IBM Guardium Data Protection Competitors and Alternatives

Get our free report covering Imperva, Oracle, Thales Cloud Security, and other competitors of IBM Guardium Data Protection. Updated: January 2021.
456,249 professionals have used our research since 2012.

Read reviews of IBM Guardium Data Protection competitors and alternatives

Rashid Alsalmi
Consultant at a tech services company
Reseller
Top 5
Jun 11, 2019
An agent-based solution that provides comprehensive security and is easy to configure

What is our primary use case?

We are a reseller of this solution and provide it to our customers. Some of our customers are the banks.

Pros and Cons

  • "This solution helps our clients to monitor their database use, and detect violations of the policy."
  • "We have not been able to integrate this product with a lot of standard incident response solutions, so an open API would help in this regard."

What other advice do I have?

The market here is very limited for database protection. For the past five years, we have been pushing it as a "good to have" or "nice to have" solution. However, it is now becoming an essential requirement for protecting our customers' databases. Our customers have identified the need for database protection, but in our part of the world, it is not yet getting the attention, or budgets, that it requires. In the middle of threats and attacks on the network, people rarely look at the backend solution. They do not see the database as a "threatened" component. We are happy with the product…
Sanjeet Kumar Bhuyan
Security Consultant and Cybersecurity Support at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
Aug 29, 2019
Enables us to monitor the most critical DBA activities, helping identify default accounts and passwords

What is our primary use case?

The primary use case is for database monitoring. We are also using the blocking part, which is used for: * Any suspicious activities which are done, such as delete command and query command, outside the admin, the solution is supposed to block them. * The blocking of compromised databases through cloning. Blocking will not allow the cloning. We use it for blocking and auditing. Our job is monitoring. We are a government entity and provide services to other ministries. We use Imperva for its Database Activity Monitoring and File Integrity Monitoring tools. We have also enabled Database… more »

Pros and Cons

  • "As we are very sensitive to financial impacts, this product provides great protection for our organization."
  • "I would like to see improvement in the integration part of the tool. This should be an easy process."

What other advice do I have?

Identify the proper use cases, then implement it. Resource overhead management is a good option. The OS chain option provides the real user behind the DB application user.
Get our free report covering Imperva, Oracle, Thales Cloud Security, and other competitors of IBM Guardium Data Protection. Updated: January 2021.
456,249 professionals have used our research since 2012.