Reviews from AWS Marketplace
0 AWS reviews
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
External reviews are not included in the AWS star rating for the product.
Guardium Data Protection
What do you like best about the product?
Integration with different databases, Policies and Knowledge base
What do you dislike about the product?
Customer support should be better and Cloud Integration
What problems is the product solving and how is that benefiting you?
Product bugs and cloud integrations
- Leave a Comment |
- Mark review as helpful
Doing the right thing in the right place
What do you like best about the product?
Guardiums ability to centrally manage all your database security needs outside your RDBMS. That way segregation of duties is a breeze.
What do you dislike about the product?
Sometimes IBM Security products can be a little prices and Guardium is not an exception ... but then, you get what you pay for.
What problems is the product solving and how is that benefiting you?
Monitoring and enforcing GDPS data protection rules
Great tool for data protection
What do you like best about the product?
I've used Guardium Data Protection for Databases. It's a great tool that monitors data access and takes action against threats. I enjoyed the using navigation bar in UI v.10. Great advantage are predefined out-of-the box policies.
What do you dislike about the product?
We deployed IBM Guradium Data Protection for databases on AS400. The installation was not straight forward, but we manage to create custom-made reports on user data.
What problems is the product solving and how is that benefiting you?
Protecting critical data in customer database. It monitors who and when is making changes on critical data.
Recommendations to others considering the product:
Great tool for securing database
Successful implementations without any performance issues
What do you like best about the product?
Guardium Data Protection provides abilities for monitoring and protecting sensitive data without affecting performance of the business users.
What do you dislike about the product?
The Data Retention, Aggregation and long-term storage practice is complex to implement and requires much infrastructure.
What problems is the product solving and how is that benefiting you?
We use Guardium for providing auditing,security and compliance on database level.
Recommendations to others considering the product:
I recommend hiring skilled integrator with knowledge in Information Security, Databases and Regulation.
Best data protection platform, I have deployed this solution to multiple banking and telecom sectors
What do you like best about the product?
Data protection , compliance monitoring , and vulnerability scanning capabilities in a single product.
What do you dislike about the product?
Query builder section is too difficult to understand.
What problems is the product solving and how is that benefiting you?
Achieved GDPR and PCI compliance, have great insight into databases.
IBM Guardium, an Agile way to Monitor and Protect "Crown Jewels"
What do you like best about the product?
It comes in two flavors. One is DAM and other is FAM. DAM is Database Activity Monitoring while FAM is File Activity Monitoring. DAM is best suitable for structured data, while FAM is for unstructured data.
Its Vulnerability Assessment tool that gives the vulnerabilities against any compliance requirement. Real Time monitoring on who, when what basis of the added databases.
Real Time Blocking on the basis of unauthorized access made to the database.
Central management of all of your database security requirement. We can push the policies from an Aggregator/Central Manager across all the Collectors.
Easy to deploy.
Database addition under Guardium foot print is done by using a light weight agent installed on DB Server that has negligible performance impact.
No changes are required in Database while installing the agent.
Guardium comes with lots of built in rules and policies. We can have a leverage of using them and these policies and rules can cover most part of our Database Monitoring and Security requirements.
Guardium Licenses are perpetual only the support services needs to be renewed on yearly basis.
Its Vulnerability Assessment tool that gives the vulnerabilities against any compliance requirement. Real Time monitoring on who, when what basis of the added databases.
Real Time Blocking on the basis of unauthorized access made to the database.
Central management of all of your database security requirement. We can push the policies from an Aggregator/Central Manager across all the Collectors.
Easy to deploy.
Database addition under Guardium foot print is done by using a light weight agent installed on DB Server that has negligible performance impact.
No changes are required in Database while installing the agent.
Guardium comes with lots of built in rules and policies. We can have a leverage of using them and these policies and rules can cover most part of our Database Monitoring and Security requirements.
Guardium Licenses are perpetual only the support services needs to be renewed on yearly basis.
What do you dislike about the product?
Guardium Licensing is a bit tricky. We have to understand that the license is based on per server (IP Address) basis. Lets say if you have one server (a physical or virtual) and there are three databases running on this server, your Guardium license will be ONE (01) only. And if you have three distinct servers with separate IP(s) and these servers are hosting 10 databases in each, your Guardium License will be three.
An utmost care must be taken while selecting the agent to be installed on the server.
Ddeployment should be done once all the requirements are well understood by the client. If, initially, all the requirements couldn't be understood and the solution is deployed with some gaps, o can create problems in future. Secondly, the specifications of all the components should be allocated as per recommendations so as to avoid any performance hit.
It is a costly solution.
An utmost care must be taken while selecting the agent to be installed on the server.
Ddeployment should be done once all the requirements are well understood by the client. If, initially, all the requirements couldn't be understood and the solution is deployed with some gaps, o can create problems in future. Secondly, the specifications of all the components should be allocated as per recommendations so as to avoid any performance hit.
It is a costly solution.
What problems is the product solving and how is that benefiting you?
Real time Database monitoring.
Real Time blocking of the unauthorized attempts on Databases. This is achieved by carefully crafting the access policies on databases.
We are now able to have a record of even a change made to a very granular level. We can see that changes have been done in a row, column or cell of a database table and who made these changed at what time. If these assesses and changes are not legitimate, than we can terminate the session of unauthorized user within no time.
This gave us a peace of mind now that an agile protection tool is in place to safeguard our "Crown Jewels".
Real Time blocking of the unauthorized attempts on Databases. This is achieved by carefully crafting the access policies on databases.
We are now able to have a record of even a change made to a very granular level. We can see that changes have been done in a row, column or cell of a database table and who made these changed at what time. If these assesses and changes are not legitimate, than we can terminate the session of unauthorized user within no time.
This gave us a peace of mind now that an agile protection tool is in place to safeguard our "Crown Jewels".
Recommendations to others considering the product:
Highly recommended solution for your Data Protection. It can give you real time agile monitoring capability along with the blocking capability to databases when an unauthorized access is made.
I'm guardian seller / pre-seller and showcase what it can be achieved with it
What do you like best about the product?
The end result. After you apply the policies the databases are really protected, it allows your user to increase the level of automation gradually while they improve their internal processes.
What do you dislike about the product?
The way to configure it and visualize the data.
What problems is the product solving and how is that benefiting you?
You can trust that once that policies are applied, there is no way to circumvent it's protection.
Compliance needs are fulfilled for the databases.
Compliance needs are fulfilled for the databases.
Recommendations to others considering the product:
You'll need and expert to install it and, if you can afford it, get a third party to manage it.
Deployment and Support for IBM Guardium for past 3 years
What do you like best about the product?
Monitoring of Databases with flexible Policy inclusive of real time alerting features. It can also be fully automated by sending email to end users for review. Setting up IBM Guardium is simple and straight forward. Automation is easy to configure as well. Build in Poilcy is also provided.
IBM Guardium provide auto discovery of databases, sensitive objects in your database. You may consider to monitor.
IBM Guardium has features for health check which you are able to see at one glance. Alerts of self monitoring can be send via email or syslog. Operation team using IBM Guardium does not require to monitor it daily.
When it come to analysis of events, IBM Guardium has A.I. for analysis for anomaly of data. It will help you to study the pattern of your database and provide an anomaly score for your review.
If you are looking for compliance for audit purpose, IBM Guardium can do it as well. Instead of using databases native audit logging which cause huge amount of disk spaces and performance on the database itself
IBM Guardium provide auto discovery of databases, sensitive objects in your database. You may consider to monitor.
IBM Guardium has features for health check which you are able to see at one glance. Alerts of self monitoring can be send via email or syslog. Operation team using IBM Guardium does not require to monitor it daily.
When it come to analysis of events, IBM Guardium has A.I. for analysis for anomaly of data. It will help you to study the pattern of your database and provide an anomaly score for your review.
If you are looking for compliance for audit purpose, IBM Guardium can do it as well. Instead of using databases native audit logging which cause huge amount of disk spaces and performance on the database itself
What do you dislike about the product?
Not a widely well known product in the market, many features in IBM Guardium may not be useful. Key feature in IBM Guardium is monitoring of traffic, which is collection of the traffic have to be accurate and collected properly. Troubleshooting such issue are not easy.
What problems is the product solving and how is that benefiting you?
Using a single product to monitor multiple type of database. An overview of all databases logs save time in having to view logs in different location.
Recommendations to others considering the product:
You should consider if you are looking for compliance for databases. Monitoring of databases. Especially if you have multiple different type of databases.
I should say it's a very effective IBM product for Database monitoring.
What do you like best about the product?
Automatic Database Discovery, Agent less STAP for cloud servers
What do you dislike about the product?
Enterprise load balancer for window s-tap agents.
What problems is the product solving and how is that benefiting you?
Tracking sensitive data access
I'm working with Guardium DAM on BAU activities
What do you like best about the product?
Logging and monitoring capabilities
UEBA analytics
UEBA analytics
What do you dislike about the product?
IBM Security Guardium is not appropriate for monitoring applications traffic, because when you want to monitor application traffic, you cannot define the end user easily, and the SQL activities are difficult to interpret the jobs on the application.
What problems is the product solving and how is that benefiting you?
Guardium is able to monitor user activity to detect and respond to potential threats in real time. Using Guardium helps to identify and protect against internal and external threats through monitoring and auditing, vulnerability management, data transformation, real-time security policies, and intelligent reporting.
showing 71 - 80