IBM Guardium Vulnerability Assessment Primary Use Case

KB
CTA\Owner at a tech services company with 11-50 employees

We are a full security base integration and application business. We help with implementation and deployments.

I used Guardium to help with a cloud migration to check and do some validation for a client's data landscape and services so that they made sure that they were all secure in overall posture and all the way throughout their data security life cycle. I helped with automating some of their other services, which provided another way of providing a more fundamental catalog discovery type of scenario. I also helped with using some activity monitoring for their on-premises and cloud data sources. 

View full review »
GK
Pre-Sales Engineer at a tech services company

We are service providers, we don't use it internally. 

Where it is mostly being used is for enterprise clients, because they need to comply with all of the requirements, they need increased security and visibility. 

It's popular with enterprise clients who are more mature in their security implementations.

View full review »
OA
Chief Technology Officer at Leystel Nigeria Limited

We are a solution provider and this is one of the systems that I deploy for our customers. It is used to test systems for security vulnerabilities.

View full review »
Buyer's Guide
Vulnerability Management
March 2024
Find out what your peers are saying about IBM, Tenable, Invicti and others in Vulnerability Management. Updated: March 2024.
768,740 professionals have used our research since 2012.