Imperva SecureSphere Database Security Competitors and Alternatives

The top Imperva SecureSphere Database Security competitors are
Read reviews of Imperva SecureSphere Database Security competitors and alternatives
Real User
Information Security Analyst at a government with 1,001-5,000 employees
Jan 05 2017

What is most valuable?

The database activity monitoring and firewall features of Guardium address our database security requirements. The combination of policies, alerts, baselines, reports, and query rewrite functions are easy to use and provide enough room for... more»

How has it helped my organization?

It provides us more visibility and control of our business functions. The query rewrite and redaction functions also provide flexible/dynamic control of our data, which is indeed helpful for complex scenarios.

What needs improvement?

The backend database requires improvement for faster searching. This makes it easier for analysts to investigate older data.
Real User
System Adminisrator at a tech services company with 51-200 employees
Dec 14 2016

What do you think of Imperva Incapsula?

Valuable Features Security rules and DDoS protection. • Improvements to My Organization Well, just by using the security rules to block all secured areas by IP minimized the chance of sensitive data leaking outside. • Room for Improvement I'd like it to work with Let's Encrypt. • Use of Solution 1.5 years • Deployment Issues No issues. • Stability Issues No issues. • Scalability Issues No issues. • Customer Service and Technical Support Customer Service: Once going enterprise, support is excellent. Technical Support: Once going enterprise, support is excellent. • Previous Solutions CloudFlare and I switched because we needed more locations. • Initial Setup Took us 10 minutes and we just waited for the DNS update. • Implementation...
Real User
Cyber Security Engineer at a tech services company with 10,001+ employees
Jan 08 2017

What is most valuable?

Scanning for databases is the most valuable feature of this solution. This is because most of the security breaches that you hear about, require some sort of insecure database within the enterprise in order to enable the data to be sent... more»

How has it helped my organization?

It provided us with better control over the small databases that might spring up and introduce security issues.

What needs improvement?

A better interface to understand what network is going to be scanned. Also, when we had two instances where we thought that the scheduled scanning was turned off and it went active, causing some network issues.

Sign Up with Email