Risk
11/30/2009
06:16 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

IBM Buys Database Security Company

By purchasing Guardium, IBM is strengthening its ability to sell to healthcare and financial companies.

IBM on Monday said that it has acquired Guardium, a computer security company focused on real-time database monitoring and protection for large companies.

The deal marks IBM's sixth acquisition and its second purchase of a security company this year. Financial terms were not disclosed.

IBM intends to use Guardium's database monitoring technology to help companies safeguard their internal data and to automate certain tasks required for regulatory compliance.

The software and services giant characterizes the acquisition as an extension of its business analytics strategy, which revolves around the company's Business Analytics and Optimization Consulting organization.

IBM plans to integrate Guardium into its Information Management Software portfolio.

"Organizations are grappling with government mandates, industry standards and business demands to ensure that their critical data is protected against internal and external threats," said Arvind Krishna, general manager of IBM Information Management practice in a statement. "This acquisition is another significant step in our abilities to help clients govern and monitor their data, and ultimately make their information more secure throughout its lifecycle."

Concerns about hackers and cybercrime play a role in the deal, but Gartner Research VP Avivah Litan says the Guardium acquisition has more to do with compliance than with security.

"The truth is compliance is what sells security," she said.

Litan expects that the Guardium deal will help IBM sell compliance solutions to healthcare and financial companies.

"It gives them software they they need to sell into those markets," she said.

Nonetheless, Litan praises the effectiveness of Guardium's technology, which can keep an eye on what database administrators are doing.

"It's very effective in certain situations," she said. "It excels at privilege-use monitoring."

InformationWeek has published an in-depth report on e-health and the federal stimulus package. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0640
Published: 2014-08-20
EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote authenticated users to bypass intended restrictions on resource access via unspecified vectors.

CVE-2014-0641
Published: 2014-08-20
Cross-site request forgery (CSRF) vulnerability in EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote attackers to hijack the authentication of arbitrary users.

CVE-2014-2505
Published: 2014-08-20
EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote attackers to trigger the download of arbitrary code, and consequently change the product's functionality, via unspecified vectors.

CVE-2014-2511
Published: 2014-08-20
Multiple cross-site scripting (XSS) vulnerabilities in EMC Documentum WebTop before 6.7 SP1 P28 and 6.7 SP2 before P14 allow remote attackers to inject arbitrary web script or HTML via the (1) startat or (2) entryId parameter.

CVE-2014-2515
Published: 2014-08-20
EMC Documentum D2 3.1 before P24, 3.1SP1 before P02, 4.0 before P11, 4.1 before P16, and 4.2 before P05 does not properly restrict tickets provided by D2GetAdminTicketMethod and D2RefreshCacheMethod, which allows remote authenticated users to gain privileges via a request for a superuser ticket.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.