Aside from mainframe support, Guardium is a perfect complement to analytics, identity management, and security According to reports, IBM paid a good chunk of change for Guardium, a provider of database monitoring solutions. Why did IBM make this acquisition? I agree with many others that mainframe visibility was important but I don’t think this closed the deal. Rather, Guardium complements IBM’s efforts in:1. Business analytics. With DB2, Informix, and Cognos, IBM has a lot of infrastructure for business intelligence but Guardium extends its solution offering. How? By monitoring the types of queries users conduct over disparate databases and BI systems. Armed with this information, IBM can help its customers expand their analysis and gain more business value from the data.2. Governance, Risk, and Compliance. The wholly grail here is a GRC architecture for monitoring and policy enforcement. Once again, IBM’s acquisition of Guardium strengthens the overall portfolio.3. Identity management. IBM is a real leader here but the next challenge is Entitlement Management. Guardium could be added to this mix for role-based access control, monitoring, and reporting. 4. Data security. IBM wants to offer services, best practices, and tools for data security — an extremely messy area that needs enterprise attention. Guardium fits here as well.Does it matter that Cisco was a strategic investor in Guardium? In a word, no. Cisco threw some dough at Guardium back in its mid-2000s ga-ga over application networking and “climbing the stack.” Like many Cisco initiatives, this was short-lived so I’m sure Cisco is giddy about getting an ROI on its database security detour.All-in-all, IBM gets a market leader that fits nicely in a number of areas. I met some folks from Imperva today who were pretty happy about this acquisition and its ramifications. I’ve got to believe that Application Security, Inc., another market leader, is also anticipating a happy holiday season. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe