Skip to main content
TrustRadius
IBM Security Guardium

IBM Security Guardium

Overview

What is IBM Security Guardium?

IBM Security Guardium is IBM's data security posture management solution, that aims to offer organizations comprehensive visibility, actionable insights and real-time controls to help users comply with regulations, preserve privacy and secure your sensitive data — no matter where it…

Read more
Recent Reviews

Guard

10 out of 10
February 19, 2024
We are using as db monitoring tool. Analyzing critical table manipulations, table exporting, db exporting etc.
We also thinking and …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Product Details

What is IBM Security Guardium?

Whether focusing on data use, protection, governance, or reporting, some businesses need a solution that supports a zero-trust approach to data security across its lifecycle on-premises or in the cloud. The IBM Security™ Guardium® portfolio protects sensitive and regulated data across fragmented environments. Here’s a peek at the products within the Guardium portfolio:

IBM Security Guardium Data Protection discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data.

IBM Security Guardium Insights provides centralized data security across the hybrid multi-cloud. Adapt and scale with modern architecture, streamline compliance and audit processes, and share contextual risk insights across security teams to support zero trust.

IBM Security Guardium Data Security Posture Management (DSPM) helps discover cloud shadow data, analyze data flow between regions, and uncover vulnerabilities across cloud and SaaS applications

IBM Security Guardium Data Encryption (GDE) consists of a unified suite of products built on a common infrastructure. These scalable solutions provide data encryption, tokenization, data masking, and key management capabilities to help protect and control access to data across the hybrid multi-cloud environment.

IBM Security Discover and Classify provides integrated discovery and classification of structured and unstructured data across all environments. IBM Security Discover and Classify is part of the IBM Security Guardium suite of products.

IBM Security Guardium Key Lifecycle Manager centralizes, simplifies, and automates the encryption key management process to help protect encrypted data and simplify encryption key management. Guardium Key Lifecycle Manager helps customers meet regulations such as PCI DSS, Sarbanes-Oxley, and HIPAA by providing access control, key rotation, and other automated key lifecycle management processes.

IBM Security Guardium Vulnerability Assessment scans data infrastructures such as databases, data warehouses, and big data environments to detect vulnerabilities and suggests remedial actions. This vulnerability assessment tool identifies exposures such as missing patches, weak passwords, unauthorized changes, and misconfigured privileges.

IBM Data Risk Manager provides executives and their teams with a business-consumable data risk control center that helps to uncover, analyze, and visualize data-related business risks so they can take action to protect their business.


https://ibm.biz/Security_Guardium_product_page




IBM Security Guardium Features

  • Supported: Ability to monitor, receive & issue alerts in real-time
  • Supported: Data encryption, data masking & tokenization
  • Supported: Advanced data threat analytics
  • Supported: Centralized management of encryption keys
  • Supported: Ability to manage data risk across complex IT environments
  • Supported: Ability to discover & analyze both structured & unstructured data assets
  • Supported: Vulnerability assessments & recommendations
  • Supported: Ability to maintain a tamper-proof audit trail
  • Supported: Compliance quick starts & features around compliance monitoring
  • Supported: Out-of-the-box dashboards
  • Supported: Ability to integrate with SIEM solutions
  • Supported: Ability to block, mask & quarantine data access
  • Supported: Flexible deployment options & variety of connectors
  • Supported: Ability to detect dormant accounts or misconfigured entitlements
  • Supported: Out-of-the-box discovery & classification patterns
  • Supported: Heterogeneous integration with other security solutions

IBM Security Guardium Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

IBM Security Guardium is IBM's data security posture management solution, that aims to offer organizations comprehensive visibility, actionable insights and real-time controls to help users comply with regulations, preserve privacy and secure your sensitive data — no matter where it is stored.

BigID, AWS Security Hub, and Oracle Security Monitoring and Analytics are common alternatives for IBM Security Guardium.

Reviewers rate Support Rating highest, with a score of 9.5.

The most common users of IBM Security Guardium are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(73)

Attribute Ratings

Reviews

(1-7 of 7)
Companies can't remove reviews or game the system. Here's why
FURKAN GÖKCAN | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We provide consultancy services to provide customers with the most efficiency in every aspect of this product. In Turkey, we have a customer portfolio that includes 90% of the companies that are regulated in terms of database security. In customer environment, we personally deal with GUI and cli management of Guardium, which provides solutions to issues such as database logging and alarming.
  • Collecting Logs
  • Syslog and Mail alerts
  • Guardium ISO installation
  • Agent installation and uninstallation
  • We had big troubles with GIM certificate update
  • IBM Support Engineers
  • Guardium Self-Audit
It is an adequate product for many purposes. It has a very stable structure in terms of installation, policy and report layout, and database logging. It has a very smooth and simple process for patch upgrading. We can use correlation alarms very effectively. Inactive STAP and Inactive Managed Unit alerts are life saver in some cases. Also, buff usage monitor is a beautiful interface and the buffer of agents is crucial not to lose logs. But, Guardium is not logging tool activities. Also, not logging ".sql" scripts.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Maximum protection tool that makes it possible to know in a timely manner where the real threats are to any data, the analysis is exact and so fast that everything is solved before it happens. IBM Security Guardium constantly monitors all data in general, detailing any event immediately, offering accurate reports with monitoring and automation that allows us to be calm since the result is clear; on the other hand, this Artificial Intelligence helps us notably throughout the organization due to the agility with which it works, ultimately obtaining excellent dividends for everyone.
  • It's easy to implement, you don't need to be an expert.
  • The database is controlled and secure; its access is restricted to only authorized personnel.
  • The detection of threats is very good since the data will not be damaged because the monitoring of the software is very attentive, so the errors are analyzed before something can be damaged.
  • It has wonderful technical support willing to help at all times.
  • The navigation is not adequate, a lot of time is wasted, and it does not give up for that reason.
  • Each module has a price, this increases expenses.
  • Setup is not for newbies.
A consolidated company must maintain the security and total protection of its data in good hands, which is why IBM Security Guard offers for your benefit the most controlled and most appropriate security for your business. Although this tool is somewhat expensive, it is worth the risk to keep the data in full control. Risk activities in the organization will be detected in advance in order to avoid any serious damage that could affect the business's future, avoiding any theft that is confidential and compromising. This product is easy to implement and has good technical service.
Meena Prasad | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
This software caught our attention because we noticed that it could provide us with good protection of our data; in our company, the flow of information is very active, and keeping our data vulnerable is not an option, but with IBM Security Guardium, we can manage analysis very well and protection of our data, it detects threats quickly, which allows us to have a lot of peace of mind and be sure of the functions that IBM Security Guardium offers us, since, in the 3 years that we have been using it, it has been beneficial and with notable results.
  • Speed in detecting threats.
  • Troubleshooting is fast, analytics are powerful.
  • It establishes good security parameters, and has precise functions to make decisions and solve problems quickly.
  • Although it is a relatively simple software to use, it requires a bit of knowledge, which a new user cannot do without consolidating some previous knowledge.
  • The technical support team is not ideal; although, on many occasions we have not needed their help, the times we have interacted it has left us wanting more.
It is a perfect system for companies with a high volume of data since it allows the data to be secure, the detection of threats is instantaneous and automatic, it does not require complicated procedures to configure it, it also adapts to internal needs and helps us to fix problems instantly. I am pleased to say that it is a system that I recommend for companies to stay away from threats and protect data in a very secure way.
Mansi Talwar | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We are widely using IBM Security Guardium throughout the organization since it is being ranked as the number 1 product in the data security tools. It provides security against the sensitive data of the clients and also secures the cloud-based platforms such as NoSQL, Azure databases, and Hadoop as well. It provides pre-defined templates of reports as well that can be used as per the needs.
  • Allows the users to select the access rights.
  • Allows all the activities to be tracked and flagged.
  • Monitoring is quite easy.
  • Ability to support multiple databases.
  • GUI can be tricky for beginners.
  • Administration is very difficult.
  • Error logs are sometimes very difficult to understand.
It is best suited for large-scale organizations that require additional security over their databases and cloud-based databases as well. It is the best tool that provides a lot of features. It helps to detect unusual activities and helps to set up real-time triggers for individual accounts as well. With this product, it has now become very easier to protect user information.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
IBM Security Guardium is currently being used in some of the departments in my organization. This tool helps us in getting more control over our data along with great security. This also helps us in detecting unusual activities in our company. It has a set of predefined policies that helps us a lot during the audit processes.
  • It provides data classification so the customers don't have to take care of the SQL traffic.
  • It is very easy to install on the existing databases and prevents the data losses.
  • This provides a great security to our sensitive data.
  • The User Interface needs some improvement.
  • Reporting feature is not very customizable.
  • The error messages are very difficult to interpret.
  • The deployment process could be bit lengthy.
IBM Security Guardium is a costly solution so it is not recommended for Small to mid-size organizations. The architecture is great which helps in the management of different components and makes the process very efficient. The alert/notifications flexibility is really successful and comes in very handy. Your sensitive data is very much secured because of this tool.
Sourabh Yaduvanshi | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Helping to mature IBM Security Guardium capability, onboarding databases, monitoring, and fine-tuning the policies, vulnerability assessment for the client, help to identify the crown jewels, identify where the sensitive data resides, installation of STAP and GIM, integration with 3 party SIEM tool and also with Qradar. Scan the databases and submits a report with complete finding based on the compliance template
  • End to End Discovery
  • Classification process and policy
  • Vulnerability assessment
  • once the report generated there should be remediation steps too
  • it has limited functionality on file level logging, like who access what
  • interface should be more user friendly
The client doesn't have any idea how many databases they have and where the sensitive data is located, so we use end to end discovery modules and identified all the credit card data wherever stored in which table or which column, also provide the complete report and its remediation steps with the help of end to end discovery report
Adem Çeltik | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
ResellerIncentivized
IBM Security Guardium is a very useful tool to classify the sensitive data on your relational or non-relational databases, and monitor the activities of end users that can access the databases, like DBAs, Application Developers, etc. It supports almost every database and operating system platforms on our environment, so we can use it wherever our critical data is stored. IBM Security Guardium also helps organizations to be ready for audits like SOX, PCI, HIPAA, GDPR and etc. It has accelerators to be ready for almost every popular audits. The predefined policies and reports help us to pass the audits.

As everybody knows, GDPR will affect all the auditing mechanisms in the organizations. Every organizations store data that are subject to GDPR. IBM Security Guardium can easily find the tables,fields, views that stores the GDPR related data with its predefined classifications policies. It is free with base license. We are also using Guardium Vulnerability assessment tool to find the vulnerabilities about privilege, configuration and authentication on our databases.
  • Activity Monitoring : IBM Guardium monitors our databases without changing any configurations on the databases and servers. The STAP agent that push the SQL traffic from the database server to Guardium collectors is very robust, and it runs with minimum requirements.
  • You can define the activities to the finest detail in the policies to take actions. You can define the critical activities for your organizations and take the real time alerts for critical activities.
  • Classification : It has pre-defined Classification policies for GDPR to find critical data locations on our databases. Classification policy builder is easy to use if you want to write your own classification policy.
  • Reporting mechanism is very straight forward, to find logs. You can easily schedule them to distribute your colleagues to review them.
  • GUI was very complex older than v10, it becomes a little bit easy to use, but the user interface should be developed to become easier.
  • The error logs are hard to understand. If there is an issue about any function, the error messages cannot be understand easily.
IBM Security Guardium is an end-to-end DB security solution. You can detect critical data on your databases, and monitor your database activities , and you can block some critical sqls that the users should not be run.
IBM Security Guardium is not appropriate for monitoring applications traffic, because when you want to monitor application traffic, you cannot define the end user easily, and the SQL activities are difficult to interpret the jobs on the application.
Return to navigation