Using the IBM InfoSphere Guardium REST API

Organizations that use InfoSphere Guardium for data security and
compliance can take advantage of a rich set of APIs to automate processes and
maintain the system in a more efficient manner. As of InfoSphere Guardium 9.1,
the Guardium API is exposed to external systems as online RESTful web
services, which provide organizations with a modern interface to expose
Guardium capabilities in a Web portal or via the Cloud.

Related:

Use IBM Security Network Protection in an OpenFlow-based Software-Defined Network

The first tutorial in this series, “Deploy IBM Security Network Protection in an Open vSwitch,”
explained how to configure IBM Security
Network Protection into an Open vSwitch-based Software-Defined Network (SDN)
environment. In this tutorial, you’ll learn how to configure an SDN controller
to automatically protect the virtual machines connection to an Open
vSwitch.

Related:

OAuth 2.0 clients in Java programming, Part 3: Authorization code grant

This multi-part series will help you develop a generic and reusable
OAuth 2.0 client that can be used to interface with any OAuth 2.0-compliant
server. Part 1 explained how to implement the resource owner password
credentials grant. Part 2 described how to implement the client credentials
grant. Now, Part 3 teaches you how to implement the authorization code
grant.

Related:

Enable Information Lifecycle Governance for data on mobile devices using Bluemix services

The RetentionLite application, built using IBM Bluemix mobile data services on an
Android platform, enables a user to define governing rules
or policies for efficient backup of data on the mobile device. This application
enables Information Lifecycle Governance on mobile devices using flexible and
configurable rules with an intuitive user interface. Enterprises can use the
power of IBM Bluemix services to quickly develop and customize applications
like RetentionLite to suit their data retention policies.

Related:

OAuth 2.0 clients in Java programming, Part 2: Client credentials grant

This multi-part series will help you develop a generic and reusable
OAuth 2.0 client that can be used to interface with any OAuth 2.0-compliant
server. Part 1 explained how to implement the resource owner password
credentials grant. Now, Part 2 describes how to implement the client
credentials grant.

Related:

Prioritize your security work with QRadar Risk Manager

In this four-part video tutorial, Jose Bravo discusses the technology
foundation for IBM Security QRadar Risk Manager and then demonstrates its key
capabilities in a series of live use case scenarios. You’ll learn how QRadar
Risk Manager can help you filter tens of thousands of discovered IT
vulnerabilities in your environment down to a manageable few based on the
severity of the vulnerability, the sensitivity of the machine, and available
attack paths.

Related:

Detect database vulnerabilities with Guardium and QRadar

IBM InfoSphere Guardium has a level of visibility into
databases for vulnerabilities that no application scanner can ever have
because it has deep access to the configuration and other information about
the database server. But how do you manage the vulnerabilities that it finds?
How do you prioritize and track the work? The answer is the IBM Security QRadar
SIEM
family of products.

Related:

Learn everything you need to know about XGS

XGS is a next-generation Intrusion Prevention System (IPS) that provides
intrusion prevention and security awareness and control of applications,
content, and users. This document details how to configure and showcase the
features of the IBM Security Network Protection (XGS) system for a deployment
or a Proof of Concept (PoC).

Related: