Citrix Endpoint Management vs. IBM Guardium

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Citrix Endpoint Management
Score 8.3 out of 10
N/A
Citrix Endpoint Management (formerly XenMobile), is a UEM and enterprise mobility management application for securing mobile applications and devices.N/A
IBM Guardium
Score 9.1 out of 10
N/A
IBM Guardium is IBM's data security posture management solution, that aims to offer organizations comprehensive visibility, actionable insights and real-time controls to help users comply with regulations, preserve privacy and secure sensitive data no matter where it is stored.N/A
Pricing
Citrix Endpoint ManagementIBM Guardium
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Citrix Endpoint ManagementIBM Guardium
Free Trial
NoYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoYes
Entry-level Setup FeeNo setup feeOptional
Additional DetailsPricing is dependent based on data source environment.
More Pricing Information
Community Pulse
Citrix Endpoint ManagementIBM Guardium
Best Alternatives
Citrix Endpoint ManagementIBM Guardium
Small Businesses
Avast CloudCare
Avast CloudCare
Score 10.0 out of 10
Oracle Audit Vault and Database Firewall
Oracle Audit Vault and Database Firewall
Score 7.0 out of 10
Medium-sized Companies
KACE Systems Management Appliance
KACE Systems Management Appliance
Score 8.6 out of 10
ManageEngine ADAudit Plus
ManageEngine ADAudit Plus
Score 9.1 out of 10
Enterprises
KACE Systems Management Appliance
KACE Systems Management Appliance
Score 8.6 out of 10
ManageEngine ADAudit Plus
ManageEngine ADAudit Plus
Score 9.1 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Citrix Endpoint ManagementIBM Guardium
Likelihood to Recommend
6.6
(9 ratings)
9.5
(67 ratings)
Likelihood to Renew
-
(0 ratings)
8.0
(5 ratings)
Usability
8.0
(2 ratings)
5.5
(34 ratings)
Support Rating
9.8
(2 ratings)
4.5
(5 ratings)
Ease of integration
-
(0 ratings)
4.5
(1 ratings)
Product Scalability
-
(0 ratings)
6.4
(1 ratings)
User Testimonials
Citrix Endpoint ManagementIBM Guardium
Likelihood to Recommend
Citrix
This product is well suited for any healthcare organization, especially one privately owned by the providers. Many of our providers were displeased with our efforts to use a product that forced sandboxing of Exchange information. Therefore, we needed something that was flexible enough that sandboxing could be used where desired but still allowed native OS integration where necessary.
Read full review
IBM
IBM Guardium DP is suitable for monitoring, auditing, data discovery, vulnerability analysis, and risk detection and investigation in relational and non-relational databases, cloud database services, indexed databases, and non-relational databases as well. IBM Guardium DPR is appropriate for supporting the process of detecting anomalous behavior in accessing sensitive data, helping to optimize the work of cybersecurity analysts or data team analysts by providing the data officer within our organization with insight into compromised users, compromised databases, or file servers containing sensitive data.
Read full review
Pros
Citrix
  • It has efficient security control system. Easy to use and administer.
  • It is very easy to install, it connects well with with other apps.
  • SecureWeb Xenmobile provides secured access to the websites and eliminates the need of VPN.
  • It connects very well with other apps.
Read full review
IBM
  • Provides complete monitoring of data access and usage activities.
  • Provides customizable security controls and policies that help us meet compliance and regulatory requirements.
  • Uses advanced algorithms and machine learning to detect abnormal behavior patterns.
  • Helps us protect sensitive and confidential data by controlling access.
  • Integrates easily with other security systems and tools.
Read full review
Cons
Citrix
  • issues with non apple, non samsung devices: if it is not setup with an apple or samsung phone, then the Certificate onboarding is a struggle/unable to be done.
  • user-pin setup: for a user to be onboarded, requiring a PIN; there is a self service way but it is clunky and users prefer to call in instead of trying to follow the 15 step process via PDF
  • if the certificate is ever lost, due to an upgrade via IOS or android, then the entire process [uninstall, reinstall] has to be done, which means downtime for the end user, and higher call volume when a service provider pushes an iOS update.
Read full review
IBM
  • Cleanup the menu bar- way too many items.
  • Ktap support for newer O/S. Recently, I have had to open support tickets to get the most recent support for the RHEL Kernel.
  • Also, upgrading agents to V12 doesnt not have the same Flex or exact match for KTAP as 11.5. You would think V12 would have the same Kernel support as 11.5. Clients are moving to V12.
Read full review
Likelihood to Renew
Citrix
No answers on this topic
IBM
It is a perfect system to detect problems that we do not see manually, it is light, with a very simple learning curve and with great protection of our data, we will use it forever.
Read full review
Usability
Citrix
The software's usability is what we expected. We knew what our organization needed and Citrix was able to meet our needs. The ability to have the apps on a mobile device has been a great plus and Citrix seems to have really developed a software based on the every day needs of the user.
Read full review
IBM
This software is not the easiest to use in all work environments, each department has some difficulties accessing and managing some functions, it can be considered a complex softy, but I consider it necessary to have it in the company due to its security qualities of warm cans, it offers exactly what it promises but with a little difficulty in its configuration.
Read full review
Support Rating
Citrix
Overall the support from the customer service team has been good. They are very timely and expert in resolving the tickets. They have appropriate knowledge to resolve issues in all stages to development. They were up to the point during the implementation stage of the XenMobile, all queries were answered in time to help finish the deployment. The support for last three years has been extraordinary in helping us use XenMobile effectively and efficiently.
Read full review
IBM
There has been great support coming from IBM. It is easy to use and a great way to keep our data secure. I would recommend this to other possible users and if I were to move companies, I would recommend we use this there too. Thank you
Read full review
Alternatives Considered
Citrix
With a zero trust solution for the entire digital workspace, you can continually monitor and assess session activities before, during, and after login. Reduce risk, gain more control over every session, and get deeper insights across your entire application landscape. To achieve this strong security posture across all environments, you need an application delivery solution that shares a common code base. This lets you implement consistent security policies across all your applications for comprehensive protection.
Read full review
IBM
IBM Security Guardium has extended capabilities of automatically locating databases and assessing the vulnerabilities and configuration flaws in them. IBM Security Guardium stacks up against other products due to the additional features that can be easily added to your IT systems after installation. Additionally, Guardium has the ability to monitor a mainframe database environment which makes it the best choice!
Read full review
Scalability
Citrix
No answers on this topic
IBM
Only a few users in our shop for now
Read full review
Return on Investment
Citrix
  • Specific ROI was on us avoiding purchasing company managed cell phones - one of the most important drivers
  • Makes on boarding, and especially offboarding remote users a heck of a lot easier w/the ability to wipe the container, even if not connected (via time setting)
  • Easy access to internal resources - no need for separate vpn, etc...
Read full review
IBM
  • Security and monitoring are important in a financial institution
  • Constant visibility and auditing of companies is easy with IBM Guardium.
  • la seguridad y monitored es important en una entidad financiera
  • la visibilidad y auditoria constante de empresas es facil con IBM Guardium
Read full review
ScreenShots

IBM Guardium Screenshots

Screenshot of the IBM Guardium Data Protection dashboard showing all the features. One click can take you to databases or to data analytics.Screenshot of IBM Guardium Data Protection: The S-TAP and GIM Dashboard gives real-time visibility into the health and performance of S-TAPs. It is used to track the status of different S-TAP versions, see database activity across inspection engines, and view detailed insights by operating system.Screenshot of IBM Guardium DSPM: Discovery, Classification & Threat Monitoring - Automate cloud data security with discovery, classification, and continuous threat monitoring. This offers a unified view of sensitive data across cloud workloads (AWS, Azure, GCP) and SaaS (SharePoint, OneDrive, Slack, Google Drive, Jira, Confluence and more), understand its risk level, and ensure ongoing protection and compliance.Screenshot of IBM Guardium DSPM: Discovery, Classification & Threat Monitoring - Automate cloud data security with discovery, classification, and continuous threat monitoring. This offers a unified view of sensitive data across cloud workloads (AWS, Azure, GCP) and SaaS (SharePoint, OneDrive, Slack, Google Drive, Jira, Confluence and more), understand its risk level, and ensure ongoing protection and compliance.Screenshot of IBM Guardium DSPM: Discovery, Classification & Threat Monitoring - Automate cloud data security with discovery, classification, and continuous threat monitoring. This offers a unified view of sensitive data across cloud workloads (AWS, Azure, GCP) and SaaS (SharePoint, OneDrive, Slack, Google Drive, Jira, Confluence and more), understand its risk level, and ensure ongoing protection and compliance.