We use it for activity monitoring and vulnerability assessments.
Security Engineering, Team Lead at Fidelity Bank Plc
Offers dynamic encryption and masking functionality but lack good support
Pros and Cons
- "The features I like are the robust policies, which allow us to create customized monitoring based on specific activities."
- "The main issue I have with IBM Security Guardium Data Protection is the support. It's not good."
What is our primary use case?
What is most valuable?
The features I like are the robust policies, which allow us to create customized monitoring based on specific activities.
Also, the dynamic encryption and masking functionality is interesting. And the vulnerability assessment feature is comprehensive; we can scan for specific vulnerabilities.
What needs improvement?
The main issue I have with IBM Security Guardium Data Protection is the support. It's not good. They're slow, and they don't seem to resolve issues effectively. We have an ongoing problem that they haven't been able to fix.
We had an issue with the setup that we've been trying to resolve. The reports are not coming out the way I want them to.
I'm not enjoying the support. They don't always resolve issues, and sometimes logged cases seem to disappear. The support is not good for me. They should resolve issues as they're escalated.
For how long have I used the solution?
Buyer's Guide
IBM Security Guardium Data Protection
October 2024
Learn what your peers think about IBM Security Guardium Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
814,763 professionals have used our research since 2012.
What do I think about the stability of the solution?
It's stable. However, it does require a lot of resources.
I would rate the stability a six out of ten.
How was the initial setup?
The solution itself is straightforward. The implementation was fine.
We set up the central manager, the archive, agents on the database servers, and S-TAPs on the collectors. Then, we configured policies and reports.
What other advice do I have?
I would recommend using it. It is good for database protection.
The product itself is good, but the support is lacking. I'd rate it a seven out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: May 9, 2024
Flag as inappropriateManager - Security Solutions at Mannai
Very good data encryption feature and data masking functions
Pros and Cons
- "Good data encryption and data masking features."
- "The deployment is complex and requires expertise to deploy."
What is our primary use case?
We are resellers of this solution and IBM partners. I'm a manager of security solutions.
What is most valuable?
Data encryption is a good feature and I also like the data masking functions. This is a technically strong solution.
What needs improvement?
The only downside is that the deployment is complex and requires special expertise to deploy.
For how long have I used the solution?
We've been using this solution for seven years.
What do I think about the stability of the solution?
In terms of stability, this is one of the top solutions. Our customers are happy with it.
What do I think about the scalability of the solution?
The solution is scalable; scalability depends on the number of databases more than number of users. Accounts can be expanded without any impact on performance.
How are customer service and support?
IBM do a good job in terms of technical support.
How would you rate customer service and support?
Positive
How was the initial setup?
The deployment requires trained people because it's complex. It's better to go with the vendor for implementation because they are specialized.
What other advice do I have?
I recommend this solution and rate it nine out of 10.
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Buyer's Guide
IBM Security Guardium Data Protection
October 2024
Learn what your peers think about IBM Security Guardium Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
814,763 professionals have used our research since 2012.
Cyber Security Analyst at a financial services firm with 5,001-10,000 employees
Efficient data monitoring with powerful visualization capabilities and good support
Pros and Cons
- "The most valuable feature is the visualization of data and the ability to monitor our databases."
- "We deal with updates manually on Sundays and sometimes face bugs with the newer versions."
What is our primary use case?
We use IBM Security Guardium Data Protection to monitor our databases.
How has it helped my organization?
It helps us with the visualization of the data and to monitor our databases. We also use it to send the logs to QRadar. For our organization, it has been very helpful in locating and discovering sensitive information in the databases. This function is vital for us.
What is most valuable?
The most valuable feature is the visualization of data and the ability to monitor our databases. We regularly use it to send logs to QRadar, which is also a significant benefit.
What needs improvement?
One aspect that could be improved is the support for locating and discovering sensitive information in the databases. We also deal with updates manually on Sundays, and sometimes face bugs with the newer versions.
For how long have I used the solution?
I have more than one year of experience with IBM Security Guardium Data Protection.
What do I think about the scalability of the solution?
The scalability is good, although sometimes we need to create new aggregators because the log files on the database become too big. However, we have handled it easily since we have done it numerous times.
How are customer service and support?
The support from IBM is pretty good. We are a big client, and we receive excellent support from them. I would rate it a ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Here, we use IBM Security Guardium Data Protection for some databases and audit tools from Oracle for others. The switch to Guardium was likely due to commercial reasons and security considerations.
How was the initial setup?
The initial setup was straightforward. It involves setting up the aggregator and the agents on the databases. In a big environment, it doesn't take too long.
What about the implementation team?
Three cybersecurity analysts maintain the solution, including myself. When the environment was created three years ago, I was not involved, but the deployment now is manageable with three people.
What was our ROI?
The return on investment is good for us. We use it almost every month due to our auditing needs, and it has helped us significantly.
What's my experience with pricing, setup cost, and licensing?
I can't provide details on the pricing because I don't deal with the billing. We have a big package with QRadar, Guardium, and other tools.
What other advice do I have?
I would recommend IBM Security Guardium Data Protection because it is a very good product.
I'd rate the solution eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Sep 29, 2024
Flag as inappropriateJefe De Continuidad Operacional at a insurance company with 501-1,000 employees
Efficient data discovery with comprehensive features and an easy setup
Pros and Cons
- "We appreciate its ease of implementation and the local support available for the product."
- "Guardium could be improved in the area of data encryption."
What is our primary use case?
We have been using Guardium for data protection. In my company, we use it primarily to test the database for personal information protection. We also use it in conjunction with other data security measures.
How has it helped my organization?
We have seen benefits from using Guardium, including its ease of implementation and local support in our region. Many of our clients who previously used Imperva found it difficult to implement, and they have switched to Guardium.
What is most valuable?
The most valuable features of Guardium are its ability to discover data more efficiently compared to competitors and its comprehensive platform with many features. We appreciate its ease of implementation and the local support available for the product.
What needs improvement?
Guardium could be improved in the area of data encryption. We have encountered difficulties with encryption using IBM's platform, especially in comparison to alternative solutions.
For how long have I used the solution?
I have had experience with Guardium for maybe two years.
What do I think about the stability of the solution?
We have found Guardium to be very stable.
What do I think about the scalability of the solution?
The scalability of Guardium is very good, and the newer versions have shown significant improvements.
How are customer service and support?
We have worked with IBM support for other products like IBM AI, and it has been very satisfactory with high-quality support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used Imperva. Our clients and we found it difficult to implement and continue using the solution.
How was the initial setup?
The initial setup of Guardium was easy, and we found the implementation process straightforward.
What about the implementation team?
I did not help deploy Guardium directly, but it was part of a project aiming to enhance data protection.
What was our ROI?
The return on investment is beneficial as we have one platform with many features, providing solutions to multiple problems for us.
What's my experience with pricing, setup cost, and licensing?
The pricing of Guardium is similar to Imperva and includes licensing costs. Overall, it is considered reasonably priced for its capabilities.
Which other solutions did I evaluate?
We evaluated Imperva. The main differences we found were in the implementation experience and the support from the vendor. We found Guardium easier to implement and better supported.
What other advice do I have?
We highly recommend Guardium for its application and data protection capabilities, especially with its strong local support.
I'd rate the solution nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: Sep 25, 2024
Flag as inappropriateHead Management GRC and Privacy Solution at a tech consulting company with 11-50 employees
Offers security integration capabilities and robust features
Pros and Cons
- "Being an IBM product it really offers security integration capabilities and robust features. Over the years, it has satisfactory met the requirements of our customers which makes it a very reliable and versatile solution."
- "Since we are resellers we do not have enough information about the technical aspects and the areas of improvement. However, one consistent report that we receive from our customers is that IBM does not offer timely support due to the size of the organisation. It would be great if they could improve their response time."
What is our primary use case?
database security
We use it for security purposes, particularly because we have customers in financial sectors, banks, and other high profile industries.
What is most valuable?
The risk spotter which helps to get insight into user activities
The monitoring of Heterogeneous DBs
Entitlement Reports which helps to gain insight on user creation and privilege escalation.
Being an IBM product it offers data security capabilities with robust features. Over the years, it has satisfactorily met the requirements of our customers which makes it a very reliable and versatile solution.
What needs improvement?
Since we are resellers we do not have enough information about the technical aspects and the areas of improvement. However, one consistent report that we receive from our customers is that IBM does not offer timely support due to the size of the organisation. It would be great if they could improve their response time.
For how long have I used the solution?
ActivEdge has been reselling IBM Security Guardium Data Protection for the past five years.
What do I think about the stability of the solution?
In terms of stability, it is also stable and there is no bugs and glitches that we have faced complaints about
On a scale of 10 I will rate it 8 as there are some issues that usually arise during deployment but are usually fixed by patch updates.
What do I think about the scalability of the solution?
The product is very scalable and we deal with majorly enterprise client. Therefore we have to make sure that the product is scalable.
How was the initial setup?
The process of installation and management of the solution is very easy. You can ask for IBM's expertise, since they have been using this for years. The implementation does not really need more than three months under normal conditions.
What's my experience with pricing, setup cost, and licensing?
IBM solutions have fair price strategy, and operates on a yearly basis. If it's a SaaS solution, then you can opt for yearly basis.
What other advice do I have?
While working with the solution, you have to be clear about your requirements. The solution offers different pricing based on different functionalities. If you are able to identify your requirements properly, you are going to do well with the price and get the best out of the product. So understanding the requirements is very important. I would rate this product 8 out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Chief Information Security Officer at a financial services firm with 1,001-5,000 employees
Resource-hungry requiring a huge amount of storage capacity; good vulnerability assessment feature
Pros and Cons
- "The vulnerability assessment is a valuable feature."
- "The backup and recovery is very resource-hungry and requires a huge amount of storage capacity."
What is our primary use case?
We are using the data protection module to look after the PML queries of our Oracle admin accounts. I'm the chief information security officer at a financial institution.
What is most valuable?
The vulnerability assessment is a valuable feature for us.
What needs improvement?
I've found that the backup and recovery is very resource-hungry and requires a huge amount of available storage capacity along with other components, such as processing the RAM. We have a need for 200 GB of data to restore. Reporting needs to be improved as does integration capability with the other DBs. From a technical perspective, reporting is good but not from the management perspective. Due to the legacy application, there is sometimes another version of the DB that is not supported and requires a restart which is a very technical aspect of running applications.
For how long have I used the solution?
I've been using this solution for 18 months.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
The solution is scalable
How are customer service and support?
The support is not as good as it should be, and when it comes to backup or restoration activity, they can take months to respond.
How was the initial setup?
The deployment is not complex and we currently have four users of this product.
What's my experience with pricing, setup cost, and licensing?
Licensing costs are higher than other solutions on the market. It's part of our concern and one of the reasons we are discontinuing the use of this solution.
What other advice do I have?
I don't feel that our local partners are fully equipped with the technical knowledge of the product. Whenever we need support that requires technical expertise, we go to the IBM support portal. As a result, we experience time delays in terms of support and it would be helpful if the local partner improved their knowledge. The other option would be for IBM to provide some management training for the on-prem engineers.
I rate the solution five out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Advisory Consultant - Cyber Security Practice at a consultancy with 10,001+ employees
The Data Activity Monitor covers data warehouses and file shares. It helped control excessive administrator rights to databases.
What is most valuable?
It’s available as a hardware appliance as well as software. This provides flexibility as to how you want to deploy the tool.
It can automatically locate DBs, as well as discover and classify sensitive data.
Data Activity Monitor covers what appears to be every DB imaginable, even data warehouses and file shares.
It allows administrators to enforce trigger alerts built around predefined policies, so that any access to sensitive data can be tracked and blocked if necessary.
How has it helped my organization?
It helped control excessive administrator rights to databases and automated the compliance auditing process.
It located/discovered unknown databases and the sensitive data that existed in those databases.
What needs improvement?
There was a slight performance tax on the system and load balancing could be better. We would also like more robust reporting.
For how long have I used the solution?
I have used Guardium for six months.
What do I think about the stability of the solution?
Once it was installed and implemented, it seemed to be a very stable product.
What do I think about the scalability of the solution?
This is definitely a scalable product. You can build out a basic stand-alone architecture with one collector all the way to enterprise wide architecture that covers multiple datacenters and continents.
How are customer service and technical support?
I never interacted with tech support.
Which solution did I use previously and why did I switch?
No previous or different solution was used.
How was the initial setup?
If I remember correctly, the setup was a bit complex; not so much the installation, but a lot of tweaking and tuning of policies, setting up traffic filters, whitelisting the traffic, and so on.
What's my experience with pricing, setup cost, and licensing?
I was not privy to this information.
Which other solutions did I evaluate?
I wasn’t part of the evaluation for the tool.
What other advice do I have?
Try to have a dedicated team. There are a lot of moving parts and you need take a hands-on approach. It doesn’t come configured out of the box.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Sr. Network Specialist at a tech services company with 501-1,000 employees
A mature product that identifies abnormal activity on the database
Pros and Cons
- "The purpose of EBM Guardium is to monitor database activity and who is accessing it. This is the most valuable feature."
- "IBM Guardium Data Protection is a mature product. There is a lot of encryption that is not owned by IBM and is done by a third party and is not an integral part of the solution."
What is our primary use case?
We are resellers of IBM. Most of the use cases of IBM Guardium are to monitor the database activity. The first is to identify any abnormal activities like trying to access the database or trying to create or delete any scheme on the tables.
What is most valuable?
The purpose of EBM Guardium is to monitor database activity and who is accessing it. This is the most valuable feature.
We have privileged users, like the DBAs, who are most often the ones accessing the database. We also have web services and application services that talk to the database. With IBM Guardium Data Protection we can see who the previous users were and what web or server actually connected to the data business.
Secondly, any changes done by the DBAs are recorded so we know that the DB has changed in the data structure, scheme, or creation of a table or drop of a table.
What needs improvement?
IBM Guardium Data Protection is a mature product. There is a lot of encryption that is not owned by IBM and is done by a third party and is not an integral part of the solution.
What do I think about the stability of the solution?
This solution is stable, I don't believe there is another product that is more stable.
What do I think about the scalability of the solution?
The solution is part of IP so you can scale it.
How are customer service and support?
IBM Guardium Data Protection has one of the best supports out there.
How was the initial setup?
The initial setup of IBM Guardium is straightforward. The deployment depends on the organization and types of servers. The only delay is when there are critical data servers that require a planned approach.
You can deploy the solution by pushing it through a central aggregator or a collector.
What about the implementation team?
We engage a consult to deploy the solution because it is not only installing the solution but also doing a report.
The installation requires the involvement of a DBA, but it depends on the number of databases.
What's my experience with pricing, setup cost, and licensing?
The licensing is much easier now. It's for IP, it is not part It's not part number of databases of schema, it's for the IP so it's much simpler now.
What other advice do I have?
If you are considering IBM Guardian Data Protection you should be aware of your environment. For example, if you are in the banking sector you need to plan very well so it can be scaled accordingly.
It is important to hire a consultant when installing this solution. They can provide an analysis of what exactly needs to be done. Keep in mind that this is a data access management database, it's not only about data but also about files.
I rate this solution a 9 out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free IBM Security Guardium Data Protection Report and get advice and tips from experienced pros
sharing their opinions.
Updated: October 2024
Product Categories
Database SecurityPopular Comparisons
Informatica Intelligent Data Management Cloud (IDMC)
Imperva SecureSphere Database Security
Oracle Audit Vault
Protegrity Data Security
Voltage SecureData Enterprise
Oracle Advanced Security
Trustwave DbProtect
DataSunrise Database Security
Vormetric Application Crypto Suite
IBM InfoSphere Optim Data Privacy
BMC Compuware Topaz Enterprise Data
Buyer's Guide
Download our free IBM Security Guardium Data Protection Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- IBM Guardium vs Imperva SecureSphere Database Security
- IBM Guardium Data Protection vs. Vormetric Application Crypto Suite for a tech services company
- How does IBM Guardium Data Protection compare with Imperva SecureSphere Database Security?
- What are the differences between IBM Guardium and Imperva?
- When evaluating Database Security, what aspect do you think is the most important to look for?
- IBM Guardium vs Imperva SecureSphere Database Security
- What is the difference between "data protection in transit" vs "data protection at rest"?
- Audit Vault vs. InfoSphere Guardium?
- Database security tools comparison report?
- Why is Database Security important for companies?