TrustRadius: an HG Insights company

IBM Guardium

Score8.7 out of 10

103 Reviews and Ratings

What is IBM Guardium?

IBM Guardium is IBM's data security posture management solution, that aims to offer organizations comprehensive visibility, actionable insights and real-time controls to help users comply with regulations, preserve privacy and secure sensitive data no matter where it is stored.

Media

the IBM Guardium Data Protection dashboard showing all the features. One click can take you to databases or to data analytics.
IBM Guardium Data Protection: The S-TAP and GIM Dashboard gives real-time visibility into the health and performance of S-TAPs. It is used to track the status of different S-TAP versions, see database activity across inspection engines, and view detailed insights by operating system.
IBM Guardium DSPM: Discovery, Classification & Threat Monitoring - Automate cloud data security with discovery, classification, and continuous threat monitoring. This offers a unified view of sensitive data across cloud workloads (AWS, Azure, GCP) and SaaS (SharePoint, OneDrive, Slack, Google Drive, Jira, Confluence and more), understand its risk level, and ensure ongoing protection and compliance.
IBM Guardium DSPM: Discovery, Classification & Threat Monitoring - Automate cloud data security with discovery, classification, and continuous threat monitoring. This offers a unified view of sensitive data across cloud workloads (AWS, Azure, GCP) and SaaS (SharePoint, OneDrive, Slack, Google Drive, Jira, Confluence and more), understand its risk level, and ensure ongoing protection and compliance.
IBM Guardium DSPM: Discovery, Classification & Threat Monitoring - Automate cloud data security with discovery, classification, and continuous threat monitoring. This offers a unified view of sensitive data across cloud workloads (AWS, Azure, GCP) and SaaS (SharePoint, OneDrive, Slack, Google Drive, Jira, Confluence and more), understand its risk level, and ensure ongoing protection and compliance.

1 / 5

IBM Guardium Review

Use Cases and Deployment Scope

We use IBM Guardium for both Data monitoring and for Vulnerability assessments. We started with a small scope of applications and have now made IBM Guardium a standard requirement for all [...] managed DB's. It is working great and is fullying integrated with our SIEM and Service Now for ticket creation and investigations.

Pros

  • identifies failed logins
  • Possible app issue
  • monitors access to data
  • identifies possible issues with CSS

Cons

  • patching - ease of the process
  • consistent labels in the GUI
  • memory management in the appliances

Return on Investment

  • allows us to monitor critical data
  • Data protection is critical in banking - IBM Guardium allows us to better protect it.
  • Still too soon in our deployment process to determine the actual business impact.

SBM-SME-Review.

Use Cases and Deployment Scope

IBM Security Guardium is an excellent product for securing critical environments. I also appreciate the IBM GKLM, which's amazing, especially with the new version 5 that adds numerous new devices. Thanks for enhancing.

Pros

  • We use it for our SQL database.

Cons

  • Please add new databases.

Return on Investment

  • Yes, it satisfies security compliance.

Alternatives Considered

IBM Storage Protect and IBM Storage Fusion

Other Software Used

IBM Storage Protect, IBM SAN24B-4, IBM Storage FlashSystem, IBM Storage Protect Plus, IBM Power

Best Ever

Use Cases and Deployment Scope

We use IBM Guarduim in all of our Data centers

Pros

  • it protect sensitive data count different environments
  • it works very well

Cons

  • work well
  • Great with fileystsmes

Return on Investment

  • filesystem
  • security
  • data center

Thanks

Use Cases and Deployment Scope

monitoring an analytics data for a client on finance sector, and goverment

Pros

  • secure
  • analitic
  • fast

Cons

  • on a bank
  • government
  • state

Return on Investment

  • lost data
  • data broke

Alternatives Considered

IBM Spectrum Control

Other Software Used

Red Hat Ansible Automation Platform, Apache ActiveMQ, IBM AIX

Experience

Use Cases and Deployment Scope

we analyze this solution to protect our asset, because the tool that we use didn't get enaoght information about any issue

Pros

  • AI
  • easy to use
  • good report

Cons

  • information about product issues are hard to find

Return on Investment

  • positive impact regarding protect data
  • good to improved compliance requirements

Alternatives Considered

Perforce Delphix

Other Software Used

IBM Informix, BeyondTrust Network Security Scanner, powered by Retina (Legacy)