Skip to main content
TrustRadius
IBM Security Guardium

IBM Security Guardium

Overview

What is IBM Security Guardium?

IBM Security Guardium is IBM's data security posture management solution, that aims to offer organizations comprehensive visibility, actionable insights and real-time controls to help users comply with regulations, preserve privacy and secure your sensitive data — no matter where it…

Read more
Recent Reviews

Guard

10 out of 10
February 19, 2024
We are using as db monitoring tool. Analyzing critical table manipulations, table exporting, db exporting etc.
We also thinking and …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Product Details

What is IBM Security Guardium?

Whether focusing on data use, protection, governance, or reporting, some businesses need a solution that supports a zero-trust approach to data security across its lifecycle on-premises or in the cloud. The IBM Security™ Guardium® portfolio protects sensitive and regulated data across fragmented environments. Here’s a peek at the products within the Guardium portfolio:

IBM Security Guardium Data Protection discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data.

IBM Security Guardium Insights provides centralized data security across the hybrid multi-cloud. Adapt and scale with modern architecture, streamline compliance and audit processes, and share contextual risk insights across security teams to support zero trust.

IBM Security Guardium Data Security Posture Management (DSPM) helps discover cloud shadow data, analyze data flow between regions, and uncover vulnerabilities across cloud and SaaS applications

IBM Security Guardium Data Encryption (GDE) consists of a unified suite of products built on a common infrastructure. These scalable solutions provide data encryption, tokenization, data masking, and key management capabilities to help protect and control access to data across the hybrid multi-cloud environment.

IBM Security Discover and Classify provides integrated discovery and classification of structured and unstructured data across all environments. IBM Security Discover and Classify is part of the IBM Security Guardium suite of products.

IBM Security Guardium Key Lifecycle Manager centralizes, simplifies, and automates the encryption key management process to help protect encrypted data and simplify encryption key management. Guardium Key Lifecycle Manager helps customers meet regulations such as PCI DSS, Sarbanes-Oxley, and HIPAA by providing access control, key rotation, and other automated key lifecycle management processes.

IBM Security Guardium Vulnerability Assessment scans data infrastructures such as databases, data warehouses, and big data environments to detect vulnerabilities and suggests remedial actions. This vulnerability assessment tool identifies exposures such as missing patches, weak passwords, unauthorized changes, and misconfigured privileges.

IBM Data Risk Manager provides executives and their teams with a business-consumable data risk control center that helps to uncover, analyze, and visualize data-related business risks so they can take action to protect their business.


https://ibm.biz/Security_Guardium_product_page




IBM Security Guardium Features

  • Supported: Ability to monitor, receive & issue alerts in real-time
  • Supported: Data encryption, data masking & tokenization
  • Supported: Advanced data threat analytics
  • Supported: Centralized management of encryption keys
  • Supported: Ability to manage data risk across complex IT environments
  • Supported: Ability to discover & analyze both structured & unstructured data assets
  • Supported: Vulnerability assessments & recommendations
  • Supported: Ability to maintain a tamper-proof audit trail
  • Supported: Compliance quick starts & features around compliance monitoring
  • Supported: Out-of-the-box dashboards
  • Supported: Ability to integrate with SIEM solutions
  • Supported: Ability to block, mask & quarantine data access
  • Supported: Flexible deployment options & variety of connectors
  • Supported: Ability to detect dormant accounts or misconfigured entitlements
  • Supported: Out-of-the-box discovery & classification patterns
  • Supported: Heterogeneous integration with other security solutions

IBM Security Guardium Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

IBM Security Guardium is IBM's data security posture management solution, that aims to offer organizations comprehensive visibility, actionable insights and real-time controls to help users comply with regulations, preserve privacy and secure your sensitive data — no matter where it is stored.

BigID, AWS Security Hub, and Oracle Security Monitoring and Analytics are common alternatives for IBM Security Guardium.

Reviewers rate Support Rating highest, with a score of 9.5.

The most common users of IBM Security Guardium are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(72)

Attribute Ratings

Reviews

(1-4 of 4)
Companies can't remove reviews or game the system. Here's why
Wiliam de Faria | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
As a result of the implementation of the General Data Protection Law LGPD and GDPR, we need to ensure that personal data are encrypted and monitored, in addition to allowing the process to discover these data and their vulnerabilities to guide the company, in addition to allowing the governance of these data on consumption times
  • compliance report
  • personal data discovery
  • data encryption
  • Monitor data access
  • risk assessment
  • integration with privacy management tools
  • application deployment on primese
  • integration with SAP
ensure the analysis of vulnerability and risk of personal data within the corporation and secure encryption of data in a fast and performative way, easy administration by administering cryptographic keys
  • real-time monitoring of data consumption
  • performative cryptography
  • fast integration with databases
vast teaching and learning material, many forums and training always available with pre and post-sales support
with a UX based on cloud administration it brings ease and good user experience, the provision of functionality is simple and easily understood
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We have a wide view of organization databases with Guardium solutions. We have more control over the data and they are facing in a better way the audits. We use the documents and daily reports for audits and verifications. Security in databases is also improved due to features such as CAS or Vulnerability Assessments.
  • Give a range of commands to scope amount of data collected.
  • Helps in aggregating the collected data well.
  • Helps in being compliant with standards.
  • Graphs have scope of improvement in reports.
  • Data classification is a very powerful tool but it does not provide an incremental of the sensitive data found.
  • Deployment process is time taking and slow.
Auditors look for reports that Guardium provides to have a good look into who has access to data and what level of commands are running. Guardium reports are also used for Analytics by some teams in my environment.
  • The tool is well received.
  • The tools is heavy in storage and backup in terms of data.
  • The tools keeps the auditors happy.
The Guardium is a complete tool to be used in terms of compliance, analytics, DBA, and other monitoring.
It has multiple features for Database monitoring and security from vulnerability assessment to login failures.
Zinnur Dikici, Msc | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
We use it as the main solution for monitoring database activity in a bank. I have used IBM Guardium in companies that I worked with before. We use IBM Guardium for tracking database activities and also detection vulnerabilities such as SQLi at a database. The main requirements for use are to detect unusual activities in our company and meet industry regulations. We like the architecture of IBM Guardium.
  • Very stable product.
  • The architectural structure of the product provides very stable usage.
  • The product is not very user friendly.
  • Sometimes building queries and reports can be very complicated.
The product integration is very bad on the SIEM platform. We also use IBM Qradar (the same product). While alerts can be sent successfully with Syslog, admin activities cannot be sent successfully. According to us, alert/query flexibility is very successful. Also, data masking is better at alerts, queries or reports. Due to its architecture, the management of all components is very efficient. Database vulnerability scanning with the same agent is also excellent.
  • We have passed audits without penalties.
  • We have detected access and configuration vulnerabilities on database without abuse. We did not [experience a] financial loss due to these determinations.
The architecture of IBM Guardium give us flexibility to access activities, create policies and management. Easy deployment and stabilization of product can be other reason for preference. Can be easy manage and track activities' backup node of databases in a disaster recovery center. At the same time [we can] provide a strong backup mechanism with this structure. It can be also provide a vulnerability scan with the same product.
In the last few years there has been slow and unsolved in support from IBM. Not only for IBM Guardium but also for other IBM products.
Tenable.sc (formerly SecurityCenter), Symantec Data Loss Prevention, Microsoft Advanced Threat Analytics (formerly Aorato)
Score 7 out of 10
Vetted Review
Verified User
Incentivized
Our whole company utilizes Security Guardium. Working at the homeless shelter, we manage numerous private cases and sensitive material on data basis. We must keep everything secure and private to ensure the integrity of the information. We must safeguard our critical data as much as possible and use IBM's services in order to do this.
  • Safeguard sensitive client information and data.
  • Prevents leaks from databases to ensure the most secure knowledge and details our company has.
  • Easy-to-use features and a user-friendly platform for all levels of expertise.
  • Needs a clearer user agreement and authorization policy.
  • Needs to be more clear and straightforward about how exactly it reduces data risks and keeps things secure.
  • I wish there were fewer steps to get started in the program, it is easier to use, but it needs to be quicker.
When dealing with client information, IBM Security Guardium is well suited. Also, when dealing with internal company secrets and data, IBM will make sure it is secure and safe. Scenarios where it is less appropriate could be for the general public and individuals rather than larger companies. I believe that this service is well intended and useful.
  • It has had a positive impact in keeping my company's data secure and safe. It has been worth the money and I believe a good return on my investment.
  • It has made our clients trust in our process more and our company's employees can rest easy knowing our data is safe.
  • The longevity of this product is also a positive area.
IBM is the only company that I have used. It is reliable and easy to use, I trust it and my company and employers do as well.
There has been great support coming from IBM. It is easy to use and a great way to keep our data secure. I would recommend this to other possible users and if I were to move companies, I would recommend we use this there too. Thank you.
Return to navigation