By IBM
Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated IBM Guardium Data Encryption Alternatives

IBM Guardium Data Encryption Reviews & Product Details

IBM Guardium Data Encryption Overview

What is IBM Guardium Data Encryption?

IBM Security Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA.

IBM Guardium Data Encryption Details
Languages Supported
English
Show LessShow More
Product Description

Provides encryption capabilities to help protect file and database data from misuse and comply with industry and regulatory requirements


Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
711,096 Twitter followers
LinkedIn® Page
www.linkedin.com
317,108 employees on LinkedIn®
Ownership
SWX:IBM
Phone
1-866-277-7488
Total Revenue (USD mm)
$73,621
Description

IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers.


Jennifer L.
JL
Overview Provided by:
Customer Marketing & Advocacy Manager at iboss

Recent IBM Guardium Data Encryption Reviews

Verified User
U
Verified UserMid-Market (51-1000 emp.)
4.0 out of 5
"Tried and True"
This system is set up to ensure confidence amongst users so I am more than satisfied with it.
Verified User
U
Verified UserMid-Market (51-1000 emp.)
5.0 out of 5
"IBM Resumen"
Que ofrece protección a las bases de datos
Verified User
U
Verified UserMid-Market (51-1000 emp.)
4.0 out of 5
"IBM Security guardian data review "
Helps securing private data and integrity of data. Mostly used it for relational databases and file systems and various types of data
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

IBM Guardium Data Encryption Media

IBM Guardium Data Encryption Demo - GDE Dashboard
Summary view of the current state.
IBM Guardium Data Encryption Demo - GDE Hosts
View of connected hosts.
IBM Guardium Data Encryption Demo - Edit Encryption Key Policy
Alter key policy and customize rules.
IBM Guardium Data Encryption Demo - Logs
In-depth view of logs.
IBM Guardium Data Encryption Demo - DAM Outlier Mining
Control outlier mining.
Answer a few questions to help the IBM Guardium Data Encryption community
Have you used IBM Guardium Data Encryption before?
Yes

4 IBM Guardium Data Encryption Reviews

4.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
4 IBM Guardium Data Encryption Reviews
4.0 out of 5
4 IBM Guardium Data Encryption Reviews
4.0 out of 5
G2 reviews are authentic and verified.
Chiquita B.
CB
Dental Assistant
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about IBM Guardium Data Encryption?

This product has made it a lot easier to protect user information that has been sent or received. Review collected by and hosted on G2.com.

What do you dislike about IBM Guardium Data Encryption?

There have been a few instances where the program has caused a computer to freeze or run slower. Review collected by and hosted on G2.com.

What problems is IBM Guardium Data Encryption solving and how is that benefiting you?

Preventing important information from being stolen or revealed to an unauthorized source. Review collected by and hosted on G2.com.

Verified User in Internet
UI
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about IBM Guardium Data Encryption?

Helps securing private data and integrity of data. Mostly used it for relational databases and file systems and various types of data Review collected by and hosted on G2.com.

What do you dislike about IBM Guardium Data Encryption?

Setting up is a complex and tiersome process. It could be made more streamlined. Review collected by and hosted on G2.com.

Recommendations to others considering IBM Guardium Data Encryption:

Would recommend it for sure. The setup is difficult but it once running it does its job. Review collected by and hosted on G2.com.

What problems is IBM Guardium Data Encryption solving and how is that benefiting you?

To protect data and scrutinize what's going on in the scheme of systems Review collected by and hosted on G2.com.

Verified User in Security and Investigations
US
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about IBM Guardium Data Encryption?

This system is set up to ensure confidence amongst users so I am more than satisfied with it. Review collected by and hosted on G2.com.

What do you dislike about IBM Guardium Data Encryption?

I have had no problems as of yet and am hoping not to develop any. Review collected by and hosted on G2.com.

Recommendations to others considering IBM Guardium Data Encryption:

It is very important to safeguard client information as well as maintain a reputable business in the marketplace. This system makes all of that possible. Review collected by and hosted on G2.com.

What problems is IBM Guardium Data Encryption solving and how is that benefiting you?

Security beeches are nearly impossible Review collected by and hosted on G2.com.

Verified User in Building Materials
UB
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about IBM Guardium Data Encryption?

Que ofrece protección a las bases de datos Review collected by and hosted on G2.com.

What do you dislike about IBM Guardium Data Encryption?

Que a pesar de ofrecer protección a las bases de datos , no se puede proteger a un cien por ciento Review collected by and hosted on G2.com.

What problems is IBM Guardium Data Encryption solving and how is that benefiting you?

La forma de encontrar los datos personales de forma eficiente , que protege los datos de ante el mal uso Review collected by and hosted on G2.com.

There are not enough reviews of IBM Guardium Data Encryption for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Egnyte Logo
Egnyte
4.4
(1,013)
Egnyte delivers the only modern content platform that is purpose-built for businesses. Egnyte gives IT centralized control and protection over their files, and users fast access to their content, no matter how or where work happens.
2
Keeper Password Manager Logo
Keeper Password Manager
4.6
(1,053)
Securely store, share and manage your passwords, logins, credit card numbers, bank accounts and private information in your encrypted digital vault.
3
Progress MOVEit Logo
Progress MOVEit
4.4
(459)
Exchanging files over the Internet shouldn’t be complicated. That’s why more than 40 million users from around the world rely on MOVEit – The Managed File Transfer Software from Progress to simplify and secure the file transfer tasks, save time, and improve communications.
4
Signal Logo
Signal
4.4
(444)
Making private communication simple.
5
BlackBerry UEM Logo
BlackBerry UEM
3.8
(376)
BlackBerry UEM is a suite of solutions that all rely on the same foundation of security to secure the digital workplace. It keeps employees productive on any device, anywhere, while allowing your security team to manage diverse devices, ensure data security, support remote work, and reduce operational costs. Gain comprehensive control, enhance security, and streamline your IT operations.
6
Virtru Email Encryption Logo
Virtru Email Encryption
4.4
(328)
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
7
WatchGuard Network Security Logo
WatchGuard Network Security
4.7
(261)
WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle.
8
Tresorit Logo
Tresorit
4.5
(233)
Tresorit provides an end-to-end encrypted productivity solution for ultra-secure collaboration including managing, storing, syncing, and transferring files.
9
Kaspersky Endpoint Security for Business Logo
Kaspersky Endpoint Security for Business
4.3
(187)
Kaspersky Endpoint Security for Business offers a tightly integrated combination of superior security technologies and far-reaching systems management capabilities, which can all be controlled via a single management console.
10
LiveRamp Logo
LiveRamp
4.2
(109)
Data Onboarding connects customer data to digital marketing applications and media platforms.
Show More