Skip to main content
IBM Security Guardium

IBM Security Guardium


What is IBM Security Guardium?

IBM Security Guardium is IBM's data security posture management solution, that aims to offer organizations comprehensive visibility, actionable insights and real-time controls to help users comply with regulations, preserve privacy and secure your sensitive data — no matter where it…

Read more
Recent Reviews


10 out of 10
February 19, 2024
We are using as db monitoring tool. Analyzing critical table manipulations, table exporting, db exporting etc.
We also thinking and …
Continue reading
Read all reviews


Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Product Details

What is IBM Security Guardium?

Whether focusing on data use, protection, governance, or reporting, some businesses need a solution that supports a zero-trust approach to data security across its lifecycle on-premises or in the cloud. The IBM Security™ Guardium® portfolio protects sensitive and regulated data across fragmented environments. Here’s a peek at the products within the Guardium portfolio:

IBM Security Guardium Data Protection discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data.

IBM Security Guardium Insights provides centralized data security across the hybrid multi-cloud. Adapt and scale with modern architecture, streamline compliance and audit processes, and share contextual risk insights across security teams to support zero trust.

IBM Security Guardium Data Security Posture Management (DSPM) helps discover cloud shadow data, analyze data flow between regions, and uncover vulnerabilities across cloud and SaaS applications

IBM Security Guardium Data Encryption (GDE) consists of a unified suite of products built on a common infrastructure. These scalable solutions provide data encryption, tokenization, data masking, and key management capabilities to help protect and control access to data across the hybrid multi-cloud environment.

IBM Security Discover and Classify provides integrated discovery and classification of structured and unstructured data across all environments. IBM Security Discover and Classify is part of the IBM Security Guardium suite of products.

IBM Security Guardium Key Lifecycle Manager centralizes, simplifies, and automates the encryption key management process to help protect encrypted data and simplify encryption key management. Guardium Key Lifecycle Manager helps customers meet regulations such as PCI DSS, Sarbanes-Oxley, and HIPAA by providing access control, key rotation, and other automated key lifecycle management processes.

IBM Security Guardium Vulnerability Assessment scans data infrastructures such as databases, data warehouses, and big data environments to detect vulnerabilities and suggests remedial actions. This vulnerability assessment tool identifies exposures such as missing patches, weak passwords, unauthorized changes, and misconfigured privileges.

IBM Data Risk Manager provides executives and their teams with a business-consumable data risk control center that helps to uncover, analyze, and visualize data-related business risks so they can take action to protect their business.

IBM Security Guardium Features

  • Supported: Ability to monitor, receive & issue alerts in real-time
  • Supported: Data encryption, data masking & tokenization
  • Supported: Advanced data threat analytics
  • Supported: Centralized management of encryption keys
  • Supported: Ability to manage data risk across complex IT environments
  • Supported: Ability to discover & analyze both structured & unstructured data assets
  • Supported: Vulnerability assessments & recommendations
  • Supported: Ability to maintain a tamper-proof audit trail
  • Supported: Compliance quick starts & features around compliance monitoring
  • Supported: Out-of-the-box dashboards
  • Supported: Ability to integrate with SIEM solutions
  • Supported: Ability to block, mask & quarantine data access
  • Supported: Flexible deployment options & variety of connectors
  • Supported: Ability to detect dormant accounts or misconfigured entitlements
  • Supported: Out-of-the-box discovery & classification patterns
  • Supported: Heterogeneous integration with other security solutions

IBM Security Guardium Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

IBM Security Guardium is IBM's data security posture management solution, that aims to offer organizations comprehensive visibility, actionable insights and real-time controls to help users comply with regulations, preserve privacy and secure your sensitive data — no matter where it is stored.

BigID, AWS Security Hub, and Oracle Security Monitoring and Analytics are common alternatives for IBM Security Guardium.

Reviewers rate Support Rating highest, with a score of 9.5.

The most common users of IBM Security Guardium are from Enterprises (1,001+ employees).
Return to navigation


View all alternatives
Return to navigation

Reviews and Ratings


Attribute Ratings


(1-25 of 32)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
We use Security Guardium key lifecycle management. We need to store keys safely and It provides store and manage keys. Also It provides centrally manage the key lifecycle process. It also supports other brand devices. We use Security Guardium data protection. We use it to take secure snapshots on storage volumes to protect against any cyber attack.
  • tool simplifies
  • centralized management
  • provide data security
  • gklm does not work after upgrade version,
  • glkm database user's password can not be changed
  • usable data protection
Data protection and Guardium key lifecycle management are useful tools. You can implement them easily. Other brand storages support Guardium key lifecycle management. After 8.6 firmware version, IBM storage family support Guardium data protection. You can take secure snapshot on volume. You can create policy for snapshot operations. It manage and runs automatically.
FURKAN GÖKCAN | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
We provide consultancy services to provide customers with the most efficiency in every aspect of this product. In Turkey, we have a customer portfolio that includes 90% of the companies that are regulated in terms of database security. In customer environment, we personally deal with GUI and cli management of Guardium, which provides solutions to issues such as database logging and alarming.
  • Collecting Logs
  • Syslog and Mail alerts
  • Guardium ISO installation
  • Agent installation and uninstallation
  • We had big troubles with GIM certificate update
  • IBM Support Engineers
  • Guardium Self-Audit
It is an adequate product for many purposes. It has a very stable structure in terms of installation, policy and report layout, and database logging. It has a very smooth and simple process for patch upgrading. We can use correlation alarms very effectively. Inactive STAP and Inactive Managed Unit alerts are life saver in some cases. Also, buff usage monitor is a beautiful interface and the buffer of agents is crucial not to lose logs. But, Guardium is not logging tool activities. Also, not logging ".sql" scripts.
Score 10 out of 10
Vetted Review
Verified User
IBM Security Guardium is a data protection platform that helps my organization to safeguard sensitive data like datawarehouses , realtime connections , vulnerability , data masking , big data , and alot of other features we use , data security in all sizes , also user friendly and fancy UI to have it all in one place.
  • Connection to Other IBM products Seemless ( Cloud PAK for data , integration and Other IBM Products and Dbs )
  • Vulnerability Assessment and Risk Management to comply with PCI and Governamental Data Authority
  • Real-time Data Activity Monitoring seeing all activities happeing in Organization
  • some of the sevices not already integrable in direct way perhaps if there is a store for it would be better
real-time monitoring activities across multiple databases, spotting abnormal access patterns or unauthorized attempts to reach sensitive data, like accessing BigData and datalakes . It alerts institutions, aiding in preventing breaches and ensuring compliance with laws like PCI DSS by offering detailed audit trails.
Score 9 out of 10
Vetted Review
Verified User
For event analysis, it offers artificial intelligence and scanning capabilities for data anomaly investigation. Which helps finding and classifying sensitive and private data kept in the cloud or on premises very easy. And on top of that, monitoring databases and automating some tasks can also be done with it. Finally you will be given an anomaly score or how secure your database is to help you investigate the trend in your database.
  • AI scanning capabilities to detect anomalies in the database.
  • Can easily monitor and automate task.
  • Can know how secure the database with the anomaly score.
  • Not every alert you get is due to an anomaly but sometimes it can also be due to false positives.
  • Support takes a lot of time to respond and documentation is not adequate.
  • And a missing functionality that I can think of is to add custom alert option through email.
I very much recommend it due to its AI scanning abilities and being able to detect anomaly. Though not all alerts are an anomaly and there were cases that the alert was an false positive. Additionally it can automate most task hence reducing your workload.
February 19, 2024


Score 10 out of 10
Vetted Review
Verified User
We are using as db monitoring tool. Analyzing critical table manipulations, table exporting, db exporting etc.
We also thinking and working about db firewall.
We are analyzing our critical datas with using data classification tool.
Using external feed feature to follow some of our db tables.
  • Monitoring
  • Protecting
  • Data Classification
  • Firewall
  • Vulnerability Assesment
  • Retention size for keeping long period of data
  • Aggregators are not useful
  • Technical Supoort is not efficient on vendor site
We just detect some of guys in some office was trying to manipulate some invoces. When we realize this company immediately get fired them!
We are planning to use DBFW feature for all of our clients. A man/women can only access db from his/her own pc.
Score 9 out of 10
Vetted Review
Verified User
Guardium was implemented to meet specific audit requirements of the organization. The closed system as well as reporting functionality meets the business requirements. We have over time implemented additional functionality that makes the solution bespoke for the organization. The ability to onboard MSSQL, IBM Mainframe, SAP Hana, DB2 LUW and Sybase on Solaris made it an ideal singular solution.
  • Reporting
  • Alerting and SIEM integration
  • Audit process for policies
  • Audit Process Workflows
  • Datamarts
  • External Datasource integration with Domains
It is well suited for :-
Audit Compliance, Reporting, Automation, SIEM integration, Multi Database monitoring
It is not well suited for: -
Detailed Access Reviews
Brandon Lowry | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
IBM Guardium is used in our company to efficiently protect and manage the sensitive and confidential data we handle on a daily basis. One of the main ways we use IBM Guardium is to monitor and audit data access and usage activities across the organization. With this platform, we can track who accesses data, what actions are taken and when they occur. This provides complete visibility into data-related activities, allowing us to quickly detect and respond to any suspicious or unauthorized activity.
  • Provides complete monitoring of data access and usage activities.
  • Provides customizable security controls and policies that help us meet compliance and regulatory requirements.
  • Uses advanced algorithms and machine learning to detect abnormal behavior patterns.
  • Helps us protect sensitive and confidential data by controlling access.
  • Integrates easily with other security systems and tools.
  • Configuration and set-up can be complex and require some time and effort to implement correctly.
  • The cost of acquiring and maintaining IBM Guardium can be significant.
IBM Guardium is an ideal solution for the financial sector, providing data protection, regulatory compliance, insider threat detection and fraud prevention. Its comprehensive approach and advanced capabilities make it an essential tool for ensuring data security and integrity in financial institutions.
Score 9 out of 10
Vetted Review
Verified User
IBM Security Guardium is used to detect internal threats in the organization, its detection process is very fast and it also looks for alternative solutions for threats. Sensitive data is often protected by minimizing threats. Provides alerts to any suspicious movement that is generated in the system and seeks to get rid of problems. It also serves to monitor and presents customizable dashboards. It's priced a little high for small businesses, but it's a price you can pay for full-featured software that's worth it.
  • Quickly detect hidden threats that try to enter our systems.
  • Find solutions for problems that directly affect our processes.
  • Protect data with good backup.
  • Provides detailed reports that help make future improvements.
  • Fast implementation but with little documentation.
  • Alert of very frequent threats with false positives.
  • Protect user information.
In summary, this tool in general has great potential, all the features that we have managed to test have been worth it, obtaining the expected results. It has the ability to protect all the internal data of your company. Implementing it is a wise choice there is no doubt about that, reporting, monitoring, automation, and threat protection, are the main functions that we use.
Score 10 out of 10
Vetted Review
Verified User
Maximum protection tool that makes it possible to know in a timely manner where the real threats are to any data, the analysis is exact and so fast that everything is solved before it happens. IBM Security Guardium constantly monitors all data in general, detailing any event immediately, offering accurate reports with monitoring and automation that allows us to be calm since the result is clear; on the other hand, this Artificial Intelligence helps us notably throughout the organization due to the agility with which it works, ultimately obtaining excellent dividends for everyone.
  • It's easy to implement, you don't need to be an expert.
  • The database is controlled and secure; its access is restricted to only authorized personnel.
  • The detection of threats is very good since the data will not be damaged because the monitoring of the software is very attentive, so the errors are analyzed before something can be damaged.
  • It has wonderful technical support willing to help at all times.
  • The navigation is not adequate, a lot of time is wasted, and it does not give up for that reason.
  • Each module has a price, this increases expenses.
  • Setup is not for newbies.
A consolidated company must maintain the security and total protection of its data in good hands, which is why IBM Security Guard offers for your benefit the most controlled and most appropriate security for your business. Although this tool is somewhat expensive, it is worth the risk to keep the data in full control. Risk activities in the organization will be detected in advance in order to avoid any serious damage that could affect the business's future, avoiding any theft that is confidential and compromising. This product is easy to implement and has good technical service.
Score 5 out of 10
Vetted Review
Verified User
Everytime we need IBM international support, it gets a long time to be solved, in most times. It tooks a long time to underrstand, resolve and we stay with the bug or issue for a long time.<br>Brazil needs a local support in order to be faster.<br>We appreciate technician insights of guardium but,Guardium System has a lot os bugs;
  • A lot of security resources
  • Interface (somentimes can be good, or not)
  • audit details
  • Support
  • interface can be better
Everytime we have a bug on scenario, just verify our ticket history, i'll see that the tickets stay oppened for a long time.
Telmo Fonseca | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
IBM Guardium came to meet the need for data access monitoring, including PCI scope, replacing another Tool that no longer supports our most up-to-date environment, in addition to giving us a greater possibility of monitoring with vulnerability assessment.
  • Data monitoring.
  • Report
  • Easy configuration.
  • AIX installation.
It's a great tool due to ease of installation using Guardium Installation Manager, but needs some appliances restarted on AIX l, which in an environment with heavy processing may be a problem.
Abhishek Kumar | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
It's a solution that integrates tools that Protect the sensitive data of an organization. Different features of Guardium provide all customers need to inspect SQL Traffic and avoid data loss & also help both IT And compliance teams due to SQL inspection features and reporting tools. We don't have to take care of all SQL Traffic because Guardium also provides data classification; we can easily find the data that we want to categorize as sensitive.
  • SQL Inspection.
  • Reporting tools.
  • SQL Traffic.
  • Guardium Licensing is tricky.
  • Separate IP(s).
  • Troubleshooting issue with traffic monitoring.
With Guardium products, customers can examine organization data widely. They are better able to handle the audits and have greater control over the data in this way. Data Protection and its encrypted Features like Vulnerability Assessments and CAS enhance database security as well and Database addition under Guardium footprint print is done by using a lightweight agent installed on the DB Server that has negligible performance impact.
September 27, 2023

Data protection solution

Score 9 out of 10
Vetted Review
Verified User
Basically it helps team to monitor database activity in more secure way.
Few of the unusual activity detected earlier which took a long time to fix as the time spam of detection was higher. With this tool, it is more secure now because it is important to detect both the internal and external unauthorised things to secure application.
  • Detect internal unauthorised access
  • Detect external unusual activity
  • External threats
  • UI can be improve in case you are monitoring multiple DB
  • Multiple monitor DB getting slow the system
As I mentioned, it helps us to trigger our any unusual suspetious external or internal activity to secure application. Real time monitoring of the data help for secure data protection which helps to dected unusual threads.
Anshuman Bhatnagar | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
We use IBM Security Guardium as a database vulnerability assessment tool which will actively monitor potential threats, including insider threats at the database level. IBM Security Guardium not only checks against local compliance standards such as GDPR, PCI-DSS, CCPA, etc. but also alerts the security engineers in case of unauthorized access to the databases.

  • Vulnerability scan at database level
  • Supports databases of different flavors
  • Database activity monitoring
  • Integration with non-IBM SIEM solutions
  • Data Masking ability
  • IBM Security Guardium needs to provide better run books and guides for helping with the implementation
  • Ability to create custom reports from the admin portal will be a plus
  • UI is slow for the portal
IBM Security Guardium is the last line of defense against attackers, including insider threats. IBM Security Guardium helps in analyzing and reporting on database activity from both a compliance and security standpoint, provides evidence for breach investigations, and alerts on suspicious events. The ability to create customized detections is a plus.

Score 8 out of 10
Vetted Review
Verified User
We use IBM Security Guardium for auditing and identifying preventive behavior. For us it is very important to identify and remedy access intrusions and also to identify vulnerabilities in our databases
  • Access Auditing
  • vulnerability analysis
  • Identification of behavior
  • Updates often bring bugs
IBM Security Guardium works very well at discovering vulnerabilities and storing logs. On the other hand, there is a lot of room for improvement in the communication between the agent and the server and also in the updates.
ROHIT GOYAL | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Guardium is useful to monitor your onprem as well as on Cloud using traditional way and they have great new features to use such as Guardium Universal Connector, External S-TAP.

I like their Vulnerability Assessment feature and some very cool advanced feature like Blocking, Masking.

IBM support is very good to provide support of this product.

One of the very useful feature we use of this product is their Audit process Builder which provides audit functionality and to send the audit reports to external auditors to meet the compliance requirements.
  • Database Activity Monitoring
  • Vulnerability Assessment
  • Audit process
  • Central Management
  • Better documentation with examples
Well suited for heterogeneous environment. It supports most of the DB technology plus the classic Mainframe.
Meena Prasad | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
This software caught our attention because we noticed that it could provide us with good protection of our data; in our company, the flow of information is very active, and keeping our data vulnerable is not an option, but with IBM Security Guardium, we can manage analysis very well and protection of our data, it detects threats quickly, which allows us to have a lot of peace of mind and be sure of the functions that IBM Security Guardium offers us, since, in the 3 years that we have been using it, it has been beneficial and with notable results.
  • Speed in detecting threats.
  • Troubleshooting is fast, analytics are powerful.
  • It establishes good security parameters, and has precise functions to make decisions and solve problems quickly.
  • Although it is a relatively simple software to use, it requires a bit of knowledge, which a new user cannot do without consolidating some previous knowledge.
  • The technical support team is not ideal; although, on many occasions we have not needed their help, the times we have interacted it has left us wanting more.
It is a perfect system for companies with a high volume of data since it allows the data to be secure, the detection of threats is instantaneous and automatic, it does not require complicated procedures to configure it, it also adapts to internal needs and helps us to fix problems instantly. I am pleased to say that it is a system that I recommend for companies to stay away from threats and protect data in a very secure way.
Wiliam de Faria | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
As a result of the implementation of the General Data Protection Law LGPD and GDPR, we need to ensure that personal data are encrypted and monitored, in addition to allowing the process to discover these data and their vulnerabilities to guide the company, in addition to allowing the governance of these data on consumption times
  • compliance report
  • personal data discovery
  • data encryption
  • Monitor data access
  • risk assessment
  • integration with privacy management tools
  • application deployment on primese
  • integration with SAP
ensure the analysis of vulnerability and risk of personal data within the corporation and secure encryption of data in a fast and performative way, easy administration by administering cryptographic keys
Maria Coulter | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
We use IBM Security Guardium at Nexustek to protect our sensitive data and that of our clients in the cloud environment. The software efficiently encrypts and monitors crucial data and gives our teams an edge in mitigating threats. We also engage IBM Security Guardium to help speed up compliance activities by utilizing their ready-made regulation templates for HIPAA and PCI.
  • The pre-built templates gives us a better posture for observing compliance.
  • Automates data discovery.
  • Provides real time monitoring of data in your cloud environment.
  • The activities reports are usually clustered with stats making it complicated to run a full analysis.
We put great value on our client's data which prompts us to always have a robust and secure system to protect it. With IBM Security Guardium, data from your entire cloud environment is synchronously encrypted by an impenetrable system. The Guardium Vulnerability Assessment module scans for vulnerabilities or threats, tightening the security further.
Score 9 out of 10
Vetted Review
Verified User
We have been using this tool: IBM Security Guardium for over a year now and it is doing an immense job of protecting our highly critical data by minimizing the security threats. It makes the data monitoring pretty easy as everything is automated and gives us a proper report on a daily basis.
  • Allows us to set various level of permissions for each user for the access of data.
  • Unusual activities are immediately flagged and an alert is sent.
  • Easy auditing as per the compliances.
  • The support is bit inefficient.
  • Looks a little bit clunky and navigation is hard.
  • Could impact your system performance.
IBM Security Guardium is very well suited for large organizations and provides an end to end Data Security. All the activities related to your critical data are continuously monitored and all suspicious ones are alerted in real-time. There are a lot of functionalities available in this like reporting, dashboards, and easy integration.
rajat gaur | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
IBM Security Guardium provides us great security for our data and has been used in our department for over a year. It helps us in compliance with our data security processes, and it has worked exceptionally well for us across all our environments. It is a very reliable and safe system to use.
  • All the monitoring activities can easily be automated.
  • All the suspicious activities are instantly flagged and an alert is generated.
  • We can select access rights for each individual.
  • It is not very user-friendly and a bit hard to navigate for some of the functionalities.
  • Reports and Dashboards aren't very much customizable.
  • Deployment took a really long time.
IBM Security Guardium is very well suited for big organizations, and it helps us maintain data security by minimizing the risks and threats. The alerts functionality is very flexible and successful, but we faced some issues while integrating with the SIEM platform. The data component management is very efficient.
Score 8 out of 10
Vetted Review
Verified User
IBM Security Guardium is a great software being used in our organization. This is being used as a data activity monitoring tool and makes our life easier with an option to audit the activities of each individual user. Overall it is helping us to meet the compliance obligations to reduce the security threats.
  • Auditing of data can easily be centralized.
  • Automation of data monitoring reports.
  • It is scalable and effectively monitors the users for any suspicious activity.
  • It would have been great if this tool was more customizable.
  • The User Interface is a bit laggy and old fashioned.
  • It took ages for the proper deployment of this tool- could be made a bit easier and more efficient.
IBM Security Guardium is a bit of a pricey solution so it isn't a proper fit for small-mid level organizations. The alerts functionality is amazing and helps us a lot. Your critical data will stay secure with this tool because of its effective and easy administration.
Mansi Talwar | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
We are widely using IBM Security Guardium throughout the organization since it is being ranked as the number 1 product in the data security tools. It provides security against the sensitive data of the clients and also secures the cloud-based platforms such as NoSQL, Azure databases, and Hadoop as well. It provides pre-defined templates of reports as well that can be used as per the needs.
  • Allows the users to select the access rights.
  • Allows all the activities to be tracked and flagged.
  • Monitoring is quite easy.
  • Ability to support multiple databases.
  • GUI can be tricky for beginners.
  • Administration is very difficult.
  • Error logs are sometimes very difficult to understand.
It is best suited for large-scale organizations that require additional security over their databases and cloud-based databases as well. It is the best tool that provides a lot of features. It helps to detect unusual activities and helps to set up real-time triggers for individual accounts as well. With this product, it has now become very easier to protect user information.
Score 8 out of 10
Vetted Review
Verified User
IBM Security Guardium is an amazing tool that is currently being used in many departments of our organization to implement security policies. This is helping us a lot in securing our confidential data and minimizing security threats. It helps us in monitoring all the data activity to detect any kind of anomalies.
  • Prevention of any kind of data leak.
  • All the monitoring activities can be automated easily.
  • Easy integration with Hadoop and other databases.
  • GUI needs some improvement.
  • It is not highly customizable.
  • The visualization in the reports that are generated isn't much appealing.
IBM Security Guardium is very robust in terms of its functionalities and helps in accessing the real-time monitoring of our data. It has great automation power to maximize the data protection of your critical data. It is much more suitable for big organizations as compared to startups or small-level organizations.
Sebastian Zimmerman | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
With this tool we have implemented some additional security policies in the most vulnerable environments to prevent theft of confidential data, we establish authorizations for such access to information, we recognize user behavior in real-time to establish whether we are at risk, visibility of data is in full control with the centralization of audit data, accelerating all audits is a simple job and with resources available for all IT environments.
  • Centralization of audit data.
  • We can apply our security policies in real time.
  • I don't think it has negative features, although I think they should improve the response time of technical support, generally, the response time is long.
This software provides the security that every company seeks with the classification of confidential data from all areas, it can count the risks 100% without affecting performance. Access policies are another security feature that we know is necessary to create authorizations according to the position of each employee from different departments.
Return to navigation