Overview
What is IBM Security Guardium?
IBM Security Guardium is IBM's data security posture management solution, that aims to offer organizations comprehensive visibility, actionable insights and real-time controls to help users comply with regulations, preserve privacy and secure your sensitive data — no matter where it…
Protecting sensitive research data in a variety of settings is the goal of this suite of products.
IBM Security Guardium review
review of IBM Guardium
IBM Security Guardium Data Protection Review
IBM Security Guardium Best Tool to go with FAST !!!!!!!!
Secure your clients' private information with IBM Security Guardium
Guard
We also thinking and …
Guardium beyond a vanilla implementation!!!
Robust financial data protection
Monitoring and protection of the database with IBM Security Guardium.
Protect your data with this powerful security tool!!!
Guardium is a good promisse
IBM Guardium - easy to use and to implement.
Data Protection with IBM Security Guardium.
Awards
Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards
Reviewer Pros & Cons
Product Details
- About
- Competitors
- Tech Details
- FAQs
What is IBM Security Guardium?
Whether focusing on data use, protection, governance, or reporting, some businesses need a
solution that supports a zero-trust approach to data security across its
lifecycle on-premises or in the cloud. The IBM Security™ Guardium® portfolio protects sensitive
and regulated data across fragmented environments. Here’s a peek at the
products within the Guardium portfolio:
IBM Security Guardium Data Protection discovers and
classifies sensitive data from across the enterprise, providing real-time data
activity monitoring and advanced user behavior analytics to help discover
unusual activity around sensitive data.
IBM Security Guardium Insights provides centralized data security across the hybrid multi-cloud. Adapt and scale with modern architecture, streamline compliance and audit processes, and share contextual risk insights across security teams to support zero trust.
IBM Security Guardium Data Security Posture Management (DSPM) helps discover cloud shadow data, analyze data flow between regions, and uncover vulnerabilities across cloud and SaaS applications
IBM Security Guardium Data Encryption (GDE) consists of a unified suite of products built on a common infrastructure. These scalable solutions provide data encryption, tokenization, data masking, and key management capabilities to help protect and control access to data across the hybrid multi-cloud environment.
IBM Security Discover and Classify provides integrated discovery and classification of structured and unstructured data across all environments. IBM Security Discover and Classify is part of the IBM Security Guardium suite of products.
IBM Security Guardium Key Lifecycle Manager centralizes, simplifies, and automates the encryption key management process to help protect encrypted data and simplify encryption key management. Guardium Key Lifecycle Manager helps customers meet regulations such as PCI DSS, Sarbanes-Oxley, and HIPAA by providing access control, key rotation, and other automated key lifecycle management processes.
IBM Security Guardium Vulnerability Assessment scans data infrastructures such as databases, data warehouses, and big data environments to detect vulnerabilities and suggests remedial actions. This vulnerability assessment tool identifies exposures such as missing patches, weak passwords, unauthorized changes, and misconfigured privileges.
IBM Data Risk Manager provides executives and their teams with a business-consumable data risk control center that helps to uncover, analyze, and visualize data-related business risks so they can take action to protect their business.
https://ibm.biz/Security_Guardium_product_page
IBM Security Guardium Features
- Supported: Ability to monitor, receive & issue alerts in real-time
- Supported: Data encryption, data masking & tokenization
- Supported: Advanced data threat analytics
- Supported: Centralized management of encryption keys
- Supported: Ability to manage data risk across complex IT environments
- Supported: Ability to discover & analyze both structured & unstructured data assets
- Supported: Vulnerability assessments & recommendations
- Supported: Ability to maintain a tamper-proof audit trail
- Supported: Compliance quick starts & features around compliance monitoring
- Supported: Out-of-the-box dashboards
- Supported: Ability to integrate with SIEM solutions
- Supported: Ability to block, mask & quarantine data access
- Supported: Flexible deployment options & variety of connectors
- Supported: Ability to detect dormant accounts or misconfigured entitlements
- Supported: Out-of-the-box discovery & classification patterns
- Supported: Heterogeneous integration with other security solutions
IBM Security Guardium Competitors
IBM Security Guardium Technical Details
Operating Systems | Unspecified |
---|---|
Mobile Application | No |
Frequently Asked Questions
Comparisons
Compare with
Reviews and Ratings
(80)Attribute Ratings
Reviews
(1-25 of 35)Guardium user.
- Vulnerability Scans.
- Auditing.
- Compliance.
- Cleanup the menu bar- way too many items.
- Ktap support for newer O/S. Recently, I have had to open support tickets to get the most recent support for the RHEL Kernel.
- Also, upgrading agents to V12 doesnt not have the same Flex or exact match for KTAP as 11.5. You would think V12 would have the same Kernel support as 11.5. Clients are moving to V12.
Protecting sensitive research data in a variety of settings is the goal of this suite of products.
- Intensive Data Security
- Automation of Compliance
- Enhanced Security Information
- Complexity
- Reporting Difficulties
- Integration-Related Issues
IBM Security Guardium review
- Monitors all database activity, including local privileged traffic.
- Powerful reporting logic to extract the exact information one needs.
- Makes it easier to separate duties of monitoring/auditing from DBAs.
- Vulnerability assessments.
- threat detection needs improvement the false positives are so far off it's not usable
- GI has trouble returning results once it gets a lot of data, especially for failed logins.
review of IBM Guardium
- tool simplifies
- centralized management
- provide data security
- gklm does not work after upgrade version,
- glkm database user's password can not be changed
- usable data protection
IBM Security Guardium Data Protection Review
- Collecting Logs
- Syslog and Mail alerts
- Guardium ISO installation
- Agent installation and uninstallation
- We had big troubles with GIM certificate update
- IBM Support Engineers
- Guardium Self-Audit
IBM Security Guardium Best Tool to go with FAST !!!!!!!!
- Connection to Other IBM products Seemless ( Cloud PAK for data , integration and Other IBM Products and Dbs )
- Vulnerability Assessment and Risk Management to comply with PCI and Governamental Data Authority
- Real-time Data Activity Monitoring seeing all activities happeing in Organization
- some of the sevices not already integrable in direct way perhaps if there is a store for it would be better
Secure your clients' private information with IBM Security Guardium
- AI scanning capabilities to detect anomalies in the database.
- Can easily monitor and automate task.
- Can know how secure the database with the anomaly score.
- Not every alert you get is due to an anomaly but sometimes it can also be due to false positives.
- Support takes a lot of time to respond and documentation is not adequate.
- And a missing functionality that I can think of is to add custom alert option through email.
Guard
We also thinking and working about db firewall.
We are analyzing our critical datas with using data classification tool.
Using external feed feature to follow some of our db tables.
- Monitoring
- Protecting
- Data Classification
- Firewall
- Vulnerability Assesment
- Retention size for keeping long period of data
- Aggregators are not useful
- Technical Supoort is not efficient on vendor site
We are planning to use DBFW feature for all of our clients. A man/women can only access db from his/her own pc.
Guardium beyond a vanilla implementation!!!
- Reporting
- Alerting and SIEM integration
- Audit process for policies
- Audit Process Workflows
- Datamarts
- External Datasource integration with Domains
Audit Compliance, Reporting, Automation, SIEM integration, Multi Database monitoring
It is not well suited for: -
Detailed Access Reviews
Robust financial data protection
- Provides complete monitoring of data access and usage activities.
- Provides customizable security controls and policies that help us meet compliance and regulatory requirements.
- Uses advanced algorithms and machine learning to detect abnormal behavior patterns.
- Helps us protect sensitive and confidential data by controlling access.
- Integrates easily with other security systems and tools.
- Configuration and set-up can be complex and require some time and effort to implement correctly.
- The cost of acquiring and maintaining IBM Guardium can be significant.
- Quickly detect hidden threats that try to enter our systems.
- Find solutions for problems that directly affect our processes.
- Protect data with good backup.
- Provides detailed reports that help make future improvements.
- Fast implementation but with little documentation.
- Alert of very frequent threats with false positives.
- Protect user information.
Protect your data with this powerful security tool!!!
- It's easy to implement, you don't need to be an expert.
- The database is controlled and secure; its access is restricted to only authorized personnel.
- The detection of threats is very good since the data will not be damaged because the monitoring of the software is very attentive, so the errors are analyzed before something can be damaged.
- It has wonderful technical support willing to help at all times.
- The navigation is not adequate, a lot of time is wasted, and it does not give up for that reason.
- Each module has a price, this increases expenses.
- Setup is not for newbies.
Guardium is a good promisse
- A lot of security resources
- Interface (somentimes can be good, or not)
- audit details
- Support
- interface can be better
IBM Guardium - easy to use and to implement.
- Data monitoring.
- Report
- Easy configuration.
- AIX installation.
Data Protection with IBM Security Guardium.
- SQL Inspection.
- Reporting tools.
- SQL Traffic.
- Guardium Licensing is tricky.
- Separate IP(s).
- Troubleshooting issue with traffic monitoring.
Data protection solution
Few of the unusual activity detected earlier which took a long time to fix as the time spam of detection was higher. With this tool, it is more secure now because it is important to detect both the internal and external unauthorised things to secure application.
- Detect internal unauthorised access
- Detect external unusual activity
- External threats
- UI can be improve in case you are monitoring multiple DB
- Multiple monitor DB getting slow the system
Expensive But The Best in Class
- Vulnerability scan at database level
- Supports databases of different flavors
- Database activity monitoring
- Integration with non-IBM SIEM solutions
- Data Masking ability
- IBM Security Guardium needs to provide better run books and guides for helping with the implementation
- Ability to create custom reports from the admin portal will be a plus
- UI is slow for the portal
- Access Auditing
- vulnerability analysis
- Identification of behavior
- Updates often bring bugs
Best in market for Database Protection
I like their Vulnerability Assessment feature and some very cool advanced feature like Blocking, Masking.
IBM support is very good to provide support of this product.
One of the very useful feature we use of this product is their Audit process Builder which provides audit functionality and to send the audit reports to external auditors to meet the compliance requirements.
- Database Activity Monitoring
- Vulnerability Assessment
- Audit process
- Central Management
- Better documentation with examples
Incredible features to keep our data safe.
- Speed in detecting threats.
- Troubleshooting is fast, analytics are powerful.
- It establishes good security parameters, and has precise functions to make decisions and solve problems quickly.
- Although it is a relatively simple software to use, it requires a bit of knowledge, which a new user cannot do without consolidating some previous knowledge.
- The technical support team is not ideal; although, on many occasions we have not needed their help, the times we have interacted it has left us wanting more.
Robustly protect and monitor your data
- compliance report
- personal data discovery
- data encryption
- Monitor data access
- risk assessment
- integration with privacy management tools
- application deployment on primese
- integration with SAP
IBM Security Guardium - your data security Guardian.
- The pre-built templates gives us a better posture for observing compliance.
- Automates data discovery.
- Provides real time monitoring of data in your cloud environment.
- The activities reports are usually clustered with stats making it complicated to run a full analysis.
Properly Satisfied with Data Security
- Allows us to set various level of permissions for each user for the access of data.
- Unusual activities are immediately flagged and an alert is sent.
- Easy auditing as per the compliances.
- The support is bit inefficient.
- Looks a little bit clunky and navigation is hard.
- Could impact your system performance.
Best in Class for security of your Data.
- All the monitoring activities can easily be automated.
- All the suspicious activities are instantly flagged and an alert is generated.
- We can select access rights for each individual.
- It is not very user-friendly and a bit hard to navigate for some of the functionalities.
- Reports and Dashboards aren't very much customizable.
- Deployment took a really long time.
High Security for your Data!
- Auditing of data can easily be centralized.
- Automation of data monitoring reports.
- It is scalable and effectively monitors the users for any suspicious activity.
- It would have been great if this tool was more customizable.
- The User Interface is a bit laggy and old fashioned.
- It took ages for the proper deployment of this tool- could be made a bit easier and more efficient.