We use this product to protect our information. It provides the added feature of including some protective marking rules on the data. Security is the overall high-level objective for us using this solution. We are customers of IBM and I'm a tech lead.
Internet Security Specialist at National Bank of Pakistan
Real User
2022-08-11T11:33:54Z
Aug 11, 2022
Before IBM Guardium Data Protection, we didn't have any solution. We wanted to check our database activities, for example, admin activities, so with IBM Guardium Data Protection, we created some use cases and also wanted to check up on the use cases in our environment, so we deployed the solution. Right now, we have three or four use cases for IBM Guardium Data Protection: creation, table deletion, and making changes to the table, and we receive alerts when any of those activities happen.
Chief Information Security Officer at a financial services firm with 1,001-5,000 employees
Real User
Top 5
2022-05-06T10:32:49Z
May 6, 2022
We are using the data protection module to look after the PML queries of our Oracle admin accounts. I'm the chief information security officer at a financial institution.
Learn what your peers think about IBM Security Guardium Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
Information Security Engineering Consultant at Optum
Real User
2022-04-11T18:30:00Z
Apr 11, 2022
We mostly use Guardium as a data activity monitoring solution (DAM). We also use it to perform vulnerability assessment (VA) for data. We deployed Guardium on a private cloud. It isn't a hardware product. It's all virtual machines.
Security Engineering, Team Lead at Fidelity Bank Plc
Real User
Top 5
2022-03-23T00:41:12Z
Mar 23, 2022
IBM Guardium Data Protection is used not just for protecting data, but also for vulnerability protection. We use it to monitor our active users, activity, and databases, to look at the kind of commands users do on the databases. We also use the solution to restrict unauthorized users from accessing the databases. Apart from restricting unauthorized users from accessing these databases, we also need to have the stability to add the database, then switch to another database. We can also turn on the blocking feature of IBM Guardium Data Protection to ensure that some IPs are unable to connect to some databases.
Technical Manager at a computer software company with 51-200 employees
Real User
2022-01-04T21:03:08Z
Jan 4, 2022
We use IBM Guardium Data Protection mostly for data masking and firewalling. We restrict the administrators and other users from altering or deleting anything from the databases.
The primary use case for most of our customers is for monitoring and compliance. It's mostly deployed on-premises and it's a database activity monitoring solution.
Security Specialist at a tech services company with 51-200 employees
Real User
2021-10-02T07:20:45Z
Oct 2, 2021
We are using IBM Guardium Data Protection for activity monitoring, blocking users, entitlement for knowing the privilege for users, and Guardium data features.
Currently, my customer has 10 different types of databases for their various banking applications and they intend to deploy IBM Guardium Data Protection to secure their database activities. As soon as it is deployed, we're able to get some insights into what is going on with their databases, to help ensure the integrity of their data in the future. Two banks are also working on two opportunities with IBM Guardium right now. I believe this is a compliance requirement; nowadays, everyone has to buy database protection. In that case, technically, Oracle will get the added advantage here, because most of the banks are already using Oracle database.
One of my customers is a company that manages telecommunications in Mexico. It is a very important company, and they use Guardium for compliance purposes. They use it to comply with PCI, for example. We have on-premises and cloud deployments. We are currently deploying a customer's environment in Microsoft Azure with SQL Server.
Chief Information Security Officer at a financial services firm with 1,001-5,000 employees
Real User
Top 5
2020-07-28T06:50:18Z
Jul 28, 2020
We primarily use the solution for general access management. We use it for compliance and validation. If there's any change in the cable part, this solution will notify us.
Information Security Consultant at a tech services company with 51-200 employees
Reseller
2020-06-08T06:11:04Z
Jun 8, 2020
We are a solution provider and IBM Guardium is one of the database products that we implement for our clients. Our customers for Guardium are mostly banks and they use it for PCI compliance.
VP - Enterprise Security & Cloud Business at a tech vendor with 1,001-5,000 employees
Real User
2020-06-03T06:54:50Z
Jun 3, 2020
We deal with a range of customers and lately the issue of data privacy and user identity has become very important and many companies are now seriously evaluating tools like Guardium. Companies want to know who is accessing database applications and what they are doing. This product is geared towards medium and large size enterprise companies. We're partners of IBM and I'm a company Vice President.
The primary use case is for ensuring compliance with databases. It allows monitoring of what kind of statements and alterations are going on, as well as who is accessing what data.
Trusted Security Advisor at a tech services company with 501-1,000 employees
Real User
2019-06-04T07:43:00Z
Jun 4, 2019
This solution is for database security and protecting the core of the data. It allows us to put in controls to make sure that only the right persons access the proper records in the database. It prevents unauthorized access. For example, a customer may want to restrict the database so that it is accessible only from within a specific application. This means that the database administrator will not be able to access the data from outside of the application, as is normally allowed by their administrative rights. It can prevent the administrator from seeing or modifying any data for which they are not allowed to do so. It is also possible to set specific permissions, such as restrictions on the field, table, or record level of the database. Only people with explicit permissions can view or modify the data.
IBM Security Guardium Data Protection automatically discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data.
Deploy the solution to help discover regulated data in your data stores and use pre-built templates for regulations such as PCI, SOX, HIPAA, CCPA and many more, to streamline and automate compliance workflows.
We use this product to protect our information. It provides the added feature of including some protective marking rules on the data. Security is the overall high-level objective for us using this solution. We are customers of IBM and I'm a tech lead.
We are resellers of this solution and IBM partners. I'm a manager of security solutions.
Before IBM Guardium Data Protection, we didn't have any solution. We wanted to check our database activities, for example, admin activities, so with IBM Guardium Data Protection, we created some use cases and also wanted to check up on the use cases in our environment, so we deployed the solution. Right now, we have three or four use cases for IBM Guardium Data Protection: creation, table deletion, and making changes to the table, and we receive alerts when any of those activities happen.
We use Guardium for large and medium-sized clients in the banking sector for things like monitoring, protecting sensitive data, and logins.
I mainly use this solution to monitor the activity happening in the database.
We are using the data protection module to look after the PML queries of our Oracle admin accounts. I'm the chief information security officer at a financial institution.
We mostly use Guardium as a data activity monitoring solution (DAM). We also use it to perform vulnerability assessment (VA) for data. We deployed Guardium on a private cloud. It isn't a hardware product. It's all virtual machines.
IBM Guardium Data Protection is used not just for protecting data, but also for vulnerability protection. We use it to monitor our active users, activity, and databases, to look at the kind of commands users do on the databases. We also use the solution to restrict unauthorized users from accessing the databases. Apart from restricting unauthorized users from accessing these databases, we also need to have the stability to add the database, then switch to another database. We can also turn on the blocking feature of IBM Guardium Data Protection to ensure that some IPs are unable to connect to some databases.
We use IBM Guardium Data Protection mostly for data masking and firewalling. We restrict the administrators and other users from altering or deleting anything from the databases.
My primary use of this solution is for database activity monitoring.
Our primary use case for IBM Guardium Data Protection is audit logging. We monitor transactions and access particular tables in the database with it.
The primary use case for most of our customers is for monitoring and compliance. It's mostly deployed on-premises and it's a database activity monitoring solution.
We are using IBM Guardium Data Protection for activity monitoring, blocking users, entitlement for knowing the privilege for users, and Guardium data features.
We are using this solution for a PoC. IBM Guardium Data Protection is used to create policies, and rules for database access management.
Our primary use case of this product is for privileged database activity monitoring. We are customers of IBM and I'm the DBA.
Currently, my customer has 10 different types of databases for their various banking applications and they intend to deploy IBM Guardium Data Protection to secure their database activities. As soon as it is deployed, we're able to get some insights into what is going on with their databases, to help ensure the integrity of their data in the future. Two banks are also working on two opportunities with IBM Guardium right now. I believe this is a compliance requirement; nowadays, everyone has to buy database protection. In that case, technically, Oracle will get the added advantage here, because most of the banks are already using Oracle database.
One of my customers is a company that manages telecommunications in Mexico. It is a very important company, and they use Guardium for compliance purposes. They use it to comply with PCI, for example. We have on-premises and cloud deployments. We are currently deploying a customer's environment in Microsoft Azure with SQL Server.
We primarily use the solution for general access management. We use it for compliance and validation. If there's any change in the cable part, this solution will notify us.
We are a solution provider and IBM Guardium is one of the database products that we implement for our clients. Our customers for Guardium are mostly banks and they use it for PCI compliance.
We deal with a range of customers and lately the issue of data privacy and user identity has become very important and many companies are now seriously evaluating tools like Guardium. Companies want to know who is accessing database applications and what they are doing. This product is geared towards medium and large size enterprise companies. We're partners of IBM and I'm a company Vice President.
The primary use case is for ensuring compliance with databases. It allows monitoring of what kind of statements and alterations are going on, as well as who is accessing what data.
This solution is for database security and protecting the core of the data. It allows us to put in controls to make sure that only the right persons access the proper records in the database. It prevents unauthorized access. For example, a customer may want to restrict the database so that it is accessible only from within a specific application. This means that the database administrator will not be able to access the data from outside of the application, as is normally allowed by their administrative rights. It can prevent the administrator from seeing or modifying any data for which they are not allowed to do so. It is also possible to set specific permissions, such as restrictions on the field, table, or record level of the database. Only people with explicit permissions can view or modify the data.