No more typing reviews! Try our Samantha, our new voice AI agent.

IBM Guardium Vulnerability Assessment vs Vulcan Cyber comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

IBM Guardium Vulnerability ...
Ranking in Vulnerability Management
51st
Average Rating
6.0
Reviews Sentiment
8.1
Number of Reviews
4
Ranking in other categories
No ranking in other categories
Vulcan Cyber
Ranking in Vulnerability Management
24th
Average Rating
7.4
Reviews Sentiment
7.1
Number of Reviews
11
Ranking in other categories
Risk-Based Vulnerability Management (10th), Cloud Security Remediation (2nd)
 

Mindshare comparison

As of March 2026, in the Vulnerability Management category, the mindshare of IBM Guardium Vulnerability Assessment is 0.7%, up from 0.4% compared to the previous year. The mindshare of Vulcan Cyber is 0.6%, up from 0.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management Mindshare Distribution
ProductMindshare (%)
Vulcan Cyber0.6%
IBM Guardium Vulnerability Assessment0.7%
Other98.7%
Vulnerability Management
 

Featured Reviews

SL
Guardium Administrator at Interactive Group
Improvements sought in database optimization while benefiting from robust security monitoring
We use the analytical functionality of Guardium, but the analytical functionality is not so powerful or flexible because it does not include the application user ID. It only includes the database user ID. To identify risky users, it does not support end users, so IBM must incorporate this feature into the built-in analytical engine of the Guardium. There is only one problem I experienced while using Guardium: the internal database of the collector is MySQL, which is not so powerful or flexible. When you make a query in a MySQL database, it takes too much time to respond. IBM should replace this MySQL database with a more powerful internal database for the logging mechanism so that Guardium can collect logging data flexibly and ensure optimization. My overall experience with Guardium is good. The only problem is that IBM must replace the internal DB, MySQL, with a more powerful enterprise-level database because enterprises use it at an enterprise level, and MySQL does not support optimally.
reviewer2649297 - PeerSpot reviewer
Technical Architect at a manufacturing company with 10,001+ employees
Streamlines prioritization but reporting needs enhancement
There are several areas needing improvement. The product helps, but the reporting relies heavily on Power BI. It is limited to graphical views and requires additional filtering, posing operational challenges. The inability to download specific asset details directly from the Power BI portal is a drawback, particularly for non-technical users, though it provides high-level executive summaries. The reporting model should be enhanced so that we have the flexibility to download. We have requested a few features, and they are open to accepting those requests. It needs ITSM improvements. It has out-of-the-box integration with ServiceNow, but the customer is using BMC Helix ITSM. We would like an integration with BMC Helix ITSM. When uploading CSV files without an out-of-the-box connector, duplicate entries for assets occur. We have already reported this to them, but we are not sure when they will fix it. It will significantly benefit if we can directly upload business context information from CMDB without manual merging efforts. It can also have automatic remediation capabilities through SCCM or something else.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The reporting features are good and there are many built-in reports that can be quickly configured."
"The best feature is that you can see the activity in your data environment and have the ability to get the vulnerability assessments done quickly with scores that can be compared."
"It helped with some of the regulatory requirements. It also helped with some of the security analytics and analysis. It was worthwhile from that perspective."
"It helped with some of the regulatory requirements, and it also helped with some of the security analytics and analysis, making it worthwhile from that perspective."
"The most valuable feature is that it provides a simple English recommendation on actions that you need to take once a vulnerability is discovered."
"The Vulnerability Assessment feature is quite stable and helps identify numerous vulnerabilities in databases."
"The most valuable feature is that it provides a simple English recommendation on actions that you need to take once a vulnerability is discovered."
"Out of the three solutions I've used, Vulcan Cyber is the superior option."
"I was part of the initial deployment. It was pretty easy. To fully deploy, it took about three or four weeks."
"They recently upgraded their UI, which is great. It is user-friendly."
"The interface of Vulcan Cyber is intuitive with a lot of information about vulnerabilities, which helps in classifying and analyzing threats."
"The most notable aspects include having prioritization capabilities and custom scripts."
"Now that the solution is onboarded, we are saving a lot of time. We're saving roughly four to ten hours a week."
"One of the features that I find valuable is the ability to bifurcate the report according to the many options available."
"Vulcan Cyber is a very good tool."
 

Cons

"It was not as easy to use. The user-friendliness of it was somewhat lower than what I was expecting. It was also lacking in terms of the ease of the setup. There should be an automatic agent for deployment."
"The interface could be improved by having sub-groups of tests, ultimately making the process of collecting tests faster."
"Building policies is not that easy. There are some things that are turned off by default, for example, displaying values."
"The only problem is that some of the reports come up with blanks and missing data."
"The interface could be improved by having sub-groups of tests, ultimately making the process of collecting tests faster."
"There is only one problem I experienced while using Guardium: the internal database of the collector is MySQL, which is not so powerful or flexible."
"I wouldn't use it. That would be my advice to others looking into implementing IBM Guardium Vulnerability Assessment."
"Mainly, what I would like from them is more maintenance of the different connectors they have in the platform."
"We wish we had more insights into how they weigh the risks associated with the threat intel."
"The performance is bad. The query and the UI are always slow, and it's quite frustrating. Vulcan is trying to solve this with a newer design. The dashboard is also crowded. It pulls in all this raw information that you need to filter. Vulcan has filtering capabilities, but they're hard to manage. The labels aren't very clear, so you need to do things by trial and error. It's not as easy as other tools we've been using."
"An important area is performance and speed, as Vulcan Cyber often lacks speed when exporting reports."
"We've faced situations where we required support on a Friday, and support wasn't available."
"There are several areas needing improvement. The product helps, but the reporting relies heavily on Power BI. It is limited to graphical views and requires additional filtering, posing operational challenges."
"The fact that we cannot use it for our reporting leads me to rate it three out of ten."
"I would rate the tool between six and seven because there have been instances when the tool was down, and I couldn't access Cyber reports. Additionally, the Vulcan Cyber team made changes to the tool and did not notify us."
 

Pricing and Cost Advice

"One thing not advantageous for it was that it was a little bit more expensive. I would rate it one out of five in terms of pricing."
"Its pricing is quite fair compared to what is out there in the market, especially compared to the tool from Microsoft. It is a SaaS platform that has an annual cost, so it is something that is already used by many companies. It is quite affordable."
"Our leadership knows better about the pricing. As per my knowledge, which might not be accurate, its price can come down."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
885,376 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
30%
Government
6%
Healthcare Company
6%
Construction Company
6%
Computer Software Company
26%
Manufacturing Company
8%
Financial Services Firm
7%
Construction Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business1
Large Enterprise10
 

Questions from the Community

What needs improvement with IBM Guardium Vulnerability Assessment?
We use the analytical functionality of Guardium, but the analytical functionality is not so powerful or flexible because it does not include the application user ID. It only includes the database u...
What is your primary use case for IBM Guardium Vulnerability Assessment?
We are still using IBM Guardium Vulnerability Assessment. We only use IBM Guardium Data Protection and monitoring, data protection and monitoring, classical Guardium. We only use classical Guardium...
What advice do you have for others considering IBM Guardium Vulnerability Assessment?
We do not use IBM Guardium Vulnerability Assessment for data encryption or any other tool for analytics, or identity and governance. We do not use any other solution except for protection and monit...
What is your experience regarding pricing and costs for Vulcan Cyber?
I don't deal with the pricing of the solution. I'm not a part of that department.
What needs improvement with Vulcan Cyber?
One area for improvement is clarity in the results column of vulnerability reports. Currently, the path where the vulnerability lies is not clear, so Vulcan needs to work on specifying the correct ...
What is your primary use case for Vulcan Cyber?
I have been using the solution for more than six months. Essentially, any reporting I do for our internal Internet assets involves using Vulcan. The primary use of Vulcan is extracting the reports,...
 

Interactive Demo

 

Overview

 

Sample Customers

Information Not Available
Stitch Fix, Mandiant, Wealthsimple, Entrust, Anaplan, Deloitte, Origami Risk, Verana Health
Find out what your peers are saying about IBM Guardium Vulnerability Assessment vs. Vulcan Cyber and other solutions. Updated: March 2026.
885,376 professionals have used our research since 2012.