers to gain access to sensitive data.

InfoSphere Guardium Vulnerability Assessment:

  • Automate vulnerability, configuration and behavioral assessment scan the entire database infrastructure for vulnerabilities.
  • Report and take action evaluate and document your database security to help you assess, escalate and resolve risks.

Automate vulnerability, configuration and behavioral assessment

  • Utilize preconfigured vulnerability tests, encompassing Center for Internet Security (CIS) and Security Technical Implementation Guide (STIG) best practices, updated regularly through the IBM InfoSphere Guardium Knowledge Base service.
  • Support for SCAP and ability to export in SCAP format.
  • Provide platform-specific static tests that detect insecure configurations for the specific database being assessed.
  • Conduct dynamic tests that uncover behavioral vulnerabilities such as account sharing, excessive login failures and unusual after-hours activity.
  • Does not rely on intrusive exploits or tests that can impact system availability, and provides external reference information such as common vulnerabilities and exposures (CVE) identifiers.
  • Support leading database platforms and all major operating systems, including big data environments.

Report and take action

  • Produce detailed reports and supporting data.
  • Provide a summary security evaluation, which includes weighted metrics and recommended remedial action plans to strengthen security.
  • Automatically schedule assessments and manage report distribution, sign-offs and escalations.