We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Takes reports from other vulnerabilities."
"The reporting features are good and there are many built-in reports that can be quickly configured."
"The most valuable feature is that it provides a simple English recommendation on actions that you need to take once a vulnerability is discovered."
"No third-party applications or integrations with additional software solutions."
"Building policies is not that easy. There are some things that are turned off by default, for example, displaying values."
"The interface could be improved by having sub-groups of tests, ultimately making the process of collecting tests faster."
Helps security and IT operations teams prioritize and remediate risks based on potential impact to the business.
IBM Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities, and suggests remedial actions. The solution identifies exposures such as missing patches, weak passwords, unauthorized changes and misconfigured privileges.
BMC TrueSight Vulnerability Management is ranked 14th in Vulnerability Management with 1 review while IBM Guardium Vulnerability Assessment is ranked 12th in Vulnerability Management with 2 reviews. BMC TrueSight Vulnerability Management is rated 7.0, while IBM Guardium Vulnerability Assessment is rated 8.0. The top reviewer of BMC TrueSight Vulnerability Management writes "Good features for infrastructure application; lacking in integrations with other software ". On the other hand, the top reviewer of IBM Guardium Vulnerability Assessment writes "Good reporting, integrates well, and vulnerability assessments can be performed quickly". BMC TrueSight Vulnerability Management is most compared with Tenable SC, Qualys VM, Tenable Nessus, Rapid7 InsightVM and CyberGRX, whereas IBM Guardium Vulnerability Assessment is most compared with Tenable Nessus, Qualys VM, Tenable.io Vulnerability Management and Rapid7 InsightVM.
See our list of best Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.