Jefe De Continuidad Operacional at a insurance company with 501-1,000 employees
Real User
Top 20
2024-09-23T14:19:00Z
Sep 23, 2024
We have been using Guardium for data protection. In my company, we use it primarily to test the database for personal information protection. We also use it in conjunction with other data security measures.
We use it for monitoring database activity. This includes tracking databases such as MySQL, Oracle, and others. It monitors activities such as logins and logouts, capturing whether they were system or user logins. It also records the execution of scripts and the details of each script run. Additionally, it performs vulnerability assessments on databases and can enforce database lockdowns.
The first implementation of the solution in our company was carried out in 2011. The use cases for the solution may vary from customer to customer, but majorly the product is used for compliance and ensuring the privileged users are properly monitored and audited. For example, our company has used the tool for masking activities. The basic objective of the solution remains to ensure the ideal monitoring of service accounts and detect suspicious activities, which help our company block suspicious activities. In our organization, IBM Security Guardium Data Protection is used on a highly expensive server. The product implements real-time data monitoring.
database security We use it for security purposes, particularly because we have customers in financial sectors, banks, and other high profile industries.
Learn what your peers think about IBM Security Guardium Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
We use IBM Security Guardium Data Protection for real-time monitoring, data protection, recovery of sensitive objects, and vulnerable data scanning for databases.
Our customers include financial institutions like banks, insurance companies, and government entities that use IBM Security Guardium Data Protection for the protection and hardening of their databases.
We use this product to protect our information. It provides the added feature of including some protective marking rules on the data. Security is the overall high-level objective for us using this solution. We are customers of IBM and I'm a tech lead.
Internet Security Specialist at National Bank of Pakistan
Real User
2022-08-11T11:33:54Z
Aug 11, 2022
Before IBM Guardium Data Protection, we didn't have any solution. We wanted to check our database activities, for example, admin activities, so with IBM Guardium Data Protection, we created some use cases and also wanted to check up on the use cases in our environment, so we deployed the solution. Right now, we have three or four use cases for IBM Guardium Data Protection: creation, table deletion, and making changes to the table, and we receive alerts when any of those activities happen.
Chief Information Security Officer at a financial services firm with 1,001-5,000 employees
Real User
Top 10
2022-05-06T10:32:49Z
May 6, 2022
We are using the data protection module to look after the PML queries of our Oracle admin accounts. I'm the chief information security officer at a financial institution.
Information Security Engineering Consultant at Optum
Real User
2022-04-11T18:30:00Z
Apr 11, 2022
We mostly use Guardium as a data activity monitoring solution (DAM). We also use it to perform vulnerability assessment (VA) for data. We deployed Guardium on a private cloud. It isn't a hardware product. It's all virtual machines.
Security Engineering, Team Lead at Fidelity Bank Plc
Real User
Top 5
2022-03-23T00:41:12Z
Mar 23, 2022
IBM Guardium Data Protection is used not just for protecting data, but also for vulnerability protection. We use it to monitor our active users, activity, and databases, to look at the kind of commands users do on the databases. We also use the solution to restrict unauthorized users from accessing the databases. Apart from restricting unauthorized users from accessing these databases, we also need to have the stability to add the database, then switch to another database. We can also turn on the blocking feature of IBM Guardium Data Protection to ensure that some IPs are unable to connect to some databases.
Technical Manager at a computer software company with 51-200 employees
Real User
2022-01-04T21:03:08Z
Jan 4, 2022
We use IBM Guardium Data Protection mostly for data masking and firewalling. We restrict the administrators and other users from altering or deleting anything from the databases.
Sr. Network Specialist at a tech services company with 501-1,000 employees
MSP
2021-12-27T19:28:00Z
Dec 27, 2021
We are resellers of IBM. Most of the use cases of IBM Guardium are to monitor the database activity. The first is to identify any abnormal activities like trying to access the database or trying to create or delete any scheme on the tables.
The primary use case for most of our customers is for monitoring and compliance. It's mostly deployed on-premises and it's a database activity monitoring solution.
Security Specialist at a tech services company with 51-200 employees
Real User
2021-10-02T07:20:45Z
Oct 2, 2021
We are using IBM Guardium Data Protection for activity monitoring, blocking users, entitlement for knowing the privilege for users, and Guardium data features.
Currently, my customer has 10 different types of databases for their various banking applications and they intend to deploy IBM Guardium Data Protection to secure their database activities. As soon as it is deployed, we're able to get some insights into what is going on with their databases, to help ensure the integrity of their data in the future. Two banks are also working on two opportunities with IBM Guardium right now. I believe this is a compliance requirement; nowadays, everyone has to buy database protection. In that case, technically, Oracle will get the added advantage here, because most of the banks are already using Oracle database.
One of my customers is a company that manages telecommunications in Mexico. It is a very important company, and they use Guardium for compliance purposes. They use it to comply with PCI, for example. We have on-premises and cloud deployments. We are currently deploying a customer's environment in Microsoft Azure with SQL Server.
Chief Information Security Officer at a financial services firm with 1,001-5,000 employees
Real User
Top 10
2020-07-28T06:50:18Z
Jul 28, 2020
We primarily use the solution for database access management where they are using DML commands. We use it for compliance and validation. If there's any change in the record, this solution will notify us.
IBM Security Guardium Data Protection automatically discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data.
Deploy the solution to help discover regulated data in your data stores and use pre-built templates for regulations such as PCI, SOX, HIPAA, CCPA and many more, to streamline and automate compliance workflows.
We use IBM Security Guardium Data Protection to monitor our databases.
We have been using Guardium for data protection. In my company, we use it primarily to test the database for personal information protection. We also use it in conjunction with other data security measures.
We use it for monitoring database activity. This includes tracking databases such as MySQL, Oracle, and others. It monitors activities such as logins and logouts, capturing whether they were system or user logins. It also records the execution of scripts and the details of each script run. Additionally, it performs vulnerability assessments on databases and can enforce database lockdowns.
We use it for activity monitoring and vulnerability assessments.
The first implementation of the solution in our company was carried out in 2011. The use cases for the solution may vary from customer to customer, but majorly the product is used for compliance and ensuring the privileged users are properly monitored and audited. For example, our company has used the tool for masking activities. The basic objective of the solution remains to ensure the ideal monitoring of service accounts and detect suspicious activities, which help our company block suspicious activities. In our organization, IBM Security Guardium Data Protection is used on a highly expensive server. The product implements real-time data monitoring.
database security We use it for security purposes, particularly because we have customers in financial sectors, banks, and other high profile industries.
We use IBM Security Guardium Data Protection for real-time monitoring, data protection, recovery of sensitive objects, and vulnerable data scanning for databases.
Our customers include financial institutions like banks, insurance companies, and government entities that use IBM Security Guardium Data Protection for the protection and hardening of their databases.
I use it for the likelihood of incident response, intrusion prevention, intrusion detection, and malicious traffic.
Our primary use case is for managing and monitoring the database in real time.
We use this product to protect our information. It provides the added feature of including some protective marking rules on the data. Security is the overall high-level objective for us using this solution. We are customers of IBM and I'm a tech lead.
We are resellers of this solution and IBM partners. I'm a manager of security solutions.
Before IBM Guardium Data Protection, we didn't have any solution. We wanted to check our database activities, for example, admin activities, so with IBM Guardium Data Protection, we created some use cases and also wanted to check up on the use cases in our environment, so we deployed the solution. Right now, we have three or four use cases for IBM Guardium Data Protection: creation, table deletion, and making changes to the table, and we receive alerts when any of those activities happen.
We use Guardium for large and medium-sized clients in the banking sector for things like monitoring, protecting sensitive data, and logins.
I mainly use this solution to monitor the activity happening in the database.
We are using the data protection module to look after the PML queries of our Oracle admin accounts. I'm the chief information security officer at a financial institution.
We mostly use Guardium as a data activity monitoring solution (DAM). We also use it to perform vulnerability assessment (VA) for data. We deployed Guardium on a private cloud. It isn't a hardware product. It's all virtual machines.
IBM Guardium Data Protection is used not just for protecting data, but also for vulnerability protection. We use it to monitor our active users, activity, and databases, to look at the kind of commands users do on the databases. We also use the solution to restrict unauthorized users from accessing the databases. Apart from restricting unauthorized users from accessing these databases, we also need to have the stability to add the database, then switch to another database. We can also turn on the blocking feature of IBM Guardium Data Protection to ensure that some IPs are unable to connect to some databases.
We use IBM Guardium Data Protection mostly for data masking and firewalling. We restrict the administrators and other users from altering or deleting anything from the databases.
We are resellers of IBM. Most of the use cases of IBM Guardium are to monitor the database activity. The first is to identify any abnormal activities like trying to access the database or trying to create or delete any scheme on the tables.
My primary use of this solution is for database activity monitoring.
Our primary use case for IBM Guardium Data Protection is audit logging. We monitor transactions and access particular tables in the database with it.
The primary use case for most of our customers is for monitoring and compliance. It's mostly deployed on-premises and it's a database activity monitoring solution.
We are using IBM Guardium Data Protection for activity monitoring, blocking users, entitlement for knowing the privilege for users, and Guardium data features.
We are using this solution for a PoC. IBM Guardium Data Protection is used to create policies, and rules for database access management.
Our primary use case of this product is for privileged database activity monitoring. We are customers of IBM and I'm the DBA.
We will primarily use the solution for protecting our database. We're still implementing the product. It's not fully in place just yet.
Currently, my customer has 10 different types of databases for their various banking applications and they intend to deploy IBM Guardium Data Protection to secure their database activities. As soon as it is deployed, we're able to get some insights into what is going on with their databases, to help ensure the integrity of their data in the future. Two banks are also working on two opportunities with IBM Guardium right now. I believe this is a compliance requirement; nowadays, everyone has to buy database protection. In that case, technically, Oracle will get the added advantage here, because most of the banks are already using Oracle database.
One of my customers is a company that manages telecommunications in Mexico. It is a very important company, and they use Guardium for compliance purposes. They use it to comply with PCI, for example. We have on-premises and cloud deployments. We are currently deploying a customer's environment in Microsoft Azure with SQL Server.
We primarily use the solution for database access management where they are using DML commands. We use it for compliance and validation. If there's any change in the record, this solution will notify us.