Skip to main content
TrustRadius
IBM Security Guardium

IBM Security Guardium

Overview

What is IBM Security Guardium?

IBM Security Guardium is IBM's data security posture management solution, that aims to offer organizations comprehensive visibility, actionable insights and real-time controls to help users comply with regulations, preserve privacy and secure your sensitive data — no matter where it…

Read more
Recent Reviews

Guard

10 out of 10
February 19, 2024
We are using as db monitoring tool. Analyzing critical table manipulations, table exporting, db exporting etc.
We also thinking and …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Product Details

What is IBM Security Guardium?

Whether focusing on data use, protection, governance, or reporting, some businesses need a solution that supports a zero-trust approach to data security across its lifecycle on-premises or in the cloud. The IBM Security™ Guardium® portfolio protects sensitive and regulated data across fragmented environments. Here’s a peek at the products within the Guardium portfolio:

IBM Security Guardium Data Protection discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data.

IBM Security Guardium Insights provides centralized data security across the hybrid multi-cloud. Adapt and scale with modern architecture, streamline compliance and audit processes, and share contextual risk insights across security teams to support zero trust.

IBM Security Guardium Data Security Posture Management (DSPM) helps discover cloud shadow data, analyze data flow between regions, and uncover vulnerabilities across cloud and SaaS applications

IBM Security Guardium Data Encryption (GDE) consists of a unified suite of products built on a common infrastructure. These scalable solutions provide data encryption, tokenization, data masking, and key management capabilities to help protect and control access to data across the hybrid multi-cloud environment.

IBM Security Discover and Classify provides integrated discovery and classification of structured and unstructured data across all environments. IBM Security Discover and Classify is part of the IBM Security Guardium suite of products.

IBM Security Guardium Key Lifecycle Manager centralizes, simplifies, and automates the encryption key management process to help protect encrypted data and simplify encryption key management. Guardium Key Lifecycle Manager helps customers meet regulations such as PCI DSS, Sarbanes-Oxley, and HIPAA by providing access control, key rotation, and other automated key lifecycle management processes.

IBM Security Guardium Vulnerability Assessment scans data infrastructures such as databases, data warehouses, and big data environments to detect vulnerabilities and suggests remedial actions. This vulnerability assessment tool identifies exposures such as missing patches, weak passwords, unauthorized changes, and misconfigured privileges.

IBM Data Risk Manager provides executives and their teams with a business-consumable data risk control center that helps to uncover, analyze, and visualize data-related business risks so they can take action to protect their business.


https://ibm.biz/Security_Guardium_product_page




IBM Security Guardium Features

  • Supported: Ability to monitor, receive & issue alerts in real-time
  • Supported: Data encryption, data masking & tokenization
  • Supported: Advanced data threat analytics
  • Supported: Centralized management of encryption keys
  • Supported: Ability to manage data risk across complex IT environments
  • Supported: Ability to discover & analyze both structured & unstructured data assets
  • Supported: Vulnerability assessments & recommendations
  • Supported: Ability to maintain a tamper-proof audit trail
  • Supported: Compliance quick starts & features around compliance monitoring
  • Supported: Out-of-the-box dashboards
  • Supported: Ability to integrate with SIEM solutions
  • Supported: Ability to block, mask & quarantine data access
  • Supported: Flexible deployment options & variety of connectors
  • Supported: Ability to detect dormant accounts or misconfigured entitlements
  • Supported: Out-of-the-box discovery & classification patterns
  • Supported: Heterogeneous integration with other security solutions

IBM Security Guardium Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

IBM Security Guardium is IBM's data security posture management solution, that aims to offer organizations comprehensive visibility, actionable insights and real-time controls to help users comply with regulations, preserve privacy and secure your sensitive data — no matter where it is stored.

BigID, AWS Security Hub, and Oracle Security Monitoring and Analytics are common alternatives for IBM Security Guardium.

Reviewers rate Support Rating highest, with a score of 9.5.

The most common users of IBM Security Guardium are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(73)

Attribute Ratings

Reviews

(1-3 of 3)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Incentivized
IBM Security Guardium is used to detect internal threats in the organization, its detection process is very fast and it also looks for alternative solutions for threats. Sensitive data is often protected by minimizing threats. Provides alerts to any suspicious movement that is generated in the system and seeks to get rid of problems. It also serves to monitor and presents customizable dashboards. It's priced a little high for small businesses, but it's a price you can pay for full-featured software that's worth it.
  • Quickly detect hidden threats that try to enter our systems.
  • Find solutions for problems that directly affect our processes.
  • Protect data with good backup.
  • Provides detailed reports that help make future improvements.
  • Fast implementation but with little documentation.
  • Alert of very frequent threats with false positives.
  • Protect user information.
In summary, this tool in general has great potential, all the features that we have managed to test have been worth it, obtaining the expected results. It has the ability to protect all the internal data of your company. Implementing it is a wise choice there is no doubt about that, reporting, monitoring, automation, and threat protection, are the main functions that we use.
  • The consolidation of suridan's systems is progressing and this directly helps all departments.
  • Exponential growth of security by more than 30%.
  • It is gratifying to know that our ROI is very positive, this is achieved from the first year.
This aspect of this software is not the best at any stage, both in the implementation, configuration and use in genet there are always usability difficulties, this is because it lacks a good user interface and also lacks extensive documentation that allows Learn more about this software.
It is very common that it generates many security alerts with false positives, but considering that our security increased its efficiency and exponential growth by more than 30% without requiring new licenses, I believe that it has met and exceeded our expectations for the year, this can only be translated in very favorable results.
35
15
  • Improve data lifecycle.
  • Migrate to the cloud securely and quickly.
  • We perform secure cloud data migration.
  • Data migration process compliance management.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Maximum protection tool that makes it possible to know in a timely manner where the real threats are to any data, the analysis is exact and so fast that everything is solved before it happens. IBM Security Guardium constantly monitors all data in general, detailing any event immediately, offering accurate reports with monitoring and automation that allows us to be calm since the result is clear; on the other hand, this Artificial Intelligence helps us notably throughout the organization due to the agility with which it works, ultimately obtaining excellent dividends for everyone.
  • It's easy to implement, you don't need to be an expert.
  • The database is controlled and secure; its access is restricted to only authorized personnel.
  • The detection of threats is very good since the data will not be damaged because the monitoring of the software is very attentive, so the errors are analyzed before something can be damaged.
  • It has wonderful technical support willing to help at all times.
  • The navigation is not adequate, a lot of time is wasted, and it does not give up for that reason.
  • Each module has a price, this increases expenses.
  • Setup is not for newbies.
A consolidated company must maintain the security and total protection of its data in good hands, which is why IBM Security Guard offers for your benefit the most controlled and most appropriate security for your business. Although this tool is somewhat expensive, it is worth the risk to keep the data in full control. Risk activities in the organization will be detected in advance in order to avoid any serious damage that could affect the business's future, avoiding any theft that is confidential and compromising. This product is easy to implement and has good technical service.
  • Excellent job with the protection of information and access control to our database.
  • Its price is high for companies with a low budget, but considering the security of the data we obtain, I can say that it is the best.
  • Few tools can have tangible results in a short time; this allows IBM to continue being the leader.
This software is not the easiest to use in all work environments, each department has some difficulties accessing and managing some functions, it can be considered a complex softy, but I consider it necessary to have it in the company due to its security qualities of warm cans, it offers exactly what it promises but with a little difficulty in its configuration.
The security is real with this software; you can guarantee the security in our database and allow access only with some administrative permissions; we feel that the company has made the best deal in terms of data security. Everything is handled in real-time and has features that help to effectively manage all the company's high-risk systems. The modules it offers are varied and are implemented according to the needs of all departments.
60
Data security analyst, IT support, IT security engineer.
10
  • Confidential data classification.
  • Templates for regulations.
  • Security reports, confidential data analysis processes and vulnerability scanning system.
  • Discovering external and internal threats is a job of this software and is done automatically, it has a powerful and reliable data security approach.
Meena Prasad | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
This software caught our attention because we noticed that it could provide us with good protection of our data; in our company, the flow of information is very active, and keeping our data vulnerable is not an option, but with IBM Security Guardium, we can manage analysis very well and protection of our data, it detects threats quickly, which allows us to have a lot of peace of mind and be sure of the functions that IBM Security Guardium offers us, since, in the 3 years that we have been using it, it has been beneficial and with notable results.
  • Speed in detecting threats.
  • Troubleshooting is fast, analytics are powerful.
  • It establishes good security parameters, and has precise functions to make decisions and solve problems quickly.
  • Although it is a relatively simple software to use, it requires a bit of knowledge, which a new user cannot do without consolidating some previous knowledge.
  • The technical support team is not ideal; although, on many occasions we have not needed their help, the times we have interacted it has left us wanting more.
It is a perfect system for companies with a high volume of data since it allows the data to be secure, the detection of threats is instantaneous and automatic, it does not require complicated procedures to configure it, it also adapts to internal needs and helps us to fix problems instantly. I am pleased to say that it is a system that I recommend for companies to stay away from threats and protect data in a very secure way.
  • IBM Security Guardium offers great peace of mind; the security with which it protects data is very special, keeps threats away and allows us to solve problems immediately, minimizes risks, and increases data protection to 100%.
  • It reduces manual effort since the threat detection and data protection process is very agile and automated.
IBM Security Guardium has ten usability points since it has precise and very well-detailed functions to make the user experience as simple and efficient as possible, it allows very good navigation and a quick response to unexpected problems.
Currently, we have more peace of mind by keeping our data safe; it ensures that each user has the appropriate permissions to enter the system, the analyzes are very fast, with this system, we get fewer errors, since before using IBM Security Guardium we had great vulnerabilities in our data and few possibilities of resolution of problems.
45
35
  • The best thing about this software is that it protects our data by encrypting it, it is perfect for our encryption problems.
  • We use it to better manage our database, detect inefficiencies, and protect our data.
  • It is totally necessary for our database, it ensures the maximum functioning and security of our information.
It is a perfect system to detect problems that we do not see manually, it is light, with a very simple learning curve and with great protection of our data, we will use it forever.
Return to navigation