We performed a comparison between ACF2 and Imperva SecureSphere Database Security based on real PeerSpot user reviews.
Find out what your peers are saying about IBM, Imperva, Oracle and others in Database Security."Excellent real-time reporting that saves time and resources."
"Logging and monitoring are most valuable. It is for the mainframe environment, and it is at the forefront for security and resilience."
"We use this tool to quickly assign privileges to different users as soon as they come in."
"The NOACCESS by default is another very good feature. Also, access rules are straightforward, and easy to understand."
"I love their support. The support is great. They are number one."
"Flexible reporting allows for customization that keeps the admins from having to interact with system automation."
"This solution has helped secure our Internet-based services, protecting us against DoS and other types of web-based attacks."
"The integration is great."
"The most valuable feature of this solution is the database security policy."
"The technical support for Imperva is super, super, super."
"The integration with CounterBreach is great."
"As we are very sensitive to financial impacts, this product provides great protection for our organization."
"The discovery module provides good visibility."
"I would like my team and me to be able to use simple browsers, like Chrome, to be able to access mainframe data and provision users using the browser."
"It needs longer rules. The max rule is 32K."
"Reporting can sometimes include false positives."
"They can work on its ability to work in a distributed environment. It's a mainframe product. As many companies move to the cloud, depending on what cloud models they choose, such as a public, hybrid, or private cloud, it should be deployable. I am not sure if it can be deployed on those platforms. It has been there since the '50s or '60s, and it's still scalable. It has survived all these years, and it's scalable to many platforms, but I don't know about the cloud."
"Once we read the activity logs on the platform, we cannot open them anywhere else as they are stored in a proprietary format."
"SecureSphere activity log can be used with Imperva CounterBreach in an effort to protect enterprise data from theft and loss caused."
"The solution could improve by having more integration."
"The solution needs local support."
"Reporting could be improved."
"The GUI for this solution could use some improvement."
"I would like to see improvement in the integration part of the tool. This should be an easy process."
"The interface is not user-friendly."
More Imperva SecureSphere Database Security Pricing and Cost Advice →
ACF2 is ranked 17th in Database Security while Imperva SecureSphere Database Security is ranked 2nd in Database Security with 52 reviews. ACF2 is rated 9.0, while Imperva SecureSphere Database Security is rated 8.2. The top reviewer of ACF2 writes "A reliable, scalable product for security and auditing of our mainframe environment". On the other hand, the top reviewer of Imperva SecureSphere Database Security writes "The fine-grained auditing available on the platform makes life easier and helps explain anything happening in your database". ACF2 is most compared with IBM Resource Access Control Facility, Top Secret and IBM Security zSecure, whereas Imperva SecureSphere Database Security is most compared with IBM Security Guardium Data Protection, Oracle Audit Vault, DataSunrise Database Security, Trustwave DbProtect and jSonar.
See our list of best Database Security vendors.
We monitor all Database Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.