Forcepoint Insider Threat vs. IBM Security Guardium

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Forcepoint Insider Threat
Score 8.8 out of 10
N/A
Forcepoint Insider Threat is a security analytics tool for, searching, detecting and mitigating malicious or policy-violating employee behavior.N/A
IBM Security Guardium
Score 8.4 out of 10
N/A
IBM Security Guardium is IBM's data security posture management solution, that aims to offer organizations comprehensive visibility, actionable insights and real-time controls to help users comply with regulations, preserve privacy and secure your sensitive data — no matter where it is stored.N/A
Pricing
Forcepoint Insider ThreatIBM Security Guardium
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Forcepoint Insider ThreatIBM Security Guardium
Free Trial
NoYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoYes
Entry-level Setup FeeNo setup feeOptional
Additional DetailsPricing is dependent based on data source environment.
More Pricing Information
Community Pulse
Forcepoint Insider ThreatIBM Security Guardium
Top Pros
Top Cons
Best Alternatives
Forcepoint Insider ThreatIBM Security Guardium
Small Businesses

No answers on this topic

Oracle Audit Vault and Database Firewall
Oracle Audit Vault and Database Firewall
Score 7.0 out of 10
Medium-sized Companies
Forcepoint DLP
Forcepoint DLP
Score 8.8 out of 10
Oracle Audit Vault and Database Firewall
Oracle Audit Vault and Database Firewall
Score 7.0 out of 10
Enterprises
Forcepoint DLP
Forcepoint DLP
Score 8.8 out of 10
Oracle Audit Vault and Database Firewall
Oracle Audit Vault and Database Firewall
Score 7.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Forcepoint Insider ThreatIBM Security Guardium
Likelihood to Recommend
8.6
(2 ratings)
8.5
(31 ratings)
Likelihood to Renew
-
(0 ratings)
9.1
(3 ratings)
Usability
-
(0 ratings)
7.7
(28 ratings)
Support Rating
-
(0 ratings)
9.5
(4 ratings)
User Testimonials
Forcepoint Insider ThreatIBM Security Guardium
Likelihood to Recommend
Forcepoint
Email protection, you can see and restrict every kind of email having confidential data for which it provides a catalog building with data classification. Each and every department need to classify its data to see better results through Forcepoint. Because all it [needs] a deep down analysis of each and every information shared through email and other means of sharing.
Read full review
IBM
IBM Guardium is an ideal solution for the financial sector, providing data protection, regulatory compliance, insider threat detection and fraud prevention. Its comprehensive approach and advanced capabilities make it an essential tool for ensuring data security and integrity in financial institutions.
Read full review
Pros
Forcepoint
  • Establishment of normal user behavior and early indication of a potential risk when a user starts to stray from normal activity.
  • Automatically identify the riskiest user.
  • Provides context as a prove to investigation.
Read full review
IBM
  • It's easy to implement, you don't need to be an expert.
  • The database is controlled and secure; its access is restricted to only authorized personnel.
  • The detection of threats is very good since the data will not be damaged because the monitoring of the software is very attentive, so the errors are analyzed before something can be damaged.
  • It has wonderful technical support willing to help at all times.
Read full review
Cons
Forcepoint
  • Visualization of data
  • Options are hard to find
  • Integration with Active directory
Read full review
IBM
  • Although it is a relatively simple software to use, it requires a bit of knowledge, which a new user cannot do without consolidating some previous knowledge.
  • The technical support team is not ideal; although, on many occasions we have not needed their help, the times we have interacted it has left us wanting more.
Read full review
Likelihood to Renew
Forcepoint
No answers on this topic
IBM
It is a perfect system to detect problems that we do not see manually, it is light, with a very simple learning curve and with great protection of our data, we will use it forever.
Read full review
Usability
Forcepoint
No answers on this topic
IBM
It might look complex in the beginning but once you get hold of it by going through all of the documentation then it seems to be very smooth. The configuration is comparatively easy and the user can understand it on their own without any external help. The overall learning curve is Ok.
Read full review
Support Rating
Forcepoint
No answers on this topic
IBM
There has been great support coming from IBM. It is easy to use and a great way to keep our data secure. I would recommend this to other possible users and if I were to move companies, I would recommend we use this there too. Thank you
Read full review
Alternatives Considered
Forcepoint
Powerful tool with smart data collection that helps us to automatically detect when a user strays into abnormal behavior and the integration with Forcepoint DLP which has helped us to quickly drive to smarter decision after detecting risky user behavior and the video collection and playbacks helps a lot during investigation.
Read full review
IBM
IBM Security Guardium has extended capabilities of automatically locating databases and assessing the vulnerabilities and configuration flaws in them. IBM Security Guardium stacks up against other products due to the additional features that can be easily added to your IT systems after installation. Additionally, Guardium has the ability to monitor a mainframe database environment which makes it the best choice!
Read full review
Return on Investment
Forcepoint
  • Licenses are bundle up.
  • User based licensing.
  • Renewal cost is almost same as purchasing cost.
Read full review
IBM
  • Helps protect sensitive and confidential data, reducing the risk of data breaches and their financial and reputational consequences.
  • Provides regulatory compliance capabilities, helping organizations comply with regulations and standards specific to their industry.
  • Provides complete visibility and control over data access and usage activities.
Read full review
ScreenShots