See how IBM Guardium Data Protection ensures 360 data protection.
October 30, 2025
See how IBM Guardium Data Protection ensures 360 data protection.
Score 10 out of 10
Vetted Review
Modules Used
- IBM Security Guardium Data Protection
- IBM Guardium DDR (Data Detection and Response)
- IBM Security Guardium Data Security Posture Management (DSPM)
- IBM Security Guardium Data Encryption (GDE)
- IBM Guardium AI Security
- IBM Security Guardium Vulnerability Assessment
Overall Satisfaction with IBM Guardium
IBM Guardium Data Protection and Vulnerability Assessment has helped me gain visibility into who, how, where, when, and in what ways sensitive data is being accessed within the organization. Usually, our sensitive data is stored in relational databases and non-relational, storage systems with unstructured sensitive data. Being able to discover vulnerabilities that could impact sensitive data has been another huge achievement. This has allowed us to understand the level of risk in accessing sensitive data. We have also been able to identify and trace all operations of database administrators and users who have access to sensitive data.
Pros
- It allows us to discover sensitive data, where it is located, and within which repository it is located.
- It allows us to have visibility and audit trails of all user interactions with sensitive data repositories in real time.
- It helps us build and deliver the required regulatory compliance reports much more quickly.
- It allows us to create policies for the separation of roles and functions within access to sensitive data.
- It allows us to investigate incidents with the help of analytics, behavioral, and artificial intelligence engines that analyze user behavior to detect variations and identify risks.
Cons
- Allow viewing user entitlement reports graphically or through dashboards.
- Allow integration with Watson.X Orchestrate and Watson.X Governance to integrate analytics on data usage, risk, and usability, possibly integrating with LLM models or AI Agents.
- It would be interesting if GDP could uncover Shadow Data as well.
- IBM Guardium DP has streamlined the identification time for suspicious access to sensitive data in real time.
- IBM Guardium DP has helped the organization efficiently and quickly deliver compliance reports or reports required by internal departments in a timely and effective manner.
- IBM Guardium DP has supported the investigation and response process for incidents involving sensitive data that put the organization at risk due to a regulation or compliance standard.
Among the most powerful capabilities of IBM Guardium DP, we can describe the Investigator Dashboard for in-depth incident investigations.
Now the Active Threat Analytics for detecting compromised users and databases, identifying which users are at risk, and their risk level, thus deepening the investigations with this tool.
And finally, Active Risk Spotter for a clear view and accurate risk indicator, allowing you to understand how the risk indicators are impacting the organization.
Now the Active Threat Analytics for detecting compromised users and databases, identifying which users are at risk, and their risk level, thus deepening the investigations with this tool.
And finally, Active Risk Spotter for a clear view and accurate risk indicator, allowing you to understand how the risk indicators are impacting the organization.
IBM Guardium DP's capabilities have allowed us to reduce detection times and conduct early investigations into incidents involving our assets monitored by the solution. It has given us visibility into unauthorized access to sensitive data and allowed us to be precise in our investigations, allowing us to see specifically what triggered a threat. It has allowed us to optimize investigation times and generate compliance reports much more efficiently.
If I compare Imperva to IBM Guardium, I could define three very important differentiators. The first is that IBM Guardium has a much more advanced suite of analytical investigation and risk detection tools than Imperva, which allows for a turnkey solution with IBM Guardium Data Protection product, allowing for greater efficiency in incident detection and response to the same threats. The second differentiator is support for monitoring unstructured data, such as Word files, PowerPoint files, Excel files, PDF files, among others, stored in a Windows or Linux file server, data stored in SharePoint, and finally, data stored on a NAS. Imperva lacks this feature for monitoring unstructured data, so IBM Guardium Data Protection is the winner and helps organizations cover the entire overall scope of data repositories. And finally, I'd like to emphasize support and compatibility for relational databases, DBaaS, and market databases, which I've seen Imperva lack coverage for. IBM Guardium has greater monitoring and protection coverage for databases, whether relational or non-relational, cloud database services, and even mainframes with indexed file systems.
Do you think IBM Guardium delivers good value for the price?
Yes
Are you happy with IBM Guardium's feature set?
Yes
Did IBM Guardium live up to sales and marketing promises?
Yes
Did implementation of IBM Guardium go as expected?
Yes
Would you buy IBM Guardium again?
Yes


Comments
Please log in to join the conversation