Ataccama ONE vs. IBM Guardium vs. Varonis Data Security Platform

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Ataccama ONE
Score 8.7 out of 10
N/A
Ataccama is a data quality platform handling data parsing, standardization, cleansing and matching, and data profiling.N/A
IBM Guardium
Score 9.1 out of 10
N/A
IBM Guardium is IBM's data security posture management solution, that aims to offer organizations comprehensive visibility, actionable insights and real-time controls to help users comply with regulations, preserve privacy and secure sensitive data no matter where it is stored.N/A
Varonis Data Security Platform
Score 8.8 out of 10
N/A
Varonis offers their Data Security Platform, a modular suite of data acess and data security products providing sensitive data discovery, data access governance, unusual behavior detection, GDPR compliance support, as well as incident playbooks and cybersecurity forensic reporting.N/A
Pricing
Ataccama ONEIBM GuardiumVaronis Data Security Platform
Editions & Modules
No answers on this topic
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Ataccama ONEIBM GuardiumVaronis Data Security Platform
Free Trial
YesYesYes
Free/Freemium Version
YesNoNo
Premium Consulting/Integration Services
YesYesYes
Entry-level Setup FeeOptionalOptionalNo setup fee
Additional DetailsPricing is dependent based on data source environment.
More Pricing Information
Community Pulse
Ataccama ONEIBM GuardiumVaronis Data Security Platform
Considered Multiple Products
Ataccama ONE

No answer on this topic

IBM Guardium
Chose IBM Guardium
When compared to the others, IBM Security Guardium offers a decent platform. In South Africa, IBM Security Guardium users are ecstatic, therefore it's a winner. The agent's stability is superior to that of others. It outperforms the competition (Vulnerability Assessment, …
Varonis Data Security Platform

No answer on this topic

Best Alternatives
Ataccama ONEIBM GuardiumVaronis Data Security Platform
Small Businesses

No answers on this topic

Oracle Audit Vault and Database Firewall
Oracle Audit Vault and Database Firewall
Score 7.0 out of 10
Egnyte
Egnyte
Score 9.4 out of 10
Medium-sized Companies
Informatica Customer 360 for Salesforce
Informatica Customer 360 for Salesforce
Score 8.1 out of 10
ManageEngine ADAudit Plus
ManageEngine ADAudit Plus
Score 9.0 out of 10
IBM InfoSphere Information Server
IBM InfoSphere Information Server
Score 8.0 out of 10
Enterprises
Winshuttle
Winshuttle
Score 9.2 out of 10
ManageEngine ADAudit Plus
ManageEngine ADAudit Plus
Score 9.0 out of 10
IBM InfoSphere Information Server
IBM InfoSphere Information Server
Score 8.0 out of 10
All AlternativesView all alternativesView all alternativesView all alternatives
User Ratings
Ataccama ONEIBM GuardiumVaronis Data Security Platform
Likelihood to Recommend
7.0
(2 ratings)
9.5
(66 ratings)
10.0
(11 ratings)
Likelihood to Renew
-
(0 ratings)
7.7
(5 ratings)
-
(0 ratings)
Usability
10.0
(1 ratings)
5.4
(34 ratings)
8.0
(1 ratings)
Support Rating
10.0
(1 ratings)
4.5
(5 ratings)
9.6
(3 ratings)
Ease of integration
-
(0 ratings)
4.5
(1 ratings)
-
(0 ratings)
Product Scalability
-
(0 ratings)
6.4
(1 ratings)
-
(0 ratings)
User Testimonials
Ataccama ONEIBM GuardiumVaronis Data Security Platform
Likelihood to Recommend
Ataccama
Usage for enterprise wide data management and governance across wide range of user group. Ataccama ONE enables achieving higher data quality amongst the data products. It is a powerful platform that supports integration of several checks on different data sets that can be also consolidated in reports later on. Data discovery works quite fast and easy.
Read full review
IBM
IBM Guardium DP is suitable for monitoring, auditing, data discovery, vulnerability analysis, and risk detection and investigation in relational and non-relational databases, cloud database services, indexed databases, and non-relational databases as well. IBM Guardium DPR is appropriate for supporting the process of detecting anomalous behavior in accessing sensitive data, helping to optimize the work of cybersecurity analysts or data team analysts by providing the data officer within our organization with insight into compromised users, compromised databases, or file servers containing sensitive data.
Read full review
Varonis
The most highlighted feature of Varonis Data Security Platform is the data analyzing mechanism. It analyzes your data all the time with some special algorithms to detect any unusual activities so that it can identify any unusual behavior or users and
take necessary action to save your sensitive data. They also offer a complete dashboard solution for their customers to control across different data stores, see their current state, and any security breaches to be addressed manually.
Read full review
Pros
Ataccama
  • It is one of the leading data quality tools in the industry, in our opinion.
  • Offers free data profiling.
  • Integrates with other tools for complete end-to-end lineage.
Read full review
IBM
  • Provides complete monitoring of data access and usage activities.
  • Provides customizable security controls and policies that help us meet compliance and regulatory requirements.
  • Uses advanced algorithms and machine learning to detect abnormal behavior patterns.
  • Helps us protect sensitive and confidential data by controlling access.
  • Integrates easily with other security systems and tools.
Read full review
Varonis
  • Varonis logging is very robust and captures all audit events being sent from the file servers.
  • The ability to report and alert on Active Directory account events works very well with file activity monitoring. It can show the complete picture of what an account did while being used.
  • Have a customizable dashboard is great for being able to show upper management information that only pertains to them.
Read full review
Cons
Ataccama
  • Performance in loading
  • Reduction of pop-up messages
Read full review
IBM
  • Cleanup the menu bar- way too many items.
  • Ktap support for newer O/S. Recently, I have had to open support tickets to get the most recent support for the RHEL Kernel.
  • Also, upgrading agents to V12 doesnt not have the same Flex or exact match for KTAP as 11.5. You would think V12 would have the same Kernel support as 11.5. Clients are moving to V12.
Read full review
Varonis
  • Implementation can be challenging in some areas and can only be executed by the vendor
  • Implementation can only be executed by the vendor and additional work can be chargeable
  • Licensing can be improved upon
  • Agent based so implementation can be longer than expected
Read full review
Likelihood to Renew
Ataccama
No answers on this topic
IBM
It is a perfect system to detect problems that we do not see manually, it is light, with a very simple learning curve and with great protection of our data, we will use it forever.
Read full review
Varonis
No answers on this topic
Usability
Ataccama
One of the key factors in our choice to onboard Ataccama was its usability - general end users have everything at their fingertips, it is not difficult for IT developers to setup the tool, and it has been an overall pleasure.
Read full review
IBM
This software is not the easiest to use in all work environments, each department has some difficulties accessing and managing some functions, it can be considered a complex softy, but I consider it necessary to have it in the company due to its security qualities of warm cans, it offers exactly what it promises but with a little difficulty in its configuration.
Read full review
Varonis
Because the tool delivers on its promises and forces us to explore each functionality. Using the tool leads us to seek more knowledge and apply it to our environment, mitigating risks, reducing the attack surface, increasing the team's technical knowledge, and boosting team growth. It also demonstrates to senior management that the tool is extremely necessary for the environment.
Read full review
Support Rating
Ataccama
Support has been excellent to date - very user friendly and knowledgeable to help support our needs and issues as they arise.
Read full review
IBM
There has been great support coming from IBM. It is easy to use and a great way to keep our data secure. I would recommend this to other possible users and if I were to move companies, I would recommend we use this there too. Thank you
Read full review
Varonis
Support has always been very responsive and addressed any issues we may have had in the past. Some local engineers are willing to come onsite or work over a web session to discuss creating a new rule set or look at some issues. Getting issues address has never been a problem. There was one feature we had trouble getting to function correctly, but support and local engineers were willing to work with us as much as needed to get it working correctly for our organization.
Read full review
Alternatives Considered
Ataccama
Ataccama ONE is a designated tool for Data quality monitoring. Supports end to end. Quite easy to deploy. Alteryx is more about coding or almost as complicated while Ataccama ONE is a bit easier to use. Different interfaces. Many views automatically available for data sets in Ataccama ONE. Output is vizualized in the tool. While more data transformation is required in Alteryx.
Read full review
IBM
IBM Security Guardium has extended capabilities of automatically locating databases and assessing the vulnerabilities and configuration flaws in them. IBM Security Guardium stacks up against other products due to the additional features that can be easily added to your IT systems after installation. Additionally, Guardium has the ability to monitor a mainframe database environment which makes it the best choice!
Read full review
Varonis
Actually, we didn't expend much time evaluating other file auditing platforms. We chose Varonis just after a serious incident and we had already heard about Varonis at a Netapp event. So it was an easy choice. We called Varonis and asked them for a PoC, that's it. The PoC became a production and it is running until this day.
Read full review
Scalability
Ataccama
No answers on this topic
IBM
Only a few users in our shop for now
Read full review
Varonis
No answers on this topic
Return on Investment
Ataccama
  • Less data inconsistencies in the system enable processes to run smoother without interruptions
Read full review
IBM
  • Security and monitoring are important in a financial institution
  • Constant visibility and auditing of companies is easy with IBM Guardium.
  • la seguridad y monitored es important en una entidad financiera
  • la visibilidad y auditoria constante de empresas es facil con IBM Guardium
Read full review
Varonis
  • We have identified data classifications issues that our organization was not aware of prior to the implementation.
  • The tool does take a dedicated resource for it to be effective.
  • Varonis has improved the speed with which we can fulfill audit requests, leaving us more time for other tasks.
Read full review
ScreenShots

IBM Guardium Screenshots

Screenshot of the IBM Guardium Data Protection dashboard showing all the features. One click can take you to databases or to data analytics.Screenshot of IBM Guardium Data Protection: The S-TAP and GIM Dashboard gives real-time visibility into the health and performance of S-TAPs. It is used to track the status of different S-TAP versions, see database activity across inspection engines, and view detailed insights by operating system.Screenshot of IBM Guardium DSPM: Discovery, Classification & Threat Monitoring - Automate cloud data security with discovery, classification, and continuous threat monitoring. This offers a unified view of sensitive data across cloud workloads (AWS, Azure, GCP) and SaaS (SharePoint, OneDrive, Slack, Google Drive, Jira, Confluence and more), understand its risk level, and ensure ongoing protection and compliance.Screenshot of IBM Guardium DSPM: Discovery, Classification & Threat Monitoring - Automate cloud data security with discovery, classification, and continuous threat monitoring. This offers a unified view of sensitive data across cloud workloads (AWS, Azure, GCP) and SaaS (SharePoint, OneDrive, Slack, Google Drive, Jira, Confluence and more), understand its risk level, and ensure ongoing protection and compliance.Screenshot of IBM Guardium DSPM: Discovery, Classification & Threat Monitoring - Automate cloud data security with discovery, classification, and continuous threat monitoring. This offers a unified view of sensitive data across cloud workloads (AWS, Azure, GCP) and SaaS (SharePoint, OneDrive, Slack, Google Drive, Jira, Confluence and more), understand its risk level, and ensure ongoing protection and compliance.