No more typing reviews! Try our Samantha, our new voice AI agent.

IBM Guardium Vulnerability Assessment vs NinjaOne comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

IBM Guardium Vulnerability ...
Ranking in Vulnerability Management
54th
Average Rating
6.0
Reviews Sentiment
8.1
Number of Reviews
4
Ranking in other categories
No ranking in other categories
NinjaOne
Ranking in Vulnerability Management
18th
Average Rating
8.2
Reviews Sentiment
7.2
Number of Reviews
25
Ranking in other categories
Help Desk Software (8th), Network Monitoring Software (10th), Server Monitoring (3rd), IT Service Management (ITSM) (7th), Remote Access (8th), Mobile Device Management (MDM) (4th), IT Alerting and Incident Management (6th), Remote Monitoring and Management (RMM) (1st), Patch Management (3rd), MSP Backup (1st), Unified Endpoint Management (UEM) (5th)
 

Mindshare comparison

As of May 2026, in the Vulnerability Management category, the mindshare of IBM Guardium Vulnerability Assessment is 0.7%, up from 0.4% compared to the previous year. The mindshare of NinjaOne is 0.9%, up from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management Mindshare Distribution
ProductMindshare (%)
NinjaOne0.9%
IBM Guardium Vulnerability Assessment0.7%
Other98.4%
Vulnerability Management
 

Featured Reviews

SL
Guardium Administrator at Interactive Group
Improvements sought in database optimization while benefiting from robust security monitoring
We use the analytical functionality of Guardium, but the analytical functionality is not so powerful or flexible because it does not include the application user ID. It only includes the database user ID. To identify risky users, it does not support end users, so IBM must incorporate this feature into the built-in analytical engine of the Guardium. There is only one problem I experienced while using Guardium: the internal database of the collector is MySQL, which is not so powerful or flexible. When you make a query in a MySQL database, it takes too much time to respond. IBM should replace this MySQL database with a more powerful internal database for the logging mechanism so that Guardium can collect logging data flexibly and ensure optimization. My overall experience with Guardium is good. The only problem is that IBM must replace the internal DB, MySQL, with a more powerful enterprise-level database because enterprises use it at an enterprise level, and MySQL does not support optimally.
Not Joseph Pearson - PeerSpot reviewer
Assistant Vice President, Tech Solutions at LPL Financials
Has simplified remote software delivery and script management but needs improved reporting flexibility and better Mac support
NinjaOne's best features include ease of use regarding enablement and deployment, a broad selection and ability of software enablement, and API deliveries. Using CrowdStrike, we are able to tie in NinjaOne's API to have these automatically deliver to endpoints upon addition of those devices to a group with that policy deployed to it. NinjaOne has positively impacted our organization by making delivery easier for our end users and improving the ability to create scripts, manage scripts, and check status of devices and their compliance. This easier delivery with NinjaOne gives us oversight on devices without having to be on the call or remoted in directly to a device.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is that it provides a simple English recommendation on actions that you need to take once a vulnerability is discovered."
"The Vulnerability Assessment feature is quite stable and helps identify numerous vulnerabilities in databases."
"It helped with some of the regulatory requirements, and it also helped with some of the security analytics and analysis, making it worthwhile from that perspective."
"The reporting features are good and there are many built-in reports that can be quickly configured."
"The most valuable feature is that it provides a simple English recommendation on actions that you need to take once a vulnerability is discovered."
"It helped with some of the regulatory requirements. It also helped with some of the security analytics and analysis. It was worthwhile from that perspective."
"The best feature is that you can see the activity in your data environment and have the ability to get the vulnerability assessments done quickly with scores that can be compared."
"The most valuable features of NinjaOne include remote desktop management, support and assistive tools, and screen sharing."
"If you're looking for a simple and cost-effective remote management tool, NinjaRMM is a good choice."
"The best feature of NinjaOne is the SLA system. Every IT person can check their performance, how long it takes to resolve an issue, and how many SLAs are breached."
"The policies are probably the most valuable features. They're similar in function to Microsoft group policies where we can have it monitor certain things or push out software on a schedule. I would rate the policies eight out of 10. They're robust, I could monitor most of the things that Windows Performance Monitoring keeps tabs on."
"The software's automation tools have solved critical deployment problems for small businesses."
"NinjaOne has positively impacted our organization by making delivery easier for our end users and improving the ability to create scripts, manage scripts, and check status of devices and their compliance."
"NinjaOne has positively impacted my organization by providing an easier way to deploy machines, manage them, troubleshoot, and assist people."
"The solution's most valuable feature is related to its remote access...I know that NinjaOne's technical support is good."
 

Cons

"The only problem is that some of the reports come up with blanks and missing data."
"The interface could be improved by having sub-groups of tests, ultimately making the process of collecting tests faster."
"There is only one problem I experienced while using Guardium: the internal database of the collector is MySQL, which is not so powerful or flexible."
"It was not as easy to use. The user-friendliness of it was somewhat lower than what I was expecting. It was also lacking in terms of the ease of the setup. There should be an automatic agent for deployment."
"Building policies is not that easy. There are some things that are turned off by default, for example, displaying values."
"I wouldn't use it. That would be my advice to others looking into implementing IBM Guardium Vulnerability Assessment."
"The interface could be improved by having sub-groups of tests, ultimately making the process of collecting tests faster."
"NinjaOne's dashboard could be easier to use."
"I want NinjaOne to improve the reports."
"Maximizing the screen during an SSH connection is not possible, which hampers usability on Linux servers."
"The one feature that I believe needs improvement is the software patching."
"The solution could improve by optimizing the internet connection being used."
"NinjaOne's reporting module is cumbersome."
"The reporting is lackluster. NinjaOne is great for maintaining systems, but it's hard to use it to understand the state that systems are in without going in and mining the information myself. I rate the reporting two out of 10."
"NinjaOne can be improved by making mobile usage on the system cheaper because it becomes an expensive commodity."
 

Pricing and Cost Advice

"One thing not advantageous for it was that it was a little bit more expensive. I would rate it one out of five in terms of pricing."
"We currently pay $1.20 per device on a monthly basis."
"NinjaOne's price is fine since my workplace is an educational institution, so we get the product at a really good price considering that we do not pay taxes, making the prices very fair and worth the product."
"NinjaRMM uses a subscription model."
"I rate the solution’s pricing a five out of ten, where one is the lowest and ten is the most expensive."
"The product's pricing depends on the number of PCs or devices."
"NinjaOne is a little expensive but is still cheaper than competitors like Acronis or Veeam."
"The pricing is reasonable and cheaper than ConnectWise."
"Its pricing is great."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
894,738 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
30%
Government
6%
Healthcare Company
6%
Construction Company
6%
Computer Software Company
10%
Comms Service Provider
9%
Financial Services Firm
8%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise3
Large Enterprise4
 

Questions from the Community

What needs improvement with IBM Guardium Vulnerability Assessment?
We use the analytical functionality of Guardium, but the analytical functionality is not so powerful or flexible because it does not include the application user ID. It only includes the database u...
What is your primary use case for IBM Guardium Vulnerability Assessment?
We are still using IBM Guardium Vulnerability Assessment. We only use IBM Guardium Data Protection and monitoring, data protection and monitoring, classical Guardium. We only use classical Guardium...
What advice do you have for others considering IBM Guardium Vulnerability Assessment?
We do not use IBM Guardium Vulnerability Assessment for data encryption or any other tool for analytics, or identity and governance. We do not use any other solution except for protection and monit...
What is your experience regarding pricing and costs for NinjaOne?
My experience with pricing, setup cost, and licensing is that I think it is very reasonable for the product that we get.
What needs improvement with NinjaOne?
To improve NinjaOne, there should be better integration between multiple different software including Cisco and Meraki.
What is your primary use case for NinjaOne?
My main use case for NinjaOne is managing machines over multiple networks and locations. For managing machines across those networks or locations, we have NinjaOne deployed on all our machines, and...
 

Overview

 

Sample Customers

Information Not Available
Status Pros, Mitchell and Company
Find out what your peers are saying about IBM Guardium Vulnerability Assessment vs. NinjaOne and other solutions. Updated: April 2026.
894,738 professionals have used our research since 2012.