We performed a comparison between ACF2 and IBM Security Guardium Data Protection based on real PeerSpot user reviews.
Find out in this report how the two Database Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Logging and monitoring are most valuable. It is for the mainframe environment, and it is at the forefront for security and resilience."
"We use this tool to quickly assign privileges to different users as soon as they come in."
"I love their support. The support is great. They are number one."
"The NOACCESS by default is another very good feature. Also, access rules are straightforward, and easy to understand."
"Excellent real-time reporting that saves time and resources."
"The ability to collect the data without database administers being able to modify it."
"Guardium lets you centrally manage aggregators and collectors."
"It allows us to put in controls to make sure that only the right persons access the proper records in the database."
"Setting up Guardium was easy and straightforward."
"The solution supports a lot of databases."
"The features I like are the robust policies, which allow us to create customized monitoring based on specific activities."
"Accelerators is one of the big functions they have out there. It gives you canned reports that you don't have to make yourself, they're out there by being part of the patch. You just have to fill your information in to some of the already built groups, for your environment, and it automates a lot of that. That has definitely helped improve things."
"Our internal audit is keeping an eye out, and making sure that we're in compliance. Having the Guardium solution and its reporting helps us get through that process a lot more quickly and efficiently."
"I would like my team and me to be able to use simple browsers, like Chrome, to be able to access mainframe data and provision users using the browser."
"They can work on its ability to work in a distributed environment. It's a mainframe product. As many companies move to the cloud, depending on what cloud models they choose, such as a public, hybrid, or private cloud, it should be deployable. I am not sure if it can be deployed on those platforms. It has been there since the '50s or '60s, and it's still scalable. It has survived all these years, and it's scalable to many platforms, but I don't know about the cloud."
"Reporting can sometimes include false positives."
"It needs longer rules. The max rule is 32K."
"If IBM Guardium Data Protection could find a way to not have a lot of coding and development required to get the solution up and running it would be an advantage. The information of the agent could improve, which is necessary for us to monitor the databases would be a great benefit."
"I have already mentioned to IBM that a primary need is to improve the number of records in the reports above 65,535."
"I am struggling getting through to social."
"Setup can be complex. The documentation is in so many different locations, and a lot of times we have to leverage support and higher level resources to figure out the right steps to take."
"The most important requirements for us are integration with new database solutions and the ability to manage things like Jailbreak or something like that. Its reduction feature can also be improved. It has a functionality called reduction, which is like masking data, but it is just a replacement of characters. Sometimes the customer needs more than this. It would be good if it was more advanced or complete. We also have a problem with this solution because the IBM aggregator isn't working very well. IBM has created big data intelligence for Guardium, and occasionally, customers need three or four months of data, but they can't run it from the collectors. It can have a better dashboard and more pre-defined use cases for those customers who don't have any idea about data protection or don't have expert personnel in this area. For example, they can include five use cases for banks and five use cases for retail."
"There are features like end-to-end and S-TAP mapping, and the ability to install policies for your configuration builder. They're not there, but we'd like to see them in the next version."
"IBM Guardium Data Protection is a mature product. There is a lot of encryption that is not owned by IBM and is done by a third party and is not an integral part of the solution."
"Right now, we're in the development phase for IBM Guardium Data Protection, so I don't have any recommendations about additional features and room for improvement in the solution. We're very excited to work on IBM Guardium Data Protection because we are new to the solution, and we're still exploring product features. We're very excited about integrations and use case creation, and it's only after six to eight months that I'll be able to share my recommendations in terms of additional features the solution should have. We did find some difficulty in deploying IBM Guardium Data Protection here in Pakistan because of the lack of resources."
More IBM Security Guardium Data Protection Pricing and Cost Advice →
ACF2 is ranked 17th in Database Security while IBM Security Guardium Data Protection is ranked 1st in Database Security with 71 reviews. ACF2 is rated 9.0, while IBM Security Guardium Data Protection is rated 8.2. The top reviewer of ACF2 writes "A reliable, scalable product for security and auditing of our mainframe environment". On the other hand, the top reviewer of IBM Security Guardium Data Protection writes "Provides visibility, has a single console that shows all information, and collector-aggregator capabilities". ACF2 is most compared with IBM Resource Access Control Facility and Top Secret, whereas IBM Security Guardium Data Protection is most compared with Imperva SecureSphere Database Security, Oracle Audit Vault, Oracle Advanced Security, DataSunrise Database Security and Vormetric Application Crypto Suite. See our ACF2 vs. IBM Security Guardium Data Protection report.
See our list of best Database Security vendors.
We monitor all Database Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.