We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The most valuable feature is that it provides a simple English recommendation on actions that you need to take once a vulnerability is discovered."
"The reporting features are good and there are many built-in reports that can be quickly configured."
"Tripwire IP360 is a very stable solution."
"Building policies is not that easy. There are some things that are turned off by default, for example, displaying values."
"The interface could be improved by having sub-groups of tests, ultimately making the process of collecting tests faster."
"I am not very impressed by the technical support."
"I believe the price compares well within the market."
Earn 20 points
IBM Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities, and suggests remedial actions. The solution identifies exposures such as missing patches, weak passwords, unauthorized changes and misconfigured privileges.
Tripwire IP360 delivers risk-based vulnerability assessment and asset discovery capabilities. With IP360, you get:
IBM Guardium Vulnerability Assessment is ranked 13th in Vulnerability Management with 2 reviews while Tripwire IP360 is ranked 11th in Vulnerability Management with 1 review. IBM Guardium Vulnerability Assessment is rated 8.0, while Tripwire IP360 is rated 7.0. The top reviewer of IBM Guardium Vulnerability Assessment writes "Good reporting, integrates well, and vulnerability assessments can be performed quickly". On the other hand, the top reviewer of Tripwire IP360 writes "Helps us prioritize vulnerabilities but the dashboard and reporting need to improve". IBM Guardium Vulnerability Assessment is most compared with Tenable Nessus, Qualys VM, Rapid7 InsightVM and Tenable.io Vulnerability Management, whereas Tripwire IP360 is most compared with Tenable Nessus, Tenable SC, Trend Micro Deep Security and Qualys VM.
See our list of best Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.