Modern user access control based on role.
Overall Satisfaction with IBM Security Guardium
With this tool we have implemented some additional security policies in the most vulnerable environments to prevent theft of confidential data, we establish authorizations for such access to information, we recognize user behavior in real-time to establish whether we are at risk, visibility of data is in full control with the centralization of audit data, accelerating all audits is a simple job and with resources available for all IT environments.
Pros
- Centralization of audit data.
- We can apply our security policies in real time.
Cons
- I don't think it has negative features, although I think they should improve the response time of technical support, generally, the response time is long.
- Increasing business security is a key factor in increasing return on investment.
- Authorizations according to the user's role.
With reliable data audits, a centralized system, access control, determination with security analysis, and advanced visibility management, we can correct threats in real-time with scalable functions.
Do you think IBM Guardium delivers good value for the price?
Yes
Are you happy with IBM Guardium's feature set?
Yes
Did IBM Guardium live up to sales and marketing promises?
Yes
Did implementation of IBM Guardium go as expected?
Yes
Would you buy IBM Guardium again?
Yes


Comments
Please log in to join the conversation