Being an IBM product it really offers security integration capabilities and robust features. Over the years, it has satisfactory met the requirements of our customers which makes it a very reliable and versatile solution.
Learn what your peers think about IBM Security Guardium Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
Internet Security Specialist at National Bank of Pakistan
Real User
2022-08-11T11:33:54Z
Aug 11, 2022
What I like about IBM Guardium Data Protection is that some of its features were deployed by collectors during the installation phase. The solution has collector and aggregator features, license installation, and even server patches that you won't find in other security providers. I like the collector-aggregator capabilities of IBM Guardium Data Protection where you install each component on separate servers, then on the aggregator, you collect all the logs on a central server or central console.
Information Security Engineering Consultant at Optum
Real User
2022-04-11T18:30:00Z
Apr 11, 2022
I rate Guardium 10 out of 10 for data activity monitoring and nine for vulnerability assessment. It's easy to implement and does its job. But I would rate it seven out of 10 in terms of advanced features.
Technical Manager at a computer software company with 51-200 employees
Real User
2022-01-04T21:03:08Z
Jan 4, 2022
There are different modules but the most valuable ones are firewalling and masking. Additionally, the auditing of the entire database is helpful, which includes all the activity of the database users and administrators. We can monitor everything and log as well.
The most valuable features have been how easy it is to deploy and use, as well as the comprehensive monitoring options. These are a few things that customers like most about this product.
IBM Security Guardium Data Protection automatically discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data.
Deploy the solution to help discover regulated data in your data stores and use pre-built templates for regulations such as PCI, SOX, HIPAA, CCPA and many more, to streamline and automate compliance workflows.
The features I like are the robust policies, which allow us to create customized monitoring based on specific activities.
Being an IBM product it really offers security integration capabilities and robust features. Over the years, it has satisfactory met the requirements of our customers which makes it a very reliable and versatile solution.
It protects sensitive data and blocks unauthorized access to the data.
The most valuable feature of the solution for the customers is the monitoring and full log of the database activity of privileged users.
I like the reporting mechanism. It's very good.
The most valuable feature I have found is the performance of client monitoring. The other competitors are unable to do this.
It sends out an immediate alert when there's suspicious activity.
Good data encryption and data masking features.
What I like about IBM Guardium Data Protection is that some of its features were deployed by collectors during the installation phase. The solution has collector and aggregator features, license installation, and even server patches that you won't find in other security providers. I like the collector-aggregator capabilities of IBM Guardium Data Protection where you install each component on separate servers, then on the aggregator, you collect all the logs on a central server or central console.
Guardium lets you centrally manage aggregators and collectors.
The reporting side is also very, very good, especially its flexibility which allows you to tailor the reports to whatever information you want.
The vulnerability assessment is a valuable feature.
I rate Guardium 10 out of 10 for data activity monitoring and nine for vulnerability assessment. It's easy to implement and does its job. But I would rate it seven out of 10 in terms of advanced features.
Easy to set up data activity monitoring solution that provides competent technical support. Scalable, stable, and has good performance.
There are different modules but the most valuable ones are firewalling and masking. Additionally, the auditing of the entire database is helpful, which includes all the activity of the database users and administrators. We can monitor everything and log as well.
The purpose of EBM Guardium is to monitor database activity and who is accessing it. This is the most valuable feature.
The most valuable features of this product are activity monitoring on the database servers, discovery capabilities, and vulnerability scanning.
I think IMB's technical support is good.
The most valuable features have been how easy it is to deploy and use, as well as the comprehensive monitoring options. These are a few things that customers like most about this product.
The solution supports a lot of databases.
Setting up Guardium was easy and straightforward.
IBM Guardium Data Protection is very good at keeping your database secure.
Has a great Big Data Intelligence feature.
The product has proven to be flexible
IBM Guardium Data Protection has better integration options than most of the leading competitors on the market, and the price is always better.
One of the most valuable features is the accelerator. It has a predefined report for PCI SOX compliance and other compliances.
he solution offers trouble-free access.