Top Rated IBM Guardium Alternatives
123 IBM Guardium Reviews
Overall Review Sentiment for IBM Guardium
Log in to view review sentiment.

I like that IBM security GVA discovers all our databases automatically sonit ssves us the time we would have spent doing that manually. It also has scans the database for any weaknesses and it gies a step further and suggests remediation actions for any weakness and vulnerabilities found. Its a good tool for enhancing our database security by automating scanning for vulnerabilities and weaknesses that havkers may use to attack us. Review collected by and hosted on G2.com.
I have been having a hard time understanding the error kogs that it sends, this also impedes my understanding of the problems and hence make it it hard to fix the issues Review collected by and hosted on G2.com.
it is able to monitor all DB activities and quickly detect and report strange activitie. Review collected by and hosted on G2.com.
the detailed reports can be slow during generation. Review collected by and hosted on G2.com.

We provide security our company data with IBM Security Guardium. Review collected by and hosted on G2.com.
I have no idea about negative side of IBM Security Guardium Review collected by and hosted on G2.com.
It is a great tool having good interface and a lot of functionality. Review collected by and hosted on G2.com.
Nothing as such which I can highlight here Review collected by and hosted on G2.com.
IBM GVA is very good because it scan our entire database for any vulnerabilities or weaknesses in our security protocols, it also send real time alerts and notifications alerts whenever a potential threat or suspicious activity is identified and gives suggestions on how to fix those security gaps. This has enabled us to effectively and quickly respond to all suspicious activities and weaknesses, and thus we are able to safeguard our data in our data base and warehouse from external and internal attacks and from data breach or data loss scenarios Review collected by and hosted on G2.com.
Its a bit complex to deploy during initial setup and the available documentation isn't sufficient to guide through this initial setup process. Took us a bit of time though we eventually figured it out Review collected by and hosted on G2.com.
I like IBM Security GVA because it scans and identifies any weak points in our database and sends a comprehensive actionable report on any vulnerabilities and weaknesses such as weak passwords, unusual after hours activity, Account sharing and missing patches amongs others and more than that it gives immediate actionable suggestions on how to address those vulnerabilities. I also like that it has automated configuration so setting up and deployment is easy and hassle free. Review collected by and hosted on G2.com.
I have had a very good experience with IBM Security Guardium Vulnerability Assessment so nothing to dislike Review collected by and hosted on G2.com.

IBM Guardium Key Lifecycle Manager is helping us to manage and securely store private keys in the infrastructure and also managing the key lifecycle to meet the compliance requirements by automatically rotating the key as per the defined ploicy Review collected by and hosted on G2.com.
IBM Guardium Key Lifecycle Manager is good for data-at-rest storage but unable to leverage automation for data in transit or for another use-case like artifacts encryption Review collected by and hosted on G2.com.
With the Guardium Key manager we can have all our keys and secrets in one centralized place. We can now audit who accessed the keys, which keys are being reused, and much more. Review collected by and hosted on G2.com.
For a company that never had a key management solution, it might take some time to identify all your keys and sensitive information. This is not an issue with the tool per se, but it definitely took some time to fully setup the tool. Review collected by and hosted on G2.com.

IBM Guardium helps in identifying security gaps in databases like missing patches, weal passwords, unauthorised changes, and misconfigured privileges and excessive administrative logins etc. Review collected by and hosted on G2.com.
Old legacy system integration is at best but they should upgrade the tool to be compatible with latest technologies and cloud integration should be in the roadmap further. Review collected by and hosted on G2.com.
Effective data protection and encryption Review collected by and hosted on G2.com.
Costlier and adding add on budget coast over organization Review collected by and hosted on G2.com.