Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy /

This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM Security Guardium® Data Protection and IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. T...

Full description

Saved in:
Bibliographic Details
Main Authors: Shingornikar, Shashank (Author), Bhandari, Raninder Ravi (Author)
Format: eBook
Language:English
Published: [Poughkeepsie, New York] : IBM Redbooks, 2022.
Edition:[First edition].
Subjects:
Online Access:CONNECT
CONNECT
LEADER 03247nam a22004817i 4500
001 in00006184850
006 m o d
007 cr cnu|||unuuu
008 220802s2022 nyua ob 001 0 eng d
005 20220815143347.2
035 |a 1WRLDSHRon1338150829 
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA 
020 |a 9780738460710  |q (electronic bk.) 
020 |a 0738460710  |q (electronic bk.) 
035 |a (OCoLC)1338150829 
037 |a 9780738460710  |b O'Reilly Media 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23/eng/20220802 
049 |a TXMM 
100 1 |a Shingornikar, Shashank,  |e author. 
245 1 0 |a Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy /  |c Shashank Shingornikar, Raninder Ravi Bhandari. 
250 |a [First edition]. 
264 1 |a [Poughkeepsie, New York] :  |b IBM Redbooks,  |c 2022. 
300 |a 1 online resource (44 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
520 |a This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM Security Guardium® Data Protection and IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM Copy Services Manager as orchestration software to start IBM FlashSystem® Safeguarded Copy functions. The Safeguarded Copy creates an immutable copy of the data in an air-gapped form on the same IBM FlashSystem for isolation and eventual quick recovery. This document describes how to enable and forward Oracle database user activities (by using IBM Security Guardium Data Protection) and IBM FlashSystem audit logs by using IBM FlashSystem to IBM QRadar. This document also describes how to create various rules to determine a threat, and configure and launch a suitable response to the detected threat in IBM QRadar. The document also outlines the steps that are involved to create a Scheduled Task by using IBM Copy Services Manager with various actions. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security  |x Management. 
650 0 |a Data protection. 
700 1 |a Bhandari, Raninder Ravi,  |e author. 
730 0 |a WORLDSHARE SUB RECORDS 
793 0 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) 
856 4 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780738460710/?ar  |z CONNECT  |3 O'Reilly  |t 0 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi  |d z 
999 f f |s 87de4101-5524-4355-82ac-05d7524b4ae5  |i bfb5260a-dd6a-484d-abeb-fcc3dcb6706f  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 1  |e TK5105.59   |h Library of Congress classification 
856 4 0 |3 O'Reilly  |t 0  |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780738460710/?ar  |z CONNECT