We performed a comparison between ACF2 and Imperva SecureSphere Database Security based on real PeerSpot user reviews.
Find out what your peers are saying about IBM, Imperva, Oracle and others in Database Security."We use this tool to quickly assign privileges to different users as soon as they come in."
"Excellent real-time reporting that saves time and resources."
"The NOACCESS by default is another very good feature. Also, access rules are straightforward, and easy to understand."
"I love their support. The support is great. They are number one."
"Logging and monitoring are most valuable. It is for the mainframe environment, and it is at the forefront for security and resilience."
"The beauty of it is that it provides segregation of duties. Typically, in the traditional environment, DBAs administer the database, and they have too much access. We are in the process of implementing other Oracle solutions, and it brings some kind of segregation. Just because someone is a DBA does not mean that he or she should have access to all of the data. Some of the data can be masked so that privacy and security are enhanced, especially when it is customer data for an institution like a bank."
"The initial setup is very simple."
"The company focuses on and has a passion for security."
"The tool's pricing is flexible and affordable for small and medium enterprises."
"The cyber intelligence feature is the most valuable."
"The technical support for Imperva is super, super, super."
"The most valuable feature is the automatic reports on new databases, which gives us up-to-date inventory management."
"The product’s most valuable feature is real-time highlights."
"They can work on its ability to work in a distributed environment. It's a mainframe product. As many companies move to the cloud, depending on what cloud models they choose, such as a public, hybrid, or private cloud, it should be deployable. I am not sure if it can be deployed on those platforms. It has been there since the '50s or '60s, and it's still scalable. It has survived all these years, and it's scalable to many platforms, but I don't know about the cloud."
"It needs longer rules. The max rule is 32K."
"Reporting can sometimes include false positives."
"I would like my team and me to be able to use simple browsers, like Chrome, to be able to access mainframe data and provision users using the browser."
"SecureSphere activity log can be used with Imperva CounterBreach in an effort to protect enterprise data from theft and loss caused."
"Performance can be slow under heavy loads, but this should be adjusted by scaling."
"The GUI is bad."
"Its reporting can be improved. The reporting feature is currently not good enough for our clients."
"Reporting could be improved."
"It is quite expensive. I would prefer a lower price."
"The GUI for this solution could use some improvement."
"The interface is not user-friendly."
More Imperva SecureSphere Database Security Pricing and Cost Advice →
ACF2 is ranked 17th in Database Security while Imperva SecureSphere Database Security is ranked 2nd in Database Security with 52 reviews. ACF2 is rated 9.0, while Imperva SecureSphere Database Security is rated 8.2. The top reviewer of ACF2 writes "A reliable, scalable product for security and auditing of our mainframe environment". On the other hand, the top reviewer of Imperva SecureSphere Database Security writes "The fine-grained auditing available on the platform makes life easier and helps explain anything happening in your database". ACF2 is most compared with IBM Resource Access Control Facility and Top Secret, whereas Imperva SecureSphere Database Security is most compared with IBM Security Guardium Data Protection, Oracle Audit Vault, DataSunrise Database Security, Trustwave DbProtect and jSonar.
See our list of best Database Security vendors.
We monitor all Database Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.