Protect your data with this powerful security tool!!!
Updated December 14, 2023

Protect your data with this powerful security tool!!!

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Modules Used

  • IBM Security Guardium Data Protection
  • IBM Security Guardium Insights for IBM Cloud Pak® for Security
  • IBM Security Discover and Classify
  • IBM Security Guardium Vulnerability Assessment
  • IBM Data Risk Manager

Overall Satisfaction with IBM Security Guardium

Maximum protection tool that makes it possible to know in a timely manner where the real threats are to any data, the analysis is exact and so fast that everything is solved before it happens. IBM Security Guardium constantly monitors all data in general, detailing any event immediately, offering accurate reports with monitoring and automation that allows us to be calm since the result is clear; on the other hand, this Artificial Intelligence helps us notably throughout the organization due to the agility with which it works, ultimately obtaining excellent dividends for everyone.
  • It's easy to implement, you don't need to be an expert.
  • The database is controlled and secure; its access is restricted to only authorized personnel.
  • The detection of threats is very good since the data will not be damaged because the monitoring of the software is very attentive, so the errors are analyzed before something can be damaged.
  • It has wonderful technical support willing to help at all times.
  • The navigation is not adequate, a lot of time is wasted, and it does not give up for that reason.
  • Each module has a price, this increases expenses.
  • Setup is not for newbies.
  • Excellent job with the protection of information and access control to our database.
  • Its price is high for companies with a low budget, but considering the security of the data we obtain, I can say that it is the best.
  • Few tools can have tangible results in a short time; this allows IBM to continue being the leader.
This software is not the easiest to use in all work environments, each department has some difficulties accessing and managing some functions, it can be considered a complex softy, but I consider it necessary to have it in the company due to its security qualities of warm cans, it offers exactly what it promises but with a little difficulty in its configuration.
The security is real with this software; you can guarantee the security in our database and allow access only with some administrative permissions; we feel that the company has made the best deal in terms of data security. Everything is handled in real-time and has features that help to effectively manage all the company's high-risk systems. The modules it offers are varied and are implemented according to the needs of all departments.

Do you think IBM Security Guardium delivers good value for the price?


Are you happy with IBM Security Guardium's feature set?


Did IBM Security Guardium live up to sales and marketing promises?


Did implementation of IBM Security Guardium go as expected?


Would you buy IBM Security Guardium again?


A consolidated company must maintain the security and total protection of its data in good hands, which is why IBM Security Guard offers for your benefit the most controlled and most appropriate security for your business. Although this tool is somewhat expensive, it is worth the risk to keep the data in full control. Risk activities in the organization will be detected in advance in order to avoid any serious damage that could affect the business's future, avoiding any theft that is confidential and compromising. This product is easy to implement and has good technical service.

Using IBM Security Guardium

60 - Data security analyst, IT support, IT security engineer.
  • Confidential data classification.
  • Templates for regulations.
  • Security reports, confidential data analysis processes and vulnerability scanning system.
  • Discovering external and internal threats is a job of this software and is done automatically, it has a powerful and reliable data security approach.