Top Rated IBM Guardium Vulnerability Assessment Alternatives

IBM Guardium helps in identifying security gaps in databases like missing patches, weal passwords, unauthorised changes, and misconfigured privileges and excessive administrative logins etc. Review collected by and hosted on G2.com.
Old legacy system integration is at best but they should upgrade the tool to be compatible with latest technologies and cloud integration should be in the roadmap further. Review collected by and hosted on G2.com.
11 out of 12 Total Reviews for IBM Guardium Vulnerability Assessment

I like that IBM security GVA discovers all our databases automatically sonit ssves us the time we would have spent doing that manually. It also has scans the database for any weaknesses and it gies a step further and suggests remediation actions for any weakness and vulnerabilities found. Its a good tool for enhancing our database security by automating scanning for vulnerabilities and weaknesses that havkers may use to attack us. Review collected by and hosted on G2.com.
I have been having a hard time understanding the error kogs that it sends, this also impedes my understanding of the problems and hence make it it hard to fix the issues Review collected by and hosted on G2.com.

We provide security our company data with IBM Security Guardium. Review collected by and hosted on G2.com.
I have no idea about negative side of IBM Security Guardium Review collected by and hosted on G2.com.
IBM GVA is very good because it scan our entire database for any vulnerabilities or weaknesses in our security protocols, it also send real time alerts and notifications alerts whenever a potential threat or suspicious activity is identified and gives suggestions on how to fix those security gaps. This has enabled us to effectively and quickly respond to all suspicious activities and weaknesses, and thus we are able to safeguard our data in our data base and warehouse from external and internal attacks and from data breach or data loss scenarios Review collected by and hosted on G2.com.
Its a bit complex to deploy during initial setup and the available documentation isn't sufficient to guide through this initial setup process. Took us a bit of time though we eventually figured it out Review collected by and hosted on G2.com.
I like IBM Security GVA because it scans and identifies any weak points in our database and sends a comprehensive actionable report on any vulnerabilities and weaknesses such as weak passwords, unusual after hours activity, Account sharing and missing patches amongs others and more than that it gives immediate actionable suggestions on how to address those vulnerabilities. I also like that it has automated configuration so setting up and deployment is easy and hassle free. Review collected by and hosted on G2.com.
I have had a very good experience with IBM Security Guardium Vulnerability Assessment so nothing to dislike Review collected by and hosted on G2.com.
To assess data risks and manage data threats, we make use of IBM Security Guardium. Additionally, it offers reports and a dashboard for visualising data dangers. Additionally, it is beneficial to do vulnerability analyses and deal with problems in my organisation such weak passwords and illegal changes. Review collected by and hosted on G2.com.
Problem-solving techniques should be improved.
There could be more user-friendly navigation.
It affects how well the system performs.
extended deployment period Review collected by and hosted on G2.com.

Good data encryption and Data masking Features Review collected by and hosted on G2.com.
There are not much negative things about this but it lacks more customization capabilities in reports. Review collected by and hosted on G2.com.
Its ability to scan all sorts of data and detailed reporting was impressive and promising. It helps to improve data security and avoid breaches of sensitive laws. Review collected by and hosted on G2.com.
Eventhough it provides the analysis in real-time the dashboards are not that appealing they can definitely improve the look and feel of them. Review collected by and hosted on G2.com.

Save critical time and resources with intuitive test builders, robust reporting and automation; customize for your unique environment and take precise action. Review collected by and hosted on G2.com.
Nothing so far that i know. Need to work more on it Review collected by and hosted on G2.com.

Features, user friendly and ease if use Review collected by and hosted on G2.com.
There are good competitors with advanced features, modular encryption etc. Review collected by and hosted on G2.com.
The best thing I liked about this product is it's in-depth scanning, monitoring, reporting and automation of Compliance Audit. Review collected by and hosted on G2.com.
It should have more flexibility and integration with various platforms and also the prices were costly but however we were able to convience them. Review collected by and hosted on G2.com.