Internet Security Specialist at National Bank of Pakistan
Aug 11, 2022
What I like about IBM Guardium Data Protection is that some of its features were deployed by collectors during the installation phase. The solution has collector and aggregator features, license installation, and even server patches that you won't find in other security providers. I like the collector-aggregator capabilities of IBM Guardium Data Protection where you install each component on separate servers, then on the aggregator, you collect all the logs on a central server or central console.
Learn what your peers think about IBM Security Guardium Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Our main focus for IBM Guardium is to support security initiatives and compliance policies within our organization. We use the DPD product for monitoring, especially for GDPR, SOX regulations and, of course, the vulnerability assessment that we use to make sure we're keeping up with our patches, making sure things are configured, making sure we're following the best practices.
Application Architect at a healthcare company with 1,001-5,000 employees
Mar 20, 2018
It's allowing us to be more proactive than reactive on alerts and access rights and types of resources that are being hit. Before, there were a lot of different solutions, but this expanded that out and made it a more holistic solution. It provides centralization of monitoring, instead of multiple, disparate applications. It definitely allows more economies of scale, streamlining, less fragmented use.
Assistant Vice President at National Bank of Pakistan
Jun 26, 2024
Guardium is easily integrated with other IBM solutions, a significant advantage and a key reason we chose Guardium. Both platforms share the IBM infrastructure, enhancing compatibility and integration. Additionally, Guardium offers a vulnerability analyzer, which is another compelling feature of the platform.
Information Security Analyst at a tech services company with 501-1,000 employees
Mar 28, 2018
The most valuable feature is using the capture operation mode “S-TAP/K-TAP agent”, because all activities in the database are captured, including direct access to the database server by privileged users. This is useful because, even if the database server logs were deleted, the Guardium Collector has already stored such data to enable traceability of access.
Trusted Security Advisor at a tech services company with 501-1,000 employees
Jun 4, 2019
The biggest complaint that I hear from customers and users is that using this solution requires database skills, yet it is a security and monitoring tool.
Internet Security Specialist at National Bank of Pakistan
Aug 11, 2022
Right now, we're in the development phase for IBM Guardium Data Protection, so I don't have any recommendations about additional features and room for improvement in the solution. We're very excited to work on IBM Guardium Data Protection because we are new to the solution, and we're still exploring product features. We're very excited about integrations and use case creation, and it's only after six to eight months that I'll be able to share my recommendations in terms of additional features the solution should have.
We did find some difficulty in deploying IBM Guardium Data Protection here in Pakistan because of the lack of resources.
Learn what your peers think about IBM Security Guardium Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
I'd like to see a smoother GUI interface for the CAS agent - CAS does configurations on the database - to interface better with the vulnerability assessments.
Guardium Data Protection is far better in terms of external integration. But in terms of firewall features, like when you're blocking activities, it's as if Oracle AVDF simply has superior features. This is just from third-party observations, but the users of Oracle AVDF are saying that when it comes to the firewall and protection functionality, they're much more inclined to AVDF.
IT Security Manager at a healthcare company with 10,001+ employees
Mar 21, 2018
One of the limitations that everyone who uses Guardium knows is its ability for back-end reporting. The ability to collect it sometimes is easier than the ability to retrieve it, use it, or give a good representation of it for incidence response or questions which come from the different people who want to use the data.