End to End Security Solution for Databases , Detect , protect , monitor and manage your critical data
April 07, 2022

End to End Security Solution for Databases , Detect , protect , monitor and manage your critical data

Sourabh Yaduvanshi | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with IBM Security Guardium

Helping to mature IBM Security Guardium capability, onboarding databases, monitoring, and fine-tuning the policies, vulnerability assessment for the client, help to identify the crown jewels, identify where the sensitive data resides, installation of STAP and GIM, integration with 3 party SIEM tool and also with Qradar. Scan the databases and submits a report with complete finding based on the compliance template
  • End to End Discovery
  • Classification process and policy
  • Vulnerability assessment
  • once the report generated there should be remediation steps too
  • it has limited functionality on file level logging, like who access what
  • interface should be more user friendly
  • its a value for money
  • certified resource are hard to find so internal training cost would be high
  • lack of proper documentation with free trainings specially on Guardium
even its a little bit complex but once you get the right set of documentation that is provided by the channel partner so it is a smooth way to go and no vice can be an expert after attending training and hands-on experience in cloud lab that is very much useful and well equipped
As per the regulatory compliance guideline we have to make sure the confidential and personal data are encrypted and strictly monitored, with the IBM Security Guardium capability of robust cryptography and fast integration with the database enables us to do the complete task efficiently and onboarding of new database and their monitoring is now very easy and effective
When compared to the others, IBM Security Guardium offers a decent platform. In South Africa, IBM Security Guardium users are ecstatic, therefore it's a winner. The agent's stability is superior to that of others. It outperforms the competition (Vulnerability Assessment, Database Discovery, Data Classification, etc.) Local support is excellent; other products have similar functionality but are more difficult to apply.

Do you think IBM Security Guardium delivers good value for the price?

Yes

Are you happy with IBM Security Guardium's feature set?

Yes

Did IBM Security Guardium live up to sales and marketing promises?

Yes

Did implementation of IBM Security Guardium go as expected?

Yes

Would you buy IBM Security Guardium again?

Yes

The client doesn't have any idea how many databases they have and where the sensitive data is located, so we use end to end discovery modules and identified all the credit card data wherever stored in which table or which column, also provide the complete report and its remediation steps with the help of end to end discovery report