Modern user access control based on role.
May 03, 2022

Modern user access control based on role.

Sebastian Zimmerman | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with IBM Security Guardium

With this tool we have implemented some additional security policies in the most vulnerable environments to prevent theft of confidential data, we establish authorizations for such access to information, we recognize user behavior in real-time to establish whether we are at risk, visibility of data is in full control with the centralization of audit data, accelerating all audits is a simple job and with resources available for all IT environments.
  • Centralization of audit data.
  • We can apply our security policies in real time.
  • I don't think it has negative features, although I think they should improve the response time of technical support, generally, the response time is long.
  • Increasing business security is a key factor in increasing return on investment.
  • Authorizations according to the user's role.
From the beginning, we know how to use this software, and we have no problems configuring, installing, and implementing it. Guardium has a simple and easy-to-understand user interface, it does not require long training processes or help from technical support.
With reliable data audits, a centralized system, access control, determination with security analysis, and advanced visibility management, we can correct threats in real-time with scalable functions.

Do you think IBM Security Guardium delivers good value for the price?

Yes

Are you happy with IBM Security Guardium's feature set?

Yes

Did IBM Security Guardium live up to sales and marketing promises?

Yes

Did implementation of IBM Security Guardium go as expected?

Yes

Would you buy IBM Security Guardium again?

Yes

This software provides the security that every company seeks with the classification of confidential data from all areas, it can count the risks 100% without affecting performance. Access policies are another security feature that we know is necessary to create authorizations according to the position of each employee from different departments.