We performed a comparison between ACF2 and IBM Security Guardium Data Protection based on real PeerSpot user reviews.
Find out what your peers are saying about IBM, Imperva, Oracle and others in Database Security."Logging and monitoring are most valuable. It is for the mainframe environment, and it is at the forefront for security and resilience."
"The NOACCESS by default is another very good feature. Also, access rules are straightforward, and easy to understand."
"We use this tool to quickly assign privileges to different users as soon as they come in."
"Excellent real-time reporting that saves time and resources."
"I love their support. The support is great. They are number one."
"From the perspective of analysis and prevention, this product is pretty accurate."
"The most valuable feature is using the capture operation mode “S-TAP/K-TAP agent”, because all activities in the database are captured, including direct access to the database server by privileged users. This is useful because, even if the database server logs were deleted, the Guardium Collector has already stored such data to enable traceability of access."
"We also use IBM Guardium to support security initiatives and compliance policies. For example, our audit area can verify if someone has access to information that they shouldn't have, for their regular job functions."
"One of the most valuable features is the accelerator. It has a predefined report for PCI SOX compliance and other compliances."
"We now have the ability to begin to understand how people, applications, and service accounts are interacting with data to better protect it."
"Encryption is not straightforward, but Guardium made the setup easy for us."
"It provides a comprehensive security for databases, both on-prem and on the cloud. Among the advanced features we use automatic backups, DR."
"Our internal audit is keeping an eye out, and making sure that we're in compliance. Having the Guardium solution and its reporting helps us get through that process a lot more quickly and efficiently."
"It needs longer rules. The max rule is 32K."
"They can work on its ability to work in a distributed environment. It's a mainframe product. As many companies move to the cloud, depending on what cloud models they choose, such as a public, hybrid, or private cloud, it should be deployable. I am not sure if it can be deployed on those platforms. It has been there since the '50s or '60s, and it's still scalable. It has survived all these years, and it's scalable to many platforms, but I don't know about the cloud."
"Reporting can sometimes include false positives."
"I would like my team and me to be able to use simple browsers, like Chrome, to be able to access mainframe data and provision users using the browser."
"Since we are resellers we do not have enough information about the technical aspects and the areas of improvement. However, one consistent report that we receive from our customers is that IBM does not offer timely support due to the size of the organisation. It would be great if they could improve their response time."
"Right now, we're in the development phase for IBM Guardium Data Protection, so I don't have any recommendations about additional features and room for improvement in the solution. We're very excited to work on IBM Guardium Data Protection because we are new to the solution, and we're still exploring product features. We're very excited about integrations and use case creation, and it's only after six to eight months that I'll be able to share my recommendations in terms of additional features the solution should have. We did find some difficulty in deploying IBM Guardium Data Protection here in Pakistan because of the lack of resources."
"I would like to see streamlining of some of the agent features, some of the patches; make it a little bit more user-friendly on the documentation."
"Right now we're having some issues where it's using a high CPU, we don't know why. So, better testing before the product is ready would help."
"IBM Guardium Data Protection is a mature product. There is a lot of encryption that is not owned by IBM and is done by a third party and is not an integral part of the solution."
"I'd like to them make sure that the data sources can be more easily managed, because some of them are tied to multiple things. You try to remove one and you have to go to all the different spots to remove the associations before you can get rid of it."
"Using the data in native Guardium is difficult, at best."
"The one thing that I would like to see improved, but I don't think it's going to be in the next release, is its reporting capabilities. I think that's been offloaded to another third-party product that I think IBM actually endorses for that."
More IBM Security Guardium Data Protection Pricing and Cost Advice →
ACF2 is ranked 17th in Database Security while IBM Security Guardium Data Protection is ranked 1st in Database Security with 70 reviews. ACF2 is rated 9.0, while IBM Security Guardium Data Protection is rated 8.2. The top reviewer of ACF2 writes "A reliable, scalable product for security and auditing of our mainframe environment". On the other hand, the top reviewer of IBM Security Guardium Data Protection writes "Provides visibility, has a single console that shows all information, and collector-aggregator capabilities". ACF2 is most compared with IBM Resource Access Control Facility, Top Secret and IBM Security zSecure, whereas IBM Security Guardium Data Protection is most compared with Imperva SecureSphere Database Security, Oracle Audit Vault, Oracle Advanced Security, DataSunrise Database Security and Vormetric Application Crypto Suite.
See our list of best Database Security vendors.
We monitor all Database Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.