We performed a comparison between ACF2 and IBM Security Guardium Data Protection based on real PeerSpot user reviews.
Find out what your peers are saying about IBM, Imperva, Oracle and others in Database Security."I love their support. The support is great. They are number one."
"We use this tool to quickly assign privileges to different users as soon as they come in."
"Logging and monitoring are most valuable. It is for the mainframe environment, and it is at the forefront for security and resilience."
"The NOACCESS by default is another very good feature. Also, access rules are straightforward, and easy to understand."
"Excellent real-time reporting that saves time and resources."
"This is a multi-platform solution that consolidates everything and centralizes support for it."
"The possible number of databases and database servers which can be monitored by Guardium is high. For me, this is a differentiator of IBM."
"Gathering the data works very well. "
"The most valuable features of this product are activity monitoring on the database servers, discovery capabilities, and vulnerability scanning."
"I like the reporting mechanism. It's very good."
"IBM Guardium Data Protection is very good at keeping your database secure."
"Database logging and audit functions are the most valuable features."
"The purpose of EBM Guardium is to monitor database activity and who is accessing it. This is the most valuable feature."
"It needs longer rules. The max rule is 32K."
"They can work on its ability to work in a distributed environment. It's a mainframe product. As many companies move to the cloud, depending on what cloud models they choose, such as a public, hybrid, or private cloud, it should be deployable. I am not sure if it can be deployed on those platforms. It has been there since the '50s or '60s, and it's still scalable. It has survived all these years, and it's scalable to many platforms, but I don't know about the cloud."
"I would like my team and me to be able to use simple browsers, like Chrome, to be able to access mainframe data and provision users using the browser."
"Reporting can sometimes include false positives."
"More automation, user guides, and tips would make this solution better."
"If IBM Guardium Data Protection could find a way to not have a lot of coding and development required to get the solution up and running it would be an advantage. The information of the agent could improve, which is necessary for us to monitor the databases would be a great benefit."
"Overall testing and quality need improvement. It is fairly buggy at times, so it feels like it could use additional staff on the product, testing and trying it out."
"I have already mentioned to IBM that a primary need is to improve the number of records in the reports above 65,535."
"The ability for Central Managers to talk to one another could be improved. I have 26 Central Managers and 26 silos which are independent."
"Needs easier integration with custom applications."
"The documentation could be better."
"I'd like to see a smoother GUI interface for the CAS agent - CAS does configurations on the database - to interface better with the vulnerability assessments."
More IBM Security Guardium Data Protection Pricing and Cost Advice →
ACF2 is ranked 17th in Database Security while IBM Security Guardium Data Protection is ranked 1st in Database Security with 70 reviews. ACF2 is rated 9.0, while IBM Security Guardium Data Protection is rated 8.2. The top reviewer of ACF2 writes "A reliable, scalable product for security and auditing of our mainframe environment". On the other hand, the top reviewer of IBM Security Guardium Data Protection writes "Provides visibility, has a single console that shows all information, and collector-aggregator capabilities". ACF2 is most compared with IBM Resource Access Control Facility, Top Secret and IBM Security zSecure, whereas IBM Security Guardium Data Protection is most compared with Imperva SecureSphere Database Security, Oracle Audit Vault, Oracle Advanced Security, DataSunrise Database Security and Vormetric Application Crypto Suite.
See our list of best Database Security vendors.
We monitor all Database Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.