TrustRadius: an HG Insights company

IBM Guardium

Score9.1 out of 10

158 Reviews and Ratings

What is IBM Guardium?

IBM Guardium is IBM's data security posture management solution, that aims to offer organizations comprehensive visibility, actionable insights and real-time controls to help users comply with regulations, preserve privacy and secure sensitive data no matter where it is stored.

Media

the IBM Guardium Data Protection dashboard showing all the features. One click can take you to databases or to data analytics.
IBM Guardium Data Protection: The S-TAP and GIM Dashboard gives real-time visibility into the health and performance of S-TAPs. It is used to track the status of different S-TAP versions, see database activity across inspection engines, and view detailed insights by operating system.
IBM Guardium DSPM: Discovery, Classification & Threat Monitoring - Automate cloud data security with discovery, classification, and continuous threat monitoring. This offers a unified view of sensitive data across cloud workloads (AWS, Azure, GCP) and SaaS (SharePoint, OneDrive, Slack, Google Drive, Jira, Confluence and more), understand its risk level, and ensure ongoing protection and compliance.
IBM Guardium DSPM: Discovery, Classification & Threat Monitoring - Automate cloud data security with discovery, classification, and continuous threat monitoring. This offers a unified view of sensitive data across cloud workloads (AWS, Azure, GCP) and SaaS (SharePoint, OneDrive, Slack, Google Drive, Jira, Confluence and more), understand its risk level, and ensure ongoing protection and compliance.
IBM Guardium DSPM: Discovery, Classification & Threat Monitoring - Automate cloud data security with discovery, classification, and continuous threat monitoring. This offers a unified view of sensitive data across cloud workloads (AWS, Azure, GCP) and SaaS (SharePoint, OneDrive, Slack, Google Drive, Jira, Confluence and more), understand its risk level, and ensure ongoing protection and compliance.

1 / 5

IBM Guardium

Use Cases and Deployment Scope

This address our security issues, specially our FSI clients.

Pros

  • Database Encryption
  • Data Masking
  • Data Security

Cons

  • I don't remember any but maybe support
  • Pricing

Return on Investment

  • Positive impact is that we comply to all regulations

Alternatives Considered

TokenOne

Other Software Used

IBM Instana, IBM API Connect

Great SW

Use Cases and Deployment Scope

Security monitoring and control in Mainframe systems

Pros

  • Reliability of information
  • Complete solution
  • Really fast reports

Cons

  • More detailed information
  • Provide more complete solutions

Return on Investment

  • improved compliance
  • automatic data procerssing

Other Software Used

IBM Db2 Analytics Accelerator, Db2

Usability

See how IBM Guardium Data Protection ensures 360 data protection.

Use Cases and Deployment Scope

IBM Guardium Data Protection and Vulnerability Assessment has helped me gain visibility into who, how, where, when, and in what ways sensitive data is being accessed within the organization. Usually, our sensitive data is stored in relational databases and non-relational, storage systems with unstructured sensitive data. Being able to discover vulnerabilities that could impact sensitive data has been another huge achievement. This has allowed us to understand the level of risk in accessing sensitive data. We have also been able to identify and trace all operations of database administrators and users who have access to sensitive data.

Pros

  • It allows us to discover sensitive data, where it is located, and within which repository it is located.
  • It allows us to have visibility and audit trails of all user interactions with sensitive data repositories in real time.
  • It helps us build and deliver the required regulatory compliance reports much more quickly.
  • It allows us to create policies for the separation of roles and functions within access to sensitive data.
  • It allows us to investigate incidents with the help of analytics, behavioral, and artificial intelligence engines that analyze user behavior to detect variations and identify risks.

Cons

  • Allow viewing user entitlement reports graphically or through dashboards.
  • Allow integration with Watson.X Orchestrate and Watson.X Governance to integrate analytics on data usage, risk, and usability, possibly integrating with LLM models or AI Agents.
  • It would be interesting if GDP could uncover Shadow Data as well.

Return on Investment

  • IBM Guardium DP has streamlined the identification time for suspicious access to sensitive data in real time.
  • IBM Guardium DP has helped the organization efficiently and quickly deliver compliance reports or reports required by internal departments in a timely and effective manner.
  • IBM Guardium DP has supported the investigation and response process for incidents involving sensitive data that put the organization at risk due to a regulation or compliance standard.

Alternatives Considered

Imperva Data Security

Other Software Used

IBM Security QRadar SOAR, IBM Verify, IBM Security QRadar SIEM

IBM Guardium Review

Use Cases and Deployment Scope

We use IBM Guardium for both Data monitoring and for Vulnerability assessments. We started with a small scope of applications and have now made IBM Guardium a standard requirement for all [...] managed DB's. It is working great and is fullying integrated with our SIEM and Service Now for ticket creation and investigations.

Pros

  • identifies failed logins
  • Possible app issue
  • monitors access to data
  • identifies possible issues with CSS

Cons

  • patching - ease of the process
  • consistent labels in the GUI
  • memory management in the appliances

Return on Investment

  • allows us to monitor critical data
  • Data protection is critical in banking - IBM Guardium allows us to better protect it.
  • Still too soon in our deployment process to determine the actual business impact.

Guardium Overview

Use Cases and Deployment Scope

IBM Guardium provides us with the ability discover and identify data. Once we discover data, we have the ability to control access and lock data down. This is extremely valuable based on the rate that data is growing.

Pros

  • Discovery & Classify Data
  • Data Encryption

Cons

  • User Interface
  • Pricing (lower price)

Return on Investment

  • The ability to discover and classify data is a huge time savings
  • Pre Built templates for PCI / HIPPA are huge time savings

Alternatives Considered

Imperva Data Security

Other Software Used

IBM Verify, HashiCorp Vault