Try our new research platform with insights from 80,000+ expert users

BigID Next vs Rubrik Data Security Posture comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 22, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BigID Next
Ranking in Data Security Posture Management (DSPM)
4th
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
15
Ranking in other categories
Data Loss Prevention (DLP) (7th), Data Governance (6th), Data Privacy Management Software (2nd), AI Data Analysis (2nd)
Rubrik Data Security Posture
Ranking in Data Security Posture Management (DSPM)
12th
Average Rating
8.0
Reviews Sentiment
2.9
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2026, in the Data Security Posture Management (DSPM) category, the mindshare of BigID Next is 5.6%, down from 6.0% compared to the previous year. The mindshare of Rubrik Data Security Posture is 1.9%, up from 1.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Data Security Posture Management (DSPM) Market Share Distribution
ProductMarket Share (%)
BigID5.6%
Rubrik Data Security Posture1.9%
Other92.5%
Data Security Posture Management (DSPM)
 

Featured Reviews

Aniruddha Nath - PeerSpot reviewer
Senior Security Consultant at a consultancy with 10,001+ employees
Data discovery has transformed compliance workflows and automation now speeds up requests and remediation
The best feature that BigID offers is data discovery and classification, which is the most powerful engine. It allows connecting to many different data sources, ranging from cloud to on-premises to structured to unstructured data. If there is no connector available, you can build your own classifiers as well. Regarding the custom classifier option, you can build custom classifiers using regular expressions, and I have done that if you know how to create regular expressions. Custom connectors are something you create to connect to a database where the connector is not available. BigID has positively impacted my organization as it's a very powerful tool, especially with the increasing regulatory compliances for different countries such as GDPR, CCPA, and India's recent DPDPA act. Having these tools in place greatly helps organizations avoid any penal charges for not being compliant with the regulatory compliances. For example, regarding compliance or reduced risks for my clients, the DSAR process I was talking about allows organizations to respond quickly to user data deletion requests under GDPR law, which traditionally has a 30-day or 60-day timeline. In larger organizations, when the number of requests is high, it becomes tedious. However, using DSAR automation with BigID, it's almost instantaneous; instead of 30 days, you can respond in just one day to what users have requested.
Neelash Nair - PeerSpot reviewer
Principle Tech Architect at Unisys
Unified dashboard allows seamless threat detection and management while process for sensitive data needs action capabilities
The features of Rubrik Data Security Posture that I have found most valuable include its better detect function for anomalies and cyber threats, along with immutability by default, operating system hardening, MFA, and all the other ZTNA functions, which align well with our needs. Regarding the anomaly detection feature in Rubrik Data Security Posture, the product has a threat detect function that you can run on-demand or by default to identify anomalies, and allows you to perform deeper analysis using YARA rules or other indicators of compromise to determine if a threat is actual or a false positive. I leverage Rubrik's unified dashboard for proactive threat detection and remediation, which I find absolutely fantastic and unmatched compared to other dashboards, allowing visibility into a hybrid environment on a single pane of glass. The positive impact I've seen from using Rubrik Data Security Posture is its superior detection of threats from primary backups, which is built-in and requires minimal setup compared to other tools that need separate scanning engines.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Data classification is highly effective due to its automatic capabilities."
"BigID's scanning feature is its most valuable component."
"BigID has one of the best technical support teams."
"The most valuable feature of BigID is its large number of classifiers, which allow us to scan for specific data such as SSN numbers."
"It provides a unified view across different databases and supports a wide range of data source types, including cloud and on-premises systems."
"One of the most valuable things in a data-focused world is a tool, a technology that's data-centric, not trying to master data management or whatever else. It's a source of truth for what data an organization holds, giving it the ability to catalog, categorize, and understand its data."
"The features that I have found most valuable are the user experience, the credentialing, and that BigID is user friendly. Additionally, you can deploy to several other Microsoft platforms and you can use it for other things, like a bigger element or a report."
"BigID integrates well with our other products."
"I leverage Rubrik's unified dashboard for proactive threat detection and remediation, which I find absolutely fantastic and unmatched compared to other dashboards, allowing visibility into a hybrid environment on a single pane of glass."
 

Cons

"I want them to focus on data mapping, assessment, automation workflow, and privacy incident management."
"BigID's user interface was problematic as it was not very user-friendly, though I believe it improved over time."
"Some users find catalog navigation challenging due to the lack of a search-by-column feature, which makes it difficult to locate specific data quickly."
"The tool currently lacks security features."
"Improvement could be made in data consent management and data privacy impact assessment."
"There are some shortcomings when it comes to Calvirus authentication, which is not yet supported by BigID."
"More classifications about different states are needed"
"BigID is making some forays into the GRC space, and that's a natural progression. I'd like to see that improve so that data governance is better, data risk is identified, and the ability to control and mitigate it."
"I assess the effectiveness of Rubrik's sensitive data discovery in my data security strategy as functional but limited, as it identifies sensitive data but lacks clarity on what actions to take next."
 

Pricing and Cost Advice

"I think that BigID's pricing is very reasonable."
"The pricing depends. If you have thousands of data sources to connect and manage, and you struggled with an MDM package in the past, you'll find BigID valuable and even cheap. But if you're a small business, it's probably not the right tool for you."
"The product is expensive, but so are all competitor tools"
"The solution is not licensed per user but rather based on capacity. For instance, organizations with large amounts of data, such as 50 GB or more, are the ones that typically qualify for BigID."
"The solution is expensive."
Information not available
report
Use our free recommendation engine to learn which Data Security Posture Management (DSPM) solutions are best for your needs.
880,844 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
23%
Insurance Company
9%
Computer Software Company
8%
Manufacturing Company
5%
University
21%
Computer Software Company
12%
Manufacturing Company
9%
Comms Service Provider
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business5
Large Enterprise11
No data available
 

Questions from the Community

What do you like most about BigID?
I like BigID's in-depth discovery and scanning capabilities, especially for unstructured data. This feature is a standout compared to competitors. The tool's data classification capabilities are i...
What needs improvement with BigID?
One area where BigID can be improved is the UI, which has a lot of bugs. I believe that if they improve their UI experience, that would greatly help. In general, sometimes you see bugs, but there's...
What is your primary use case for BigID?
My main use case for BigID includes data discovery and classification, DSAR automation, and data remediation. I use BigID for data discovery and classification in my work by identifying where perso...
What is your experience regarding pricing and costs for Rubrik Data Security Posture?
The pricing and licensing cost of Rubrik Data Security Posture can be tricky, as it depends on the relationship you have with your vendor and whether you're an established company or a startup.
What needs improvement with Rubrik Data Security Posture?
I assess the effectiveness of Rubrik's sensitive data discovery in my data security strategy as functional but limited, as it identifies sensitive data but lacks clarity on what actions to take nex...
What is your primary use case for Rubrik Data Security Posture?
I have been working with Rubrik Data Security Posture since 2016-2017. I have been working with Rubrik Data Security Posture within the last 12 months as well and have about three to four years of ...
 

Also Known As

No data available
Laminar
 

Overview

 

Sample Customers

Home Depot, Grant Thornton LLP, Cimpress, Fidelity Investments
Information Not Available
Find out what your peers are saying about Wiz, Palo Alto Networks, Varonis and others in Data Security Posture Management (DSPM). Updated: January 2026.
880,844 professionals have used our research since 2012.