Redshift Connector

HOME: SOLUTIONS: RedShift Connector

The Redshift Connector allows Guardium to monitor Amazon Redshift databases in a similar way that it monitors other databases by detecting data leaks from databases, helping to ensure the integrity of information in the data center and automating compliance controls.


Now, Guardium can ensure the integrity of information and automation of compliance controls across heterogeneous environments including Amazon Redshift.


The RedShift Connector Guardium Architecture Monitors:

  • Client IP
  • Username
  • SQL Statement Executed (including its objects/verbs)
  • The RedShift Server/Database accessed
  • Other items such as Client PID, Transaction ID, Authentication Method

Key Features of the Redshift Connector:

  • Automatically retrieve Redshift audit logs from S3, translate them into the Guardium Universal Feed and send them to a collector
  • Use normal Guardium policies to send alerts, log policy violations or send traffic to SYSLOG
  • Failover support
  • Audit stream encryption via TLS
  • Parsing to expose and correlate Redshift Client IPs, allowing for policies based on sensitive object and specific SQL Commands (Object/Command parsing)
  • Adjustable throttling to allow for stream tuning to prevent collector overload

Get to know the RedShift Connector.


Take a look at the architecture – audit log processing to understand how the RedShift Connector works, capabilities and limitations. Download our RedShift Connector Alternative Architecture Guide.


Redshift Audit
Viewing Redshift audit data sent by the Redshift Connector in Guardium.

Contact us with any questions.


Services Snapshot

    Enterprise Data Security
  • Privileged User and Sensitive Data Monitoring
  • Data Encryption
  • Data Masking
  • Health Checks
  • Guardium Activity Monitoring
  • Guardium Data Encryption
  • Managed Services
  • Guardium Database Activity Monitoring
  • Guardium Data Encryption
  • IBM Authorized Training
  • IBM Security Guardium
  • InfoSphere Optim