No more typing reviews! Try our Samantha, our new voice AI agent.

BigID Next vs IBM Security Guardium DSPM comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 22, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BigID Next
Ranking in Data Security Posture Management (DSPM)
4th
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
15
Ranking in other categories
Data Loss Prevention (DLP) (8th), Data Governance (6th), Data Privacy Management Software (1st), AI Data Analysis (3rd)
IBM Security Guardium DSPM
Ranking in Data Security Posture Management (DSPM)
16th
Average Rating
8.0
Reviews Sentiment
5.9
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2026, in the Data Security Posture Management (DSPM) category, the mindshare of BigID Next is 5.7%, down from 6.0% compared to the previous year. The mindshare of IBM Security Guardium DSPM is 1.0%, up from 0.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Data Security Posture Management (DSPM) Mindshare Distribution
ProductMindshare (%)
BigID Next5.7%
IBM Security Guardium DSPM1.0%
Other93.3%
Data Security Posture Management (DSPM)
 

Featured Reviews

Aniruddha Nath - PeerSpot reviewer
Senior Security Consultant at a consultancy with 10,001+ employees
Data discovery has transformed compliance workflows and automation now speeds up requests and remediation
The best feature that BigID offers is data discovery and classification, which is the most powerful engine. It allows connecting to many different data sources, ranging from cloud to on-premises to structured to unstructured data. If there is no connector available, you can build your own classifiers as well. Regarding the custom classifier option, you can build custom classifiers using regular expressions, and I have done that if you know how to create regular expressions. Custom connectors are something you create to connect to a database where the connector is not available. BigID has positively impacted my organization as it's a very powerful tool, especially with the increasing regulatory compliances for different countries such as GDPR, CCPA, and India's recent DPDPA act. Having these tools in place greatly helps organizations avoid any penal charges for not being compliant with the regulatory compliances. For example, regarding compliance or reduced risks for my clients, the DSAR process I was talking about allows organizations to respond quickly to user data deletion requests under GDPR law, which traditionally has a 30-day or 60-day timeline. In larger organizations, when the number of requests is high, it becomes tedious. However, using DSAR automation with BigID, it's almost instantaneous; instead of 30 days, you can respond in just one day to what users have requested.
DevidharsanJ - PeerSpot reviewer
Advisory Consultant at Fiserv
Comprehensive data monitoring has strengthened compliance and protected sensitive information
In terms of improvements for IBM Security Guardium DSPM, I believe there is potential for enhancement in the operational perspective, particularly in the user interface and the deployment of agents. I think they could benefit from having a singular agent that can be pushed directly from a centralized console instead of relying on Unix or Windows admins for deployment.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The best feature that BigID offers is data discovery and classification, which is the most powerful engine, allowing connection to many different data sources ranging from cloud to on-premises and from structured to unstructured data, with the ability to build your own classifiers if no connector is available."
"It provides a unified view across different databases and supports a wide range of data source types, including cloud and on-premises systems."
"BigID has one of the best technical support teams."
"Data classification is highly effective due to its automatic capabilities."
"The tool's most valuable feature is correlation. Using BigID's data classification capabilities has strengthened our data security. It lets me classify and connect data, which helps me manage data at various classification levels."
"Although I was serving the client rather than my own organization, BigID has made scans faster and more efficient, and the DSR results are much more accurate."
"One of the most valuable things in a data-focused world is a tool, a technology that's data-centric, not trying to master data management or whatever else. It's a source of truth for what data an organization holds, giving it the ability to catalog, categorize, and understand its data."
"BigID's scanning feature is its most valuable component."
"The most important aspect of database activity monitoring is that it complies with the regulations, offering pre-built reports and numerous options in IBM Security Guardium DSPM to tune policies, along with various integrations such as with SIEM and ticketing products, making it a more compatible product compared to others."
 

Cons

"BigID's user interface was problematic as it was not very user-friendly, though I believe it improved over time."
"Some users find catalog navigation challenging due to the lack of a search-by-column feature, which makes it difficult to locate specific data quickly."
"There are some shortcomings when it comes to Calvirus authentication, which is not yet supported by BigID."
"BigID needs improvement in terms of automation."
"Improvement could be made in data consent management and data privacy impact assessment."
"The challenge we encountered was with data connection across multiple databases. We struggled with configuring the data connection successfully. However, with the assistance of dynamic teams, we resolved this issue."
"One concern I have with BigID is regarding certain scans, like the multi-scan. The issue is that we can stop and retrieve these scans, but once they start, they go through an enumeration process."
"I want them to focus on data mapping, assessment, automation workflow, and privacy incident management."
"In terms of improvements for IBM Security Guardium DSPM, I believe there is potential for enhancement in the operational perspective, particularly in the user interface and the deployment of agents."
 

Pricing and Cost Advice

"The product is expensive, but so are all competitor tools"
"The pricing depends. If you have thousands of data sources to connect and manage, and you struggled with an MDM package in the past, you'll find BigID valuable and even cheap. But if you're a small business, it's probably not the right tool for you."
"The solution is expensive."
"I think that BigID's pricing is very reasonable."
"The solution is not licensed per user but rather based on capacity. For instance, organizations with large amounts of data, such as 50 GB or more, are the ones that typically qualify for BigID."
Information not available
report
Use our free recommendation engine to learn which Data Security Posture Management (DSPM) solutions are best for your needs.
889,955 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
21%
Insurance Company
9%
Manufacturing Company
6%
Comms Service Provider
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business5
Large Enterprise11
No data available
 

Questions from the Community

What do you like most about BigID?
I like BigID's in-depth discovery and scanning capabilities, especially for unstructured data. This feature is a standout compared to competitors. The tool's data classification capabilities are i...
What needs improvement with BigID?
One improvement I would suggest is addressing the intermittent failures of BigID scans, as there are times when some errors occur. I think the BigID team is aware of this and works on resolving iss...
What is your primary use case for BigID?
BigID's main use case is connecting to various data sources to perform the data discovery process, classify the data within those systems, and identify sensitive information across various structur...
What is your experience regarding pricing and costs for IBM Security Guardium DSPM?
The pricing of IBM Security Guardium DSPM is based on the number of database servers it covers. I am not sure if my customers express their opinions about the price of IBM Security Guardium DSPM, s...
What needs improvement with IBM Security Guardium DSPM?
In terms of improvements for IBM Security Guardium DSPM, I believe there is potential for enhancement in the operational perspective, particularly in the user interface and the deployment of agents...
What is your primary use case for IBM Security Guardium DSPM?
The usual use cases for IBM Security Guardium DSPM that I mostly work with are normal data protection, vulnerability assessment, database compliance scans, data classification, and database activit...
 

Also Known As

No data available
Polar Security
 

Overview

 

Sample Customers

Home Depot, Grant Thornton LLP, Cimpress, Fidelity Investments
Information Not Available
Find out what your peers are saying about Wiz, Palo Alto Networks, Varonis and others in Data Security Posture Management (DSPM). Updated: March 2026.
889,955 professionals have used our research since 2012.