CTA\Owner at a tech services company with 11-50 employees
Real User
2022-08-24T21:06:59Z
Aug 24, 2022
We are a full security base integration and application business. We help with implementation and deployments. I used Guardium to help with a cloud migration to check and do some validation for a client's data landscape and services so that they made sure that they were all secure in overall posture and all the way throughout their data security life cycle. I helped with automating some of their other services, which provided another way of providing a more fundamental catalog discovery type of scenario. I also helped with using some activity monitoring for their on-premises and cloud data sources.
We are service providers, we don't use it internally. Where it is mostly being used is for enterprise clients, because they need to comply with all of the requirements, they need increased security and visibility. It's popular with enterprise clients who are more mature in their security implementations.
Vulnerability Management (VM) is a critical cybersecurity process focused on identifying, evaluating, and mitigating vulnerabilities in IT systems. It helps organizations protect their networks and assets by proactively managing security weaknesses before they can be exploited by threats.
We are a full security base integration and application business. We help with implementation and deployments. I used Guardium to help with a cloud migration to check and do some validation for a client's data landscape and services so that they made sure that they were all secure in overall posture and all the way throughout their data security life cycle. I helped with automating some of their other services, which provided another way of providing a more fundamental catalog discovery type of scenario. I also helped with using some activity monitoring for their on-premises and cloud data sources.
We are a solution provider and this is one of the systems that I deploy for our customers. It is used to test systems for security vulnerabilities.
We are service providers, we don't use it internally. Where it is mostly being used is for enterprise clients, because they need to comply with all of the requirements, they need increased security and visibility. It's popular with enterprise clients who are more mature in their security implementations.