IBM Guardium Vulnerability Assessment Overview

IBM Guardium Vulnerability Assessment is the #12 ranked solution in our list of top Vulnerability Management tools. It is most often compared to Tenable Nessus: IBM Guardium Vulnerability Assessment vs Tenable Nessus

What is IBM Guardium Vulnerability Assessment?

IBM Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities, and suggests remedial actions. The solution identifies exposures such as missing patches, weak passwords, unauthorized changes and misconfigured privileges.

IBM Guardium Vulnerability Assessment Buyer's Guide

Download the IBM Guardium Vulnerability Assessment Buyer's Guide including reviews and more. Updated: December 2020

IBM Guardium Vulnerability Assessment Video

IBM Guardium Vulnerability Assessment Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Gilbert-Kabugi
Pre-Sales Engineer at a tech services company
Real User
Top 10
Dec 31, 2019
Good reporting, integrates well, and vulnerability assessments can be performed quickly

What is our primary use case?

We are service providers, we don't use it internally. Where it is mostly being used is for enterprise clients, because they need to comply with all of the requirements, they need increased security and visibility. It's popular with enterprise clients who are more mature in their security implementations.

Pros and Cons

  • "The reporting features are good and there are many built-in reports that can be quickly configured."
  • "Building policies is not that easy. There are some things that are turned off by default, for example, displaying values."

What other advice do I have?

When trying to implement this product, it is better to have a dedicated IT resource to run with. Most organizations just re-assign the monitoring activities to other members of their team who are doing other things. They need dedicated resources for this tool. This is a good solid product. I would recommend this product. I would rate this solution an eight out of ten.
Olufemi Adalemo
Chief Technology Officer at Leystel Nigeria Limited
Reseller
Top 5Leaderboard
Mar 17, 2020
Performs well and provides clear, concise instructions to repair vulnerabilities that it identifies

What is our primary use case?

We are a solution provider and this is one of the systems that I deploy for our customers. It is used to test systems for security vulnerabilities.

Pros and Cons

  • "The most valuable feature is that it provides a simple English recommendation on actions that you need to take once a vulnerability is discovered."
  • "The interface could be improved by having sub-groups of tests, ultimately making the process of collecting tests faster."

What other advice do I have?

I would rate this solution a nine out of ten.