Skip to main content
TrustRadius
IBM Security Guardium

IBM Security Guardium

Overview

What is IBM Security Guardium?

IBM Security Guardium is IBM's data security posture management solution, that aims to offer organizations comprehensive visibility, actionable insights and real-time controls to help users comply with regulations, preserve privacy and secure your sensitive data — no matter where it…

Read more
Recent Reviews

Guard

10 out of 10
February 19, 2024
We are using as db monitoring tool. Analyzing critical table manipulations, table exporting, db exporting etc.
We also thinking and …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Product Details

What is IBM Security Guardium?

Whether focusing on data use, protection, governance, or reporting, some businesses need a solution that supports a zero-trust approach to data security across its lifecycle on-premises or in the cloud. The IBM Security™ Guardium® portfolio protects sensitive and regulated data across fragmented environments. Here’s a peek at the products within the Guardium portfolio:

IBM Security Guardium Data Protection discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data.

IBM Security Guardium Insights provides centralized data security across the hybrid multi-cloud. Adapt and scale with modern architecture, streamline compliance and audit processes, and share contextual risk insights across security teams to support zero trust.

IBM Security Guardium Data Security Posture Management (DSPM) helps discover cloud shadow data, analyze data flow between regions, and uncover vulnerabilities across cloud and SaaS applications

IBM Security Guardium Data Encryption (GDE) consists of a unified suite of products built on a common infrastructure. These scalable solutions provide data encryption, tokenization, data masking, and key management capabilities to help protect and control access to data across the hybrid multi-cloud environment.

IBM Security Discover and Classify provides integrated discovery and classification of structured and unstructured data across all environments. IBM Security Discover and Classify is part of the IBM Security Guardium suite of products.

IBM Security Guardium Key Lifecycle Manager centralizes, simplifies, and automates the encryption key management process to help protect encrypted data and simplify encryption key management. Guardium Key Lifecycle Manager helps customers meet regulations such as PCI DSS, Sarbanes-Oxley, and HIPAA by providing access control, key rotation, and other automated key lifecycle management processes.

IBM Security Guardium Vulnerability Assessment scans data infrastructures such as databases, data warehouses, and big data environments to detect vulnerabilities and suggests remedial actions. This vulnerability assessment tool identifies exposures such as missing patches, weak passwords, unauthorized changes, and misconfigured privileges.

IBM Data Risk Manager provides executives and their teams with a business-consumable data risk control center that helps to uncover, analyze, and visualize data-related business risks so they can take action to protect their business.


https://ibm.biz/Security_Guardium_product_page




IBM Security Guardium Features

  • Supported: Ability to monitor, receive & issue alerts in real-time
  • Supported: Data encryption, data masking & tokenization
  • Supported: Advanced data threat analytics
  • Supported: Centralized management of encryption keys
  • Supported: Ability to manage data risk across complex IT environments
  • Supported: Ability to discover & analyze both structured & unstructured data assets
  • Supported: Vulnerability assessments & recommendations
  • Supported: Ability to maintain a tamper-proof audit trail
  • Supported: Compliance quick starts & features around compliance monitoring
  • Supported: Out-of-the-box dashboards
  • Supported: Ability to integrate with SIEM solutions
  • Supported: Ability to block, mask & quarantine data access
  • Supported: Flexible deployment options & variety of connectors
  • Supported: Ability to detect dormant accounts or misconfigured entitlements
  • Supported: Out-of-the-box discovery & classification patterns
  • Supported: Heterogeneous integration with other security solutions

IBM Security Guardium Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

IBM Security Guardium is IBM's data security posture management solution, that aims to offer organizations comprehensive visibility, actionable insights and real-time controls to help users comply with regulations, preserve privacy and secure your sensitive data — no matter where it is stored.

BigID, AWS Security Hub, and Oracle Security Monitoring and Analytics are common alternatives for IBM Security Guardium.

Reviewers rate Support Rating highest, with a score of 9.5.

The most common users of IBM Security Guardium are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(74)

Attribute Ratings

Reviews

(1-25 of 33)
Companies can't remove reviews or game the system. Here's why
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • It has pre-set database monitoring and security policies, so we don't need to configure them manually.
  • Automatically finds threats in our database and offers customisable rules and alerts.
  • Automates data compliance across all our environments.
  • Helped us eliminate a lot of manual tasks.
  • The report and logs sometimes don't provide enough information and can be hard to understand.
  • Needs to improve their support response time.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • tool simplifies
  • centralized management
  • provide data security
  • gklm does not work after upgrade version,
  • glkm database user's password can not be changed
  • usable data protection
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Connection to Other IBM products Seemless ( Cloud PAK for data , integration and Other IBM Products and Dbs )
  • Vulnerability Assessment and Risk Management to comply with PCI and Governamental Data Authority
  • Real-time Data Activity Monitoring seeing all activities happeing in Organization
  • some of the sevices not already integrable in direct way perhaps if there is a store for it would be better
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • AI scanning capabilities to detect anomalies in the database.
  • Can easily monitor and automate task.
  • Can know how secure the database with the anomaly score.
  • Not every alert you get is due to an anomaly but sometimes it can also be due to false positives.
  • Support takes a lot of time to respond and documentation is not adequate.
  • And a missing functionality that I can think of is to add custom alert option through email.
February 19, 2024

Guard

Score 10 out of 10
Vetted Review
Verified User
  • Monitoring
  • Protecting
  • Data Classification
  • Firewall
  • Vulnerability Assesment
  • Retention size for keeping long period of data
  • Aggregators are not useful
  • Technical Supoort is not efficient on vendor site
Brandon Lowry | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Provides complete monitoring of data access and usage activities.
  • Provides customizable security controls and policies that help us meet compliance and regulatory requirements.
  • Uses advanced algorithms and machine learning to detect abnormal behavior patterns.
  • Helps us protect sensitive and confidential data by controlling access.
  • Integrates easily with other security systems and tools.
  • Configuration and set-up can be complex and require some time and effort to implement correctly.
  • The cost of acquiring and maintaining IBM Guardium can be significant.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Quickly detect hidden threats that try to enter our systems.
  • Find solutions for problems that directly affect our processes.
  • Protect data with good backup.
  • Provides detailed reports that help make future improvements.
  • Fast implementation but with little documentation.
  • Alert of very frequent threats with false positives.
  • Protect user information.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • It's easy to implement, you don't need to be an expert.
  • The database is controlled and secure; its access is restricted to only authorized personnel.
  • The detection of threats is very good since the data will not be damaged because the monitoring of the software is very attentive, so the errors are analyzed before something can be damaged.
  • It has wonderful technical support willing to help at all times.
  • The navigation is not adequate, a lot of time is wasted, and it does not give up for that reason.
  • Each module has a price, this increases expenses.
  • Setup is not for newbies.
September 27, 2023

Data protection solution

Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Detect internal unauthorised access
  • Detect external unusual activity
  • External threats
  • UI can be improve in case you are monitoring multiple DB
  • Multiple monitor DB getting slow the system
Anshuman Bhatnagar | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Vulnerability scan at database level
  • Supports databases of different flavors
  • Database activity monitoring
  • Integration with non-IBM SIEM solutions
  • Data Masking ability
  • IBM Security Guardium needs to provide better run books and guides for helping with the implementation
  • Ability to create custom reports from the admin portal will be a plus
  • UI is slow for the portal
Meena Prasad | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Speed in detecting threats.
  • Troubleshooting is fast, analytics are powerful.
  • It establishes good security parameters, and has precise functions to make decisions and solve problems quickly.
  • Although it is a relatively simple software to use, it requires a bit of knowledge, which a new user cannot do without consolidating some previous knowledge.
  • The technical support team is not ideal; although, on many occasions we have not needed their help, the times we have interacted it has left us wanting more.
Maria Coulter | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • The pre-built templates gives us a better posture for observing compliance.
  • Automates data discovery.
  • Provides real time monitoring of data in your cloud environment.
  • The activities reports are usually clustered with stats making it complicated to run a full analysis.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Allows us to set various level of permissions for each user for the access of data.
  • Unusual activities are immediately flagged and an alert is sent.
  • Easy auditing as per the compliances.
  • The support is bit inefficient.
  • Looks a little bit clunky and navigation is hard.
  • Could impact your system performance.
rajat gaur | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • All the monitoring activities can easily be automated.
  • All the suspicious activities are instantly flagged and an alert is generated.
  • We can select access rights for each individual.
  • It is not very user-friendly and a bit hard to navigate for some of the functionalities.
  • Reports and Dashboards aren't very much customizable.
  • Deployment took a really long time.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Auditing of data can easily be centralized.
  • Automation of data monitoring reports.
  • It is scalable and effectively monitors the users for any suspicious activity.
  • It would have been great if this tool was more customizable.
  • The User Interface is a bit laggy and old fashioned.
  • It took ages for the proper deployment of this tool- could be made a bit easier and more efficient.
Mansi Talwar | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Allows the users to select the access rights.
  • Allows all the activities to be tracked and flagged.
  • Monitoring is quite easy.
  • Ability to support multiple databases.
  • GUI can be tricky for beginners.
  • Administration is very difficult.
  • Error logs are sometimes very difficult to understand.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Prevention of any kind of data leak.
  • All the monitoring activities can be automated easily.
  • Easy integration with Hadoop and other databases.
  • GUI needs some improvement.
  • It is not highly customizable.
  • The visualization in the reports that are generated isn't much appealing.
Return to navigation