M2090-728 - IBM Information Management Data Security & Privacy Sales Mastery v1
Go back to
The Infosphere Data Security and Privacy Solutions Value Proposition includes:
Ensure the integrity of Sensitive Data
Which is a benefit of using Guardium DAM instead of Database Logging?
Turning Database Logging on will cause a performance hit to the Database
An S-TAP is:
A software probe installed on the database server.
The customer needs to provide PCI compliance controls to encrypt the PCI PAN data inside of DB2, Oracle and SQL Server. Which product do you recommend to the customer?
Guardium Database Activity Monitoring
Home grown solutions are typically costly and ineffective when compared to Guardium Database Activity Monitor. The following are all reasons for this except:
High expertise to implement and maintain
Infosphere Guardium Data Encryption (GDE) addresses compliance at the files system level through?
Your customer does a lot of testing and development overseas. Which solution should you immediately recommend to him/her:
Optim Data Masking
Which of the following regulations does Guardium NOT help address?
Your customer tells you that they have already have a security solution and they do not need to buy another one. What do you tell them?
Other solutions are single purpose and don't scale with business growth or across databases, data types and computing models. They can't be managed centrally or build defense in depth.
Which of the following is qualifying question you should ask the first time you speak to a new prospect/client about IBM's Infosphere Privacy and Security Solutions?
Do you know where does your sensitive or privacy data reside across and outside the enterprise? If so, where?
When is data masking in the test environment NOT an important consideration?
Client does not have sensitive data
If the customer asks an IBM sales rep if Guardium supports the following items: "Dynamic Profiling", "User Rights Management", and "SCUBA", what is the most likely competitor is in the account?
The most compromised assets of an enterprise by percent of breaches for Web/application servers and Database Servers is small, but yet remain the most important to protect. Why is that?
These servers contain the clients most valuable information
These servers contain high volumes of structured data
What are the overall main business drivers for the Infosphere Security and Privacy Solutions?
Security, Privacy, and Compliance