Compare IBM Guardium Data Protection vs. Vormetric Application Crypto Suite

IBM Guardium Data Protection is ranked 1st in Data Masking with 4 reviews while Vormetric Application Crypto Suite is ranked 11th in Data Masking. IBM Guardium Data Protection is rated 8.4, while Vormetric Application Crypto Suite is rated 0. The top reviewer of IBM Guardium Data Protection writes "Proven record of preventing unauthorized access and modifications to our customer's data". On the other hand, IBM Guardium Data Protection is most compared with Imperva SecureSphere Database Security, Oracle Audit Vault, Informatica Secure@Source, Informatica Persistent Data Masking and IBM InfoSphere Optim Data Privacy, whereas Vormetric Application Crypto Suite is most compared with Protegrity Data Security.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Use Vormetric Application Crypto Suite? Share your opinion.
Find out what your peers are saying about IBM, Broadcom, Delphix and others in Data Masking. Updated: June 2020.
425,509 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
One of the deployments that I know of had three databases, and the yearly fees are approximately $50,000 USD.

More IBM Guardium Data Protection Pricing and Cost Advice »

Information Not Available
report
Use our free recommendation engine to learn which Data Masking solutions are best for your needs.
425,509 professionals have used our research since 2012.
Ranking
1st
out of 25 in Data Masking
Views
14,850
Comparisons
7,033
Reviews
3
Average Words per Review
804
Avg. Rating
8.3
11th
out of 25 in Data Masking
Views
98
Comparisons
96
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
Popular Comparisons
Also Known As
InfoSphere Guardium, Guardium, IBM Guardium
Learn
IBM
Thales Cloud Security
Overview

The IBM Security Guardium portfolio empowers organizations to grow their business and prove compliance with smarter data protection capabilities. It provides complete visibility, actionable insights, real time controls and automated compliance workflows throughout the entire data protection journey, to support your most critical data protection needs.

IBM Security Guardium delivers discovery & classification, vulnerability & risk assessments, real-time monitoring & alerting, encryption, advanced analytics and compliance reporting across structured, unstructured, and semi-structured data in on-prem (including mainframe), cloud, and across hybrid cloud environments.

At the core of the Vormetric Application Crypto Suite from Thales is a set of products that streamline development efforts to add encryption, tokenization, masking and other cryptographic functions to applications. The job of the developer is made easy and fast by leveraging sample code and APIs that are best for their environment, while key management functions are kept separate and secure in a FIPS 140-2 hardware or virtual appliance that is operated by IT or SecOps. Securing data at the application, with separation of duties for key management, provides the highest levels of protection and compliance.

The Vormetric Application Crypto Suite also includes applications and utilities that leverage the core components to add security layers to databases and other structured data stores.

Offer
Learn more about IBM Guardium Data Protection
Learn more about Vormetric Application Crypto Suite
Sample Customers
BD, Delta Dental, CMI
Top Industries
REVIEWERS
Financial Services Firm46%
Insurance Company17%
Healthcare Company13%
Government8%
VISITORS READING REVIEWS
Software R&D Company34%
Comms Service Provider15%
Financial Services Firm9%
Insurance Company7%
No Data Available
Company Size
REVIEWERS
Small Business25%
Midsize Enterprise13%
Large Enterprise63%
VISITORS READING REVIEWS
Small Business13%
Midsize Enterprise4%
Large Enterprise83%
No Data Available
Find out what your peers are saying about IBM, Broadcom, Delphix and others in Data Masking. Updated: June 2020.
425,509 professionals have used our research since 2012.

See our list of best Data Masking vendors.

We monitor all Data Masking reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.