Uploaded by aguilar_chris

GuardiumDAMV10 handouts 1

Slide 1
IBM Security Guardium Tech Talk
What's new in Guardium DAM V10: A technical
overview
David Rozenblat
Director, Guardium Development
IBM Security
Kathy Zeidenstein
Guardium Evangelist and Community Advocate
IBM Security
September 17, 2015This call is being recorded.
© 2015 IBM Corporation
Slide 2
Please leave the web conference if you object.
Logistics
 This tech talk is being recorded. If you object, please hang up
and leave the webcast now.
 We’ll post a copy of slides and link to recording on the Guardium
community tech talk wiki page: http://ibm.co/Wh9x0o
 You can listen to the tech talk using audiocast and ask questions
in the chat to the Q and A group.
 We’ll try to answer questions in the chat or address them at
speaker’s discretion.
– If we cannot answer your question, please do include your email so we
can get back to you.
 When speaker pauses for questions:
– We’ll go through existing questions in the chat
© 2015 IBM Corporation
Slide 3
2
This is proably the best place to find content. It
atttempts to provide links to all available
resources. Also, by signing up, you can get the
emails for new tech talks or other critical
events.
Guardium community on developerWorks
bit.ly/guardwiki
Right
nav
© 2015 IBM Corporation
3
Slide 4
Reminder: Next Guardium Tech Talk
Next tech talk: A Technical Overview of IBM Security
Activity Monitor for Files
Speakers: Daniel Stanca, Product Manager
Sagi Shechter, Guardium Development Manager
Date and time: Thursday, October 15th
11:30 AM US Eastern (60 minutes)
Register here: https://ibm.biz/BdX5cZ
 Link to more information about this and upcoming tech talks can be
found on the Guardium developerWorks community:
http://ibm.co/Wh9x0o
 Please submit a comment on this page for ideas for tech talk topics.
© 2015 IBM Corporation
Slide 5
4
Agenda
 Business overview
 Enhancement that support analysis
 Enhancements that support adaptability
 Enhancements that support protection
 Platform changes and upgrade roadmap - Important survey question
© 2015 IBM Corporation
Slide 6
5
As you’ll see in this presentation, IBM has
simplified the messaging around data
protection to three key themes: Analyze,
adapt, and protect. And that’s how we’ve
grouped together the related V10
enhancements as well. We’ll also do a
quick overview of the appliance platform
changes because it has implications for
upgrade. We have an important survey
question at the end about migration and
upgrade, so please try to stay through to
the end. If you cannot, please post in the
chat that you would be interested in
migration services.
Dynamic nature of the data
Data is multiplying, it’s dynamic (moving
around – all over the place) – in and out
of your infrastructure.
Data is challenging to secure
DYNAMIC
DISTRIBUTED
Data multiplies
continuously and
moves quickly
Data is everywhere,
across applications
and infrastructure
IN DEMAND
Users need to constantly access
and share data to do their jobs
© 2015 IBM Corporation
6
Disparate and distributed data
Disparate data platforms and formats. ,
Small security teams, lots of applications;
Developers lack secure coding skills;
Demand for the data is increasing
Bottleneck trying to control the usage; data
is everywhere; needs to be accessed
Slide 7
At the highest level, Guardium offers
complete data protection, using
analytics to help automate risk
identification and by providing broad
coverage and ability to dynamically adapt
and scale to a wide variety of IT
environments.
Guardium uses intelligence and automation to safeguard data
ANALYZE
ADAPT
Automatically
discover critical data
and uncover risk
Seamlessly handle
changes within your IT
environment
PROTECT
Complete protection for sensitive
data, including compliance automation
IBM CONFIDENTIAL: NDA until August 25, 2015
Slide 8
© 2015 IBM Corporation
7
ANALYZE. PROTECT. ADAPT.
Discovery, classification,
vulnerability assessment,
entitlement management
Encryption, masking,
and redaction
Data and file activity
monitoring
Dynamic blocking and
masking, alerts, and
quarantine
Compliance automation
and auditing
ANALYTICS
IBM CONFIDENTIAL: NDA until August 25, 2015
© 2015 IBM Corporation
8
The analyze, protect and adapt themes are
manifested through a broad set of data
security capabilities, which are all under
one umbrella and are integrated with each
other to help you implement a complete
solution.
Analytics makes it possible to deal with
the quantity of data you have, the quantity
and velocity of data access to track, and
being unable to uncover patterns and
detect and pinpoint suspicious activities.
Centralization is the glue that makes the
whole data security functions manageable
within a whole array of heterogeneous data
sources required to run the IT environment.
This is the beauty of this approach: You
get a central place to ask the common data
security questions (for security, privacy or
compliance) across all the enterprise data
resources in a normalized way. And you
can start at any point in accordance to your
needs, maybe with simple compliance
reporting, …. and grow..
So let’s look at the set of new DAM
capabilities that fall under the theme of
analysis.
Slide 9
Analyze
© 2015 IBM Corporation
Slide 10
David will be doing a demo of some of the
new capabilities in the user interface and
also the enterprise quick search and
investigation dashboard. There are
additional enhancements that are included
in backup slides.
Analyze
 New navigation and user experience
 Quick Search for Enterprise and Investigation Dashboard
 Classifier enhancements (backup)
© 2015 IBM Corporation
Slide 11
10
UI simplification and modernization
At a glance
operational
dashboards
Customizable
Reports
Enterprise wide
Quick Search
Drill-down
analytics
Assignable
tasks with
SOD
Guided
Processes
© 2015 IBM Corporation
11
Before I turn it over to David, I just want to
briefly give an overview. The new UI has
evolved and will continue to evolve along
the lines of simplicity and modernization.
The design is more task-oriented and
provides guided processes such as the end
to end discovery scenario that David will
demonstrate.
IT’s also much easier to customize the UI,
as David will demonstrate. For example to
create a view-only user with limited access
is very easy to do.
Slide 12
Demo
© 2015 IBM Corporation
Slide 13
The banner is a powerful control center with
alerts, to-dos and an enhanced search bar.
The UI search bar will be your best friend in
helping you find a tool or report quickly by
name.
Notifications are covered in more detail in
backup slide.
Banner
To-do list
Use to navigate through the
UI or to search data or files
(Quick Search)
Notifications
© 2015 IBM Corporation
Slide 14
13
The left hand navigation is now simplified
and normalized across both administrator
and user roles.
Customizable navigation
Tools and reports related to
the task
Common navigation
© 2015 IBM Corporation
14
Slide 15
Report dashboard example
See tabular
report
Configure runtime
parameters
Mark as favorite
Same chart,
customized
Customize
display
© 2015 IBM Corporation
15
Guardium includes hundreds of built-in
reports as well as a flexible reporting
capability to let you create as many custom
reports as you need. The sheer number of
reports can make finding your own
important reports a bit more challenging.
Version 10 introduces the concept of “My
Dashboards”. A dashboard is a userpersonalized space in which you can drop
reports and organize reports for easy
access. Each user can name the
dashboards and create as many
dashboards as they need.
Using favorites enables you to filter reports
in audit processes or when creating new
dashboards so you don’t need to scroll
down through hundreds of reports or
devising your own naming scheme to
ensure that your reports filter to the top of
the list.
When adding a report to a dashboard you
can find them easily by name by typing in
the first few characters in a field that
requires selection from a list
Slide 16
Report dashboard creation
 Type-ahead filter
to quickly find
reports / charts
 Additional filters
– Favorites
– Charts
– User defined (not
pre-defined) reports
 Select report /
chart to add it to
dashboard
© 2015 IBM Corporation
16
Slide 17
Dashboard layout
 Customize layout into 1, 2, or 3 columns
 Drag and drop to move reports / charts
© 2015 IBM Corporation
Slide 18
17
Administrators will love this new central
location to see the status of Guardium
services. And it provides one-stop
launchpad to get to where you need to go
to configure the service.
Services Status: before and after
Setup  Tools and Views  Services Status
Centralized
view of services
V10
Direct access to
enable or disable
the service
V9
© 2015 IBM Corporation
Slide 19
18
Accelerators now included in the base
Access Manager
User with SOX and PCI roles
Accelerators
navigation menu
Add roles to a
user
© 2015 IBM Corporation
19
Prior to V10, the compliance accelerators
(PCI, SOX, Basel II, and Data Privacy) had
to be installed using separate patches. Now
they are part of the base product offering
and can be added to user interface simply
by configuring users with any of the
corresponding roles (pci, sox, etc). The first
screenshot above shows that the Guardium
Access Manager is giving a user the PCI
and SOX roles. When that user next logs
into Guardium, she sees the Accelerators
navigation menu and can see the content
for both accelerators.
Slide 20
Managing permissions has never been easier!
© 2015 IBM Corporation
Slide 21
20
The process to customize the user interface
and manage permissions for different roles
has been dramatically simplified in Version
10. Everything is in one central location and
uses a simple "slushbucket" approach.
For example, if you want to create a very
simple interface with only a few read only
reports for a particular auditor, it can be
done quickly and easily. The Guardium
access manager creates a new role called
"Myfavoriteauditor". For the role, she goes
to Manage Permissions and gives very
limited permissions to the user as shown
below, which includes report builder, results
viewing and audit to-do lists.
Then, the access manager goes to
Customize Navigation Menu for that role
and specifies which specific reports that
Myfavoriteauditor can see.
Customizing navigation is a snap
Specify what will show up in
navigation
© 2015 IBM Corporation
Slide 22
21
The resulting navigation is simple and
targeted for that role.
Customized navigation
Default navigation
Customized navigation
Simplified, targeted layout
for specific roles.
© 2015 IBM Corporation
22
Slide 23
Lifecycle workflow: Discover, review, schedule, protect
Creates a classification
process and policy
Creates a security policy
Creates an audit process
with receivers and a
schedule.
© 2015 IBM Corporation
Slide 24
We leverage the analytic tools to provide
better ways to understand activity flows,
even in a multi-dimensional environment.
This allows for drill downs on specific areas
of activity and to see how they affect other
attributes in the environment.
Investigation Dashboard
Click to view details in
Quick Search without
losing context.
•Color depth represents Intensity of
usage
•Hover over cells for details
•Click a cell or title for interactive
filtering
© 2015 IBM Corporation
Slide 25
23
24
Animation chart
Adds a time dimension to the investigation dashboard.
Size of bubble
reflects amount of
data
Hover over circle
to see details.
Activity over the
last 48 hours is
replayed.
© 2015 IBM Corporation
An example of the direction that the
Guardium UI is taking can be seen in a new
task flow that takes you end to end through
a guided workflow that goes from sensitive
data discovery, to data protection (defining
security policies), to compliance (defining
audit process), without requiring users to
jump from place to place in the user
interface.
If you go through the entire workflow,
relevant artifacts are created such as a
classification policy, an audit process to
schedule the classification and even a
security policy with the relevant access
rules to protect discovered sensitive data.
25
You will see in the demo how a set of two
dimensional heat maps can give you a
glimpse of where most activity happens,
and then filter from there into how other
relationships are affected.
New animation chart
The animation chart adds an important
dimension, time, to the Investigation
Dashboard. This helps analysts to visualize
activity behavior over time using data in
motion. This chart uses animated bubbles
to represent activity over the last 48 hours
(at most). The data is “auto-played”, where
each frame is an hour in time, and can be
paused, much as you would when watching
any video.
All 4 dimensions used in the chart are
configurable: The bubbles, their sizes, as
well as the X and Y axes. For example, a
bubble can be defined as a DB User, its
area to the number of client IPs, its
horizontal position to ACCESS activity, and
its vertical position to the number of
ERRORS, as shown in the following image.
This view supports drill down; clicking on a
bubble adds the data elements selected to
the filters and all charts are filtered
accordingly.
Slide 26
A key focus this release has been in
making Guardium more adaptable and
easier to administer.
Adapt
© 2015 IBM Corporation
Slide 27
Some of the capabilities are covered in the
backup slides.
Adapt









Enterprise load balancing
GIM improvements for deployment and security
Enhanced instance discovery
S-TAP enhancements for performance and capability
Auto-run dependent jobs for scheduled processes (backup)
Database platform enhancements (backup)
MongoDB as an audit repository (backup)
Softlayer backup (backup)
Troubleshooting enhancements (backup)
© 2015 IBM Corporation
27
Slide 28
Enterprise load balancing
 Removes the headache of manually
managing collector allocation for new STAPs
– Configure S-TAP to connect to a Load Balancer
on CM and let load balancer find an appropriate
Managed Unit
 Dynamically rebalances workloads based
on relatively current load data (such as sniffer
queues)
 Complete redesign of 9.5 deliverable
© 2015 IBM Corporation
Slide 29
28
Enterprise load balancer keeps track of how busy the
collectors are
MU 1
Two types of collection:
• Full load collection
• Single MU load collection
MU
DB
Change
tracker
Central Manager
Load Map
Load
Balancer
Full load collection happens
dynamically (recommended)
or statically
Single MU collection when
load characteristics change
(such as number of S-TAPs)
MU n
MU 1=loaded
…
MU n= vacant
Change
tracker
MU
DB
Rebalancing occurs only
after full load collection
© 2015 IBM Corporation
29
Dynamic load balancing is available in
centrally managed environments and
reduces the workload on Guardium
administrators by automating several tasks
that required previously manual tracking
and intervention. Dynamic load balancing:
Eliminates the need to manually evaluate
the load of managed units before assigning
those managed units to an S-TAP agent.
Eliminates the need to define fail-over
managed units as part of post-installation
S-TAP configuration because the load
balancer dynamically manages fail-over
scenarios.
Eliminates the need to manually relocate STAP agents from loaded managed units to
less loaded managed units.
Restrictions: Dynamic load balancing is
not supported for z/OS and IBM i S-TAPs.
Load balancer is a servlet running on the
Central Manager
Change trackers are running on the
managed units (MUs)
Load balancer dynamically reallocates Mus
based on current load
• Collects a variety of statistics from each
MU to make a determination of ‘loaded’
vs. ‘vacant’.
The dynamic load balancer is an
application that runs only in the Central
Manager. It requires no special
configuration to run. The load balancer
application is enabled on the Central
Manager by setting
LOAD_BALANCER_ENABLED=1. It will
affect the behavior only of those S-TAPs
that are installed with the load_balancer_IP
(the Central Manager IP) specified.
The dynamic load balancer performs “load
collection” periodically, which entails
getting a snapshot of current activity load
for all active managed units and storing it in
a load map. This load collection does not
affect other activity on the Central Manager.
You can specify the load collection to
happen using a fixed interval or
dynamically. Dynamic collection is the
default and recommended setting. With
dynamic collection, intervals will be
determined by the number of Managed
Units (1 additional hour for every 10
managed units). Dynamic intervals will
guarantee more accurate load map without
the overhead of loading the CM with
unnecessary load collections.
When is single load collection triggered?
• Used when load patterns have been
changed on the MU. (e.g. If the number
of STAPs connected to specific MU has
changed)
Load change tracker agents on each MU
track load-contributing factor changes
• A tracker agent is a load balancer
instance (servlet) running on each MU..
This (mostly dormant) agent tracks
specific 'load change tracker' factors
changes (e.g. the
SOFTWARE_TAP_PROPERTY table)
Load Balancer transparently supports two
types of collections
• Full Load Collection
– Load Information collection from all the
managed units in the site
• Single MU Load Collection
– Load Information collection from a
single MU caused by 'load-contributing'
factor changes.
If something changes for a particular
managed unit that affects its load, such as
a reduction or increase in the number of STAPs connected to it, the load balancer will
be notified through a change tracker on the
MU, updated information will be sent to the
load balancer.
Once the load balancer has the load map, it
can make informed decisions about which
collectors are best suited to failover, new
allocations, or for rebalancing of S-TAPs.
(Note that rebalancing can only happen
after a full load collection and is controllable
via a load balancer configuration
parameter.)
Slide 30
It’s likely that you have different ‘zones’ for
different groupings of database servers/STAPs and managed units. You can use the
following two types of groups to set up your
environment for load balancing:
S-TAP groups
MU groups
Using groups to create load balancing zones
S-TAP
Group 1
STAP 1
MU _Group1
STAP 2
STAP 3
Central Manager
Load Map
STAP n
Zone 1
Zone 2
S-TAP
Group 2
Load
Balancer
MU 1=loaded
…
MU n= vacant
MU _Group2
STAP A
STAP B
STAP F
© 2015 IBM Corporation
30
You can create and associate these groups
ahead of time in the Central Manager
interface. The group names are casesensitive. For the S-TAP groups, you must
specify exactly what you will use to install
the S-TAP itself (either the host name or
IP). You can use wildcards in your IP
addresses, such as 192.168.1.*.
You can also specify these groups during
S-TAP installation. (The MU group must
exist already. For S-TAP groups, if it
doesn’t already exist, Guardium will create
it for you. )
Slide 31
Guardium installation manager (GIM) enhancements
 Easier deployment of GIM clients
– From GIM server, remotely activate GIM clients
that were installed in “listener” mode
– Use GIM listener ‘auto discovery’ to find any
servers that have GIM clients and activate (next
slide)
– Guardium admins don’t need access to the
database server
 Improved security using remote certification authority
– Install the GIM client with the relevant certificate
information or update it using the GIM GUI or API.
 Installer enhancements to specify failover GIM server
when installing GIM Client for first time
– --failover_sqlguardip <ip or hostname>'
© 2015 IBM Corporation
31
What is GIM? GIM eases the burden of
maintaining modules that reside on the
database server such as CAS, S-TAP and
Discovery GIM Modules:
Consists of GIM Server (on Guardium
appliance) and GIM Client, a set of Perl
scripts that run on each managed server.
GIM:
Checks for updates to installed software
Transfers and installs new software
Uninstalls software
Updates software parameters
Monitors and stops processes running on
the database server
Easier deployment of GIM clients
Before V10, whenever a new database
server was configured with the GIM client
on it, it was required to know the IP address
of the Guardium appliance it was
connecting to. For organizations that stand
up new database servers, this required
additional communication between the DBA
and the Guardium administrator, slowing
down the deployment of the database
server with Guardium monitoring.
Now, using remote activation, a database
server can be installed without specifying a
Guardium IP address, thereby putting the
GIM Client in “listener” mode. Any GIM
client in listener mode can be remotely
activated from a collector) without requiring
additional configuration changes on the
database server.
You can also auto-discover any servers
that have GIM clients in listener mode and
then remotely activate any or all of those
discovered clients.
In sum, this enhancement enables IT
organizations to roll out Guardium on all
new servers without requiring further
interactions with the Guardium team, which
can activate Guardium on the database
server on their own
Prior to V10, GIM connections between the
database server and the GIM server used
Guardium self-signed certificates. With
V10, you can now use an external
certificate authority to authenticate these
connections. It is fully backward compatible
with older GIM clients.
GIM client bundles are pre-installed with
Guardium self-signed certificates. By
default, new installations of GIM clients will
attempt to establish secure and
authenticated connections with GIM server
over port 8446. You can use your own keys
and certificates either by installing the GIM
client with the relevant certificate
information or by updating it using the GIM
GUI or API.
Updating key/certificates throughout a large
site can be a long process. During that time
there might be a mismatch between GIM
server and GIM client's certificates/keys.
When GIM client fails to connect to a GIM
server (appliance) over port 8446 (secured
and authenticated), it will switch to the
traditional secured port 8444 and write an
event in the GIM Events report.
Slide 32
This shows the output of a GIM auto
discovery process.
GIM Auto-discovery process results in support of listener
Auto-populated
collector
(default:localhost)
The original
scanned IP
range/port
Host name where
listener is running
Specific IP where GIM
listener is running
“Check” to
activate
Make the
association
© 2015 IBM Corporation
Slide 33
32
Enhanced instance discovery using S-TAP
 Removed dependency on Java and external libraries
 Enable on S-TAP installation:
– Noninteractive install flag --use-discovery
– GIM install – set STAP_USE_DISCOVERY to 1
 When S-TAP is installed, inspection engines will be configured for discovered instances
 After install, invoke process from S-TAP control
 Can also invoke inspection engine creation via API from Discovered Instances report
© 2015 IBM Corporation
33
Guardium with auto-discovery enabled, lets
you use the power of S-TAP to discover
running instances on that server, including
the information you need to automatically
populate the inspection engine definitions.
V10 makes it much easier by not requiring
Java or any external libraries to accomplish
this task.
To enable instance discovery, use the
following flags during S-TAP installation:
Noninteractive install flag --use-discovery
GIM install – set STAP_USE_DISCOVERY
to 1
When installation is completed, S-TAP will
be configured with Inspection Engines for
all running databases.
To invoke instance discovery after
installation, go to Manage > Activity
Monitoring > S-TAP Control and select
the Send Command icon as shown in the
screenshot below. Notice that you can
optionally replace all inspection engines in
that S-TAP with the newly discovered
configurations. The other option is to review
the results in the Discovered Instances
report and invoke the
create_stap_inspection_engine API for one
or more discovered instances.
Slide 34
S-TAP enhancements
 S-TAP multithreading for intensive workloads such as warehouse
– Preserves ‘threadedness’ from point of interception through to the collector
– Configure using participate_in_load_balancing = 4 and specify sql_guard sections up to 5 - this
determines number of main threads
– No failover support in this release.
 64-bit UNIX/Linux binaries, which increases amount of data that can be buffered (approx.
2GB per collector IP)
 Recommended performance parameters turned on by default
– ktap_fast_tcp_verdict: Port information loaded into K-TAP on startup
– ktap_fast _shmem_verdict: Used for DB2 shared memory improvements
 New platforms
–
–
–
–
–
RHEL 7 x86_64
SUSE 12 x86_64
Ubuntu 14 x86_64
Debian (supported via Ubuntu installer)
Dropped support for AIX 5.3, SLES 9, Solaris 9
© 2015 IBM Corporation
34
S -TAP multithreading
S-TAP multithreading can be used in
certain workloads to prevent overrunning
buffers in the S-TAP and associated KTAP. It works by preserving multiple
threads from the point of traffic interception
through to the point at which traffic is sent
to the appliance.
To enable S-TAP multithreading, configure
the guard_tap.ini file with
participate_in_load_balancing=4 and
specify multiple sqlguard sections. The
number of sqlguard sections determines
the number of main threads up to a
maximum of 5. When used with pooled
connections, the total number of threads to
handle data can be up to 50 (10 * 5).
Considerations for use: In this
configuration, no one Guardium receives all
the data from the S-TAP. The distribution is
similar to that used when
participate_in_load_balancing is set to 1.
However, when a Guardium system
becomes unavailable, no failover is
provided in this release. Data will be
queued until the reconnection occurs or the
buffer is full.
Important: Although
participate_in_load_balancing 1 and 4 are
similar, they do notsend the same sessions
to the same place, so if you are using 1 and
switch to 4, your sessions will move
machines and you'll lose the access
information for those sessions.
Also, as when
participate_in_load_balancing is set to 1,
encrypted and unencrypted A-TAP traffic
may not be sent to the same Guardium
system.
Make sure to use the same policy on all the
connected Guardium systems. If the
policies are different, there's no guarantee
which policy is in effect on a given session.
64bit session keys reduce the likelihood of
collisions causing dropped traffic
- Part of the improvement for STAP multithreading improvements and the change to
64bit
- multi-threading preserves some of the
threadedness from the kernel side through
to the collector to reduce lock contention
and improve the amount of traffic we're able
to collect
- multi-threading helps primarily when there
are large numbers of sessions, but a 32bit
session key has an increased likelihood of
colliding on an existing session and causing
a loss of interception in this environment
- switching to a 64bit session key reduces
the chances of a collision impacting the
traffic collected
ktap_fast_tcp_verdict: This is an existing
parameter that is now on by default. When
set to 1, the TCP port information is loaded
into K-TAP when S-TAP starts up. The
result is that K-TAP is no longer dependent
on S-TAP to determine which TCP
connections should be monitored, which
reduces the likelihood of experiencing
database performance degradation if STAP becomes slow . For more information
about this parameter, see the IBM
Redbook, Deployment Guide for
InfoSphere Guardium.
ktap_fast _shmem_verdict: Similar to the
behavior that is already supported Informix,
this is a new parameter that pushes the
recommended information for DB2 shared
memory configurations to the K-TAP. This
means that K-TAP is not dependent on STAP to determine which shared memory
connections should be monitored. In
general, don't turn this off.
Slide 35
Guardium supports complex IT environments …
Examples of supported databases, Big Data environments, file shares,
etc
Applications
CICS
WebSphere
Databases
DB2
Informix
Data Warehouses
IMS
Big Data Environments
Netezza
PureData for
Analytics
DB2 BLU
Siebel
PeopleSoft
E-Business
DB
Cloud Environments
Database Tools
Enterprise
Content Managers
Files
VSAM
z/OS
Datasets
FTP
Windows, Linux,
Unix
© 2015 IBM Corporation
35
In V10, Guardium has expanded its DAM
capabilities to keep current with new
releases. In addition, there are sometimes
significant enhancements in our support,
such as improved support for Teradata
encryption and improved capabilities for
parsing and logging Hadoop activity.
Please read the release notes or the what’s
new article for more details.
And of course, the biggest enhancement
was in adding support for files beyond what
we have already on z/OS. This is a whole
new offering, and our next tech talk will
cover that in much more detail.
Now we’ll look at the capabilities that fall
under the category of data protection and
which are available with advanced versions
of DAM.
Slide 36
Protect
© 2015 IBM Corporation
Slide 37
The biggest enhancement in this space is
called fine-grained access control, which is
a dynamic, policy-based method to change
queries on the way to the database.
You may hear this called ‘query rewrite’
since that is what we call the tooling inside
Guardium.
Protect (Advanced)
 Fine grained access control
 Blocking and redaction for Hadoop queries from Hive and Impala (Backup)
© 2015 IBM Corporation
37
We’ve also added blocking and redaction
for hive and impala queries in Hadoop. We
already support both for big sql, so now it’s
included also for Hive queries and impala,
which is Cloudera’s query language. That
is covered in the backup.
Slide 38
Fine-grained access control
Protect sensitive data without impacting your business
Column-Level Masking (only dept#)
Row-Level Masking (only dept #20)
Use cases:
• Outsource production DB access
• Protect PII from privileged users
• Testing on production data
• Honey pot
Supported databases: DB2 (LUW), Oracle,
SQL Server
© 2015 IBM Corporation
38
With Guardium’s
implementation of fine-grained
access control, administrators
have the ability to protect
sensitive data without making
database changes. Basically, it
provides the ability to modify the
SQL statement that gets sent to
the database, based on the
current runtime user and the
other policy conditions you
specify, such as client IP,
database object, time of day,
etc.
For a classic dynamic data
masking scenario, you can
mask which columns are
returned, so you can make sure
that salary and commission data
are not returned to unauthorized
users.
Or you can hide the rows that
are returned by adding a
WHERE clause for example, In
this case you could evaluate the
dbuser and ensure that the
managers of the relevant
departments see only data from
their departments. In both
cases shown here, you can see
that the statement entered by
the user is the same. All the
magic happens behind the
scenes.
This is extremely powerful. You
can even use this capability to
RESTRICT activity. For
example, to prevent deletions
from a database, you could
always change a delete
statement to be a noop.
.
Use cases could be:
• Need to open up production DB
perhaps to an outsourced DBA
without affecting DB access
controls or compromise private
information
• Need to Enforce access to PII to
comply with PCI, HIPAA. Keep
track of who requested masked
data
Need to transform data
(anonymization) without affecting
application logic, but protecting
original data privacy.
Provide fictitious data to possible
attackers to allow time for
investigation
.
Slide 39
Here’s the runtime architecture for the
solution. For those of you familiar with
S-GATE terminate, it’s much the same.
You need to set up the S-TAP ahead of
time to enable query rewrite.
Fine-grained access control architecture
1. User issues SQL
2. STAP holds SQL and
checks policy rules for
conditions.
3. If conditions are met,
Guardium rewrites
query and sends to STAP
4. S-TAP releases
rewritten query to
database server.
5. Results are sent back
to user.
qrw_installed=1
qrw_default_state=0
qrw_force_watch=NULL
qrw_force_unwatch=NULL
Firewall_timeout=10
4
1
Select * from
Employee
DB2INST
FGAC and firewall cannot be used on
same session.
Results of
rewritten
SQL
S-TAP
Select EMPNO,
FRSTNAME,
LASTNAME
From EMPLOYEE
5
2
Rewritten
SQL
3
Check Guardium policy:
When DBuser=DB2INST and
Object=Employee, apply query
rewrite definition
Guardium
Collector
Rule actions: query rewrite attach, query rewrite apply
definition, query rewrite detach
© 2015 IBM Corporation
39
The flow is,
 the user enters a SQL statement for
one of the supported databases. We
can assume in this case that this
particular user session has put a query
rewrite “watch” on their session.
 When this user enters a SQL statement
in a watched session, the STAP holds
the statement and checks against the
policy rules.
 If the conditions are met –maybe in this
case the object is employee and the
user is DB2inst, Guardium rewrites the
query and sends it back to the S-TAP.
It rewrites the query based on query
definitions that the administrator has
already defined. The query rewrite
policy rule points to that definition.
 The S-TAP releases it to the database
server.
 The results from the rewritten query are
sent back to the user.
Output: a modified SQL based on the
user-specified QRW definitions
User gets the query results evaluated by
the modified SQL
New rule actions in v10
- Query Rewrite Attach
- Query Rewrite Detach
- Query Rewrite: Apply Definition
Triggered by installed access policy rules.
Slide 40
Workflow through runtime
1
Create query rewrite definition…
2
Rewritten
query
Create security policy…
When database type = Oracle and
User = Joe and Object =
Customer….then
3
Joe queries the Customer table…
Do not return
rows of
Government
customers
© 2015 IBM Corporation
40
This just shows the overall workflow and an
example of the UI in which you create the
query rewrite definitions. The UI provides
an interface in which you can enter a model
query and modify it by adding a WHERE
clause, adding a UDF, or basically
changing it any way. In this case, any
select on customer is rewritten to add a
WHERE clause to not return customers of
type government. (hiding rows).
That query write definition is applied in the
query rewrite apply definition policy action
by name. So only when the specific
conditions are met will the query rewrite
rule be applied on customer queries and
only when Joe is the user and the database
type is Oracle.
Slide 41
You can see here that Guardium does
record the input and output SQL when a
query definition has been applied at
runtime.
Use case: Production database for testing
Exposing a database to a production environment for testing purposes without
exposing private data
Query rewrite report
shows actual
runtime queries.
After – Guardium uses fine grained access
control to change columns / mask data
Before – Displaying all values in the database
© 2015 IBM Corporation
Slide 42
41
Use case: Multi tenancy Scenario
Enhance access controls in which multiple users and applications share a
single database.
•
•
Rows and columns
returned for nongovernment customers
Display data based on run
time parameters (eg
USER)
Enhance existing access
controls
User TSHIRAI cannot
see name or birth date
User ADMIN cannot see
name
© 2015 IBM Corporation
Slide 43
42
Dynamic data masking at database layer
May reduce dependence on test data systems
Support multi-tenancy environments
Does not require the involvement of the DBA
Centralized policy for supported database types
(MS SQL, Oracle, and DB2)
IBM Confidential
Enforcing security in multi-tenancy
scenarios where multiple users and
applications share a single database, but
where not all users and applications should
have access to all data.
In this case, we’ve restricted the rows that
are returned to show only nongovernment
customers for all users. Also, in this case
user Tshirai is not allowed to see complete
values for name or birthdate, but ADMIN is
restricted only from name.
So, Guardium has had dynamic data
masking that allowed you to apply regular
expressions based on results sets. The
capability provided by query rewrite is much
more powerful and flexible.
Benefits of fine-grained access control





In this example, we want to mask data for
testing purposes … so you can call UDF to
change the results.
© 2015 IBM Corporation
43
We’ve demonstrated a few possible use
cases.
If you have SQL skills, you do not
necessarily need to involve the DBA in this.
And you can the centralized policy
management capabilities provided by
Guardium across all supported platforms.
We don’t have much time to spend on this
and we’ll have a separate tech talk on this
subject. But I wante to make sure we give
you a brief overview of the new appliance
specs and please do stick around for the
survey question.
Slide 44
Upgrade/migration roadmap
© 2015 IBM Corporation
Slide 45
Original v9.5 OS - RHEL 5.11
Original v9.5 MySQL – to v5.6.24
We’re enforcing the 24GB minimums.
Appliance technical specs
 Underlying appliance OS upgraded to RHEL v6.5 64-bit version (v9.5
RHEL 5.11)
 MySQL DB version upgraded to v5.6.24
 RAM -Minimum 24GB
 CPU/vCPU – Minimum 4 cores
 HD – Minimum 300 GB
– Upgraded system hard drive range (300 < 2 TB)
– Newly built system (300 GB to >2TB (MUCH GREATER)
© 2015 IBM Corporation
Slide 46
45
Hard drive support is vastly extended for
those of you who do new installations on
V10.
GPT (GUID Partition Tables) allocates 64
bits for logical block addresses, therefore
allowing a maximum disk size of 264 = 9.4
Zettabytes
Upgrade is a major procedure in V10
because of the new operating system and
other reasons. Thus, there are some
restrictions listed here.
Upgrade limitations
Upgrade procedure limitations
– V10 upgrade patch available only for 64-bit version appliances at GPU level
v9.0p200 or higher
– Upgrade procedure is not available for customers with customized partitions
– Upgrade procedure does not support resizing or realignments of the partitions.
Restore from system backup stored in previous version
– V10 supports restoring system backup file from any v9.x version.
© 2015 IBM Corporation
46
Slide 47
This is a high level roadmap. Basically it
says what I said before in terms of when
you HAVE to use rebuild/ restore from
backup vs an upgrade path.
Upgrade roadmap
See the V10 Knowledge Center upgrade topic for more details.
For a limited time: Customers on 64-bit 9.5 environments may be eligible for a
controlled upgrade program for a limited number of appliances. Send a note to
Carrie Rogers (carriero@us.ibm.com) to see if you are eligible.
Transition path to V10 appliance
Rebuild/Restore backup
Upgrade
64-bit v9.0p200 or later
yes
yes
32-bit v9.0200 or later
yes
no
v9.0 - v9.0p100
yes
no
v8.2 or earlier
no
no
Source appliance
© 2015 IBM Corporation
47
For those of you who are already yon a
64bit 9.5 environment, you may wish to get
some added assistance from the lab to try
the upgrade out on a limited number of
appliances.
Slide 48
Important survey question
 If you are currently running 32-bit Guardium, would you be
interested in having IBM services contact you about a migration to
Version 10?
1.
2.
3.
4.
Yes
No
N/A (We have 64-bit Guardium)
N/A (I am an IBMer or BP)
© 2015 IBM Corporation
Slide 49
Guardium supports the whole data protection journey
Comprehensive
data protection
Dynamic blocking, alerting, quarantine, encryption
and integration with security intelligence
Sensitive
data discovery
Perform vulnerability assessment, discovery
and classification
Address
data privacy
Expand
platform coverage
Acute
compliance
need
Find and address PII, determine who is reading
data, leverage masking
Big data platforms, file systems or other platforms
also require monitoring, blocking, reporting
Database monitoring focused on changed data,
automated reporting
© 2015 IBM Corporation
49
Today we’ve talked about one slice of the
Guardium data protection suite and even
with that we could have talked for hours.
Guardium includes so much more to
support your data protection roadmap, no
matter where you are starting from, such as
those who have an immediate compliance
need through to those who grow to
comprehensive data protection that
includes full use of our analytics capabilities
and integration with IBM Security
intelligence capabilities.
Slide 50
Resources
 V10 Overview webcast (includes activity
monitoring for files)
 Overview Solution Brief
 DAM solution brief
 Announcement letter
 Detailed Release notes
 System requirements
 DeveloperWorks article – coming soon!
 UI demo on YouTube (more coming)
 High level Upgrade Roadmap
Activity Monitoring for Files resources:
 Activity Monitoring for Files Demo on
YouTube
 Supported files for FAM
© 2015 IBM Corporation
Slide 51
50
there are currently two Guardium certification
tests.
If you are looking into taking an IBM
professional product certification exam, you
may look into taking the 000-463 certification
(http://www03.ibm.com/certify/tests/ovr463.shtml).
Information, training, and community cheat sheet
 Guardium Tech Talks – at least one per month. Suggestions welcome!
 Guardium YouTube Channel – includes overviews, technical demos, tech talk
replays
 developerWorks forum (very active)
 Guardium DAM User Group on Linked In (very active)
 Community on developerWorks (includes discussion forum, content and links
to a myriad of sources, developerWorks articles, tech talk materials and
schedules)
 Guardium on IBM Knowledge Center (was Info Center)
 Deployment Guide for InfoSphere Guardium Red Book
 Technical training courses (classroom and self-paced)
IBM Security Guardium Virtual User Group. Open, technical
discussions with other users. Not recorded!
Send a note to krzeide@us.ibm.com if interested.
51
51
© 2015 IBM Corporation
51
Upon completion of the 000-463 certification,
you will become an IBM Certified Guardium
Specialist (http://www03.ibm.com/certify/certs/28000701.shtml).
The certification requires deep knowledge of the
IBM InfoSphere Guardium product. It is
recommended that the individual to have
experiences in implementing the product to take
the exam. You can view the detailed topics
here: http://www03.ibm.com/certify/tests/obj463.shtml
Details each topics are covered in the product
manuals. You will also find the Guardium
InforCenter a useful resource when you prepare
for the exam: http://www01.ibm.com/support/knowledgecenter/SSMPH
H/SSMPHH_welcome.html
Slide 52
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks
on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.
IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
Mandatory closing slide with copyright and
legal disclaimers
THANK YOU
www.ibm.com/security
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor
shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product
or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.
Slide 53
Classifier enhancements
 Classifier has seen an upsurge of interest from the user community
 Improvements in user experience, performance, and management of false positives
One match per column
Classifier will record the first hit for any given column and
ignore it thereafter for subsequent rules.
Easy to set up exclusion groups
© 2015 IBM Corporation
Slide 54
53
Database platform support highlights
NOT a complete list.
Database
Enhancement
DB2 LUW
UID chain captured through DB2_Exit
DB2 for i
TLS encryption to collector and S-tAP-based load balancing
z/OS
platforms
Multi-stream load balancing. Quarantine for DB2 users. (many more to be
covered in a separate talk).
Hadoop
Improved collection/parsing (targeted inspection engines). Blocking and
redaction for Hive and Impala. (will be coveredin detail in a separate talk)
Informix
New exit (ifxguard) for Informix shared memory processing (replaces A-TAP).
Supports firewall (blocking) and UID chaining. Informix 12.10xC5W1 and later.
Oracle
Added SSL for 12c. Added ASO for Windows 12c
Sybase
Added support for 16
Sybase IQ
Added shared memory support via A-TAP
Teradata
Added support for 15.10 including A-TAP for encrypted user names and traffic
© 2015 IBM Corporation
54
In addition to the incorporation of
classification into an overall workflow as
described above, the following
enhancements are also included:
Better controlling false positives by using
“excluded groups” for schema, table, and
table/column.
Previously, it could be a complex process
to set up Guardium to ignore false positive
results for future classification scans. Now,
when you review classifier results, you can
easily add false positive results to an
exclusion group as shown below, and add
that group to the classification policy to
ensure those results are ignored in future
scans.
Current informix interception via standard
IEs on UNIX and ATAP on Linux has a
number of limitations (limitation of 50 or
less shm connections per poll thread,
occasional blank DB_USER and
SOURCE_PROGRAM). New exit relieves
those.
KTAP and ATAP interception have been
improved to significantly reduce the blank
DB_USER and SOURCE_PROGRAM
issues and other traffic loss issues
- Improved Informix ATAP
applicable only to Informix 11.50+
- Informix EXIT library developed in
conjunction with Informix team for the most
reliable interception
- similar to DB2 exit
- supports firewall and UID chain
- applicable to Informix
12.10xC5W1 and above
Sybase ASE ATAP supports IPs and ports
- Previously, IP and ports would not be
populated in the decrypted session.
ANALYZE_CLIENT_IP, unlike Oracle,
would not get populated by the collector.
- When ports are configured during ATAP
configuration, real IPs and ports will be
captured along with the decrypted traffic
and sent to the collector for population in
the tables
- Classic Sybase ASE ATAP without IPs
and ports is still usable by not specifying
the ports during configuration
Oracle 12 SSL ATAP (not just Linux)
- Version 9 supports Oracle 12 with ATAP
for ASO but not SSL
- SSL requires instrumentation on all
platforms (unlike previous Oracle versions
which only required instrumentation on AIX)
Slide 55
MongoDB as audit repository
 For uses cases such as:
– Post processing audit data
– For longer online retention requirements
 Audit data is written simultaneously to Guardium repo and JSON files on collector
 Use grdapi to send JSON data to a MongoDB database
© 2015 IBM Corporation
55
Some organizations would like to write
audit data outside of Guardium collector for
reasons such as:
To “post-process" the audit information for
fraud and other analytic analysis
To store information into another data store
that can scale larger than our current
collector capacity for longer on-line
retention requirements.
In Version 10, it’s possible to concurrently
write audit data to both the collector
database and JSON-formatted files that
can be transferred to a MongoDB
document database.
Important: Unlike the Guardium collector,
the MongoDB database is not a hardened
repository. Access to the audit data should
be carefully restricted and monitored using
Guardium.
How it works
whn properly configured, the parsed audit
data is sent simultaneously to the
Guardium collector repository and written in
JSON format to a file in the following
directory: /var/IBM/Guardium/data/auditlog
When a file is ready to be loaded into to
MongoDB, it will be marked with the suffix
.ready. Use the Guardium API command
grdapi mongodb_load to send all ready
files to MongoDB.
Slide 56
Job scheduling dependency management
 Helps ensure accurate data before running a job (eg groups populated from classifier)
 Applies to all ‘schedulable’ jobs (audit processes, policy installations, group population from
query…
 Scheduler will automatically find all the subordinate jobs and run them in order
– For example, group population for groups in the policy should run first
 There is a retry sequence in case of a failure (default is 3 tries)
 APIs to list job dependency tree, scheduled jobs, job dependencies….
© 2015 IBM Corporation
56
Job Dependency Scheduler
The Guardium collector has many tasks
such as Policy Installation, Audit
Processes, Group updates, etc. that are
scheduled to run periodically. The Job
dependencies feature finds all jobs that
have a direct relationship and impact on the
success of the execution of the task you
are trying to schedule. Unless you find the
jobs that are defined as prerequisites for
the job you are trying to schedule, there is a
chance the task will relay on inaccurate
data , which might lead to false or
inaccurate results.
Feature Highlights User marks a scheduled
job to find and run dependencies at run
time.
When the scheduler runs the job, it
automatically finds all the subordinate jobs
and runs them in order.
There is a retry sequence in case of a
failure.
Find dependencies Identify scenarios that
require dependencies.
Identify Runnable vs. Non-Runnable jobs.
Calculate pre-defined job dependencies.
Slide 57
Softlayer as a backup store
IBM SoftLayer Object
Storage
Object Storage Account
Cluster
Container
Backup and
Archive
Cluster
Container
Container
Container
Restore
Backup and
Archive
Guardium System
Restore
Guardium System
© 2015 IBM Corporation
Slide 58
57
Update notifications filtered based on the
relevancy to the specific customers
appliance:
Supportability enhancements
 Banner notifications
– Low system memory (RAM)
– Quick Search memory + CPU cores minimum
requirement
– Certificate expiration (mysql, GUI, GIM, etc.)
– Central Management failure
– SSLv3 enabled
– No License
 Improved user-friendly license acceptance
process through UI
 Centralized supportability and troubleshooting
tools in Manage>Maintenance
 See tech talk “Best kept secrets of
Guardium supportability” for other items
you may not be aware of. Contact Kathy
Zeidenstein for replay links and slides.
Long term storage is a critical consideration
for satisfying audit requirements that may
require storage of audit data for up to 7
years. The ability to archive and backup to
the cloud gives you another option for
storage off premises.
In addition, backing up the configuration of
Guardium appliances to the cloud is useful
for maintaining a disaster recovery
environment so that if a local data center
has a failure, you can restore the
configuration of the appliance from the
image that is stored in the cloud.
Guardium now supports SoftLayer Object
Storage as a repository for both audit data
and configurations, whether your Guardium
system is in a local data center or in the
cloud. SoftLayer object storage provides
self-healing, storage for massive amounts
of data. There are object storage centers
around the world so you can avoid issues
of moving sensitive data across country
boundaries.
Banner notification
License acceptance status
Troubleshooting tools
© 2015 IBM Corporation
58
Filtering based on the Guardium Appliance
major version (only v10 or later)
Filtering based on the GPU level of the
appliance.
– AdHoc patches dependent on the same
GPU level
– Universal sniffer updates (no
dependency)
– Security updates (no dependency)
– More recent GPU patches
Slide 59
Hadoop blocking (Hive/Impala) (S-GATE TERMINATE)
Policy: Block privileged user access to customer data through Hive
1
Privileged user attempts to read customer data and is blocked
2
Access attempt is reported as a policy violation
3
Important: Because of the way Hive and Impala traffic is processed in Hadoop,
you must do the following in the blocking policy rules:
• Specify the DBTYPE in the blocking (S-GATE ATTACH and S-GATE
TERMINATE) policy rules; that is, either Impala or Hive.
• Ensure that ATTACH happens on a combination of user and object/command.
© 2015 IBM Corporation
Slide 60
59
Hadoop Redaction (Hive / Impala)
Important: Specify Hive
or Impala in DBTYPE for
Redact rules
Masked Hive data in Hue/Beeswax
Masked Hive data command line
Slide 61
© 2015 IBM Corporation
60
© 2015 IBM Corporation
61
Query rewrite workflow
Create query definitions based on
what you want to control
• Restrict columns
•Restrict rows
•Limit what users can do
•Restrict what user can access
•Completely replace part or all of a
query
Test the query rewrite definitions
with real test queries..
(Note, you will likely need to use
policies to fine tune the behavior)
Determine the conditions in which to
rewrite the query
Query
Rewrite
Builder
Query
Rewrite
Builder
Policy
Builder
•specific users, client IPs, objects,
commands?
Validate runtime effect in a QA
environment
Query
rewrite
report
Redaction is configured by using extrusion
rules in Guardium policies. Again, be sure
to specify Hive or Impala in the DBTYPE for
these rules. Here is an example of a Hive
query in which social security and credit
card numbers have been redacted.
Slide 62
Legal notices and disclaimers
Copyright © 2015 by International Business Machines Corporation (IBM). No part of this
document may be reproduced or transmitted in any form without written permission from
IBM.
U.S. Government Users Restricted Rights – Use, duplication or disclosure restricted by
GSA ADP Schedule Contract with IBM.
Information in these presentations (including information relating to products that have
not yet been announced by IBM) has been reviewed for accuracy as of the date of initial
publication and could include unintentional technical or typographical errors. IBM shall
have no responsibility to update this information. THIS document is distributed "AS IS"
without any warranty, either express or implied. In no event shall IBM be liable for any
damage arising from the use of this information, including but not limited to, loss of data,
business interruption, loss of profit or loss of opportunity.
IBM products and services are warranted according to the terms and conditions of the
agreements under which they are provided.
Any statements regarding IBM’s future direction, intent or product plans are subject to
change or withdrawal without notice. Performance data contained herein was generally
obtained in a controlled, isolated environments. Customer examples are presented as
illustrations of how those customers have used IBM products and the results they may
have achieved. Actual performance, cost, savings or other results in other operating
environments may vary. References in this document to IBM products, programs, or
services does not imply that IBM intends to make such products, programs or services
available in all countries in which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared by independent
session speakers, and do not necessarily reflect the views of IBM. All materials and
discussions are provided for informational purposes only, and are neither intended to,
nor shall constitute legal or other guidance or advice to any individual participant or their
specific situation.
It is the customer’s responsibility to insure its own compliance with legal requirements
and to obtain advice of competent legal counsel as to the identification and interpretation
of any relevant laws and regulatory requirements that may affect the customer’s business
and any actions the customer may need to take to comply with such laws. IBM does not
provide legal advice or represent or warrant that its services or products will ensure that
the customer is in compliance with any law.
Information concerning non-IBM products was obtained from the suppliers of those
products, their published announcements or other publicly available sources. IBM has
not tested those products in connection with this publication and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products.
Questions on the capabilities of non-IBM products should be addressed to the suppliers
of those products. IBM does not warrant the quality of any third-party products, or the
ability of any such third-party products to interoperate with IBM’s products. IBM
EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
The provision of the information contained herein is not intended to, and does not, grant
any right or license under any IBM patents, copyrights, trademarks or other intellectual
property right.
Other company, product, or service names may be trademarks or service marks of
others. A current list of IBM trademarks is available at “Copyright and
trademark information” www.ibm.com/legal/copytrade.shtml
Mandatory legal notices and disclaimers
slide for external presentations