Imperva Data Security Fabric and IBM Security Guardium Data Protection compete in the data security sector. Imperva appears to have the upper hand due to its comprehensive suite of features and adaptability across various environments.
Features: Imperva Data Security Fabric offers real-time monitoring, threat detection, data classification, high customization capabilities, and ease of integration with SIEM tools. IBM Security Guardium focuses on database activity monitoring, vulnerability assessments, and detailed reporting with centralized management, excelling in managing heterogeneous environments with robust policies and encryption options.
Room for Improvement: Imperva faces challenges with complex deployment and integration in mixed cloud environments, suggesting enhancements in GUI, support for containerized systems, and export options. IBM Guardium requires improvements in its outdated user interface, complex setup, and cumbersome reporting. Enhancements in data encryption and intuitive management could improve user experience.
Ease of Deployment and Customer Service: Imperva is adaptable across various environments but encounters issues with complex on-premises deployments and mixed customer service experiences. IBM Guardium is primarily on-premises with hybrid options, known for difficult deployment and mixed customer service reviews, with some users experiencing slow issue resolution.
Pricing and ROI: Imperva is considered expensive but offers good ROI for large enterprises with various licensing options and strong security features. IBM Guardium's pricing is also high, often seen as expensive with a complex licensing model, but provides significant ROI for large-scale deployments.
The investment return was good because IBM Security Guardium Data Protection provided significant security and compliance benefits.
My thoughts on the pricing, setup cost, and licensing of the Imperva SecureSphere Database Security are that it could be more competitive.
I did not receive support from IBM.
Local vendors provide on-ground support, and if issues cannot be resolved, a support ticket is raised to the OEM via a portal.
Regarding customer support, I would like to see improvements in response time.
The scalability of the Imperva SecureSphere Database Security in accommodating the organization's growth and database security needs is excellent.
The solution works well for large organizations and enterprise levels if appropriately sized during the setup.
It is important to manage it correctly by performing health checks with the vendor.
I rate the stability of Imperva SecureSphere Database Security as nine because there are ongoing integration processes between Imperva and Thales.
Improving the tool learning process would be beneficial.
We cannot be competitive by price alone, though in terms of quality, Imperva SecureSphere Database Security is the best compared to Russian import products and building products such as Garda, which attempt to copy Imperva's data activity monitoring and database firewall functionality.
The archiving functionalities should be enhanced to allow easy conversion of archived logs into CSV or Excel formats for data analysis.
Guardium is an expensive tool because it is targeted towards corporate enterprises.
The price is high, but it is not as high as competitors like IBM, Guardian, and Oracle.
The most valuable features, in my opinion, included the alerts and protections for specific tables and fields.
Imperva SecureSphere Database Security provides one of the best solutions to analyze data, maintain GDPR compliance, and help investigate any incidents.
The real-time alerts and remediation actions available in Imperva SecureSphere Database Security have helped me promptly address security incidents.
If something malicious occurs, I can set a policy to block it, review the action, and decide whether to release it if it's found not to be malicious.
Product | Market Share (%) |
---|---|
IBM Security Guardium Data Protection | 29.2% |
Imperva SecureSphere Database Security | 26.3% |
Other | 44.5% |
Company Size | Count |
---|---|
Small Business | 28 |
Midsize Enterprise | 14 |
Large Enterprise | 45 |
Company Size | Count |
---|---|
Small Business | 26 |
Midsize Enterprise | 9 |
Large Enterprise | 32 |
IBM Security Guardium Data Protection automatically discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data.
Deploy the solution to help discover regulated data in your data stores and use pre-built templates for regulations such as PCI, SOX, HIPAA, CCPA and many more, to streamline and automate compliance workflows.
Imperva Data Security Fabric provides cutting-edge database security, featuring capabilities like activity monitoring, web application firewalls, and real-time alerting for comprehensive data protection.
Imperva Data Security Fabric focuses on securing databases through advanced monitoring, logging, and user behavior analysis. With features designed for ease of configuration, it effectively blocks unauthorized access and maintains detailed audit logs. Integration with other systems and automated reporting enhance vulnerability assessments and compliance efforts. Imperva's data discovery, classification, and masking capabilities strengthen security by managing user rights and uncovering vulnerabilities, making it ideal for protecting sensitive data and supporting forensic and compliance needs.
What are the key features of Imperva Data Security Fabric?Imperva Data Security Fabric is widely used across industries like finance and government, focusing on database security, activity monitoring, and user behavior analysis. It is essential for detecting unauthorized access and preventing data breaches while ensuring compliance. Financial institutions and government agencies leverage its capabilities to maintain data integrity and monitor database activities, implementing firewalls and vulnerability assessments that secure on-premises and cloud environments.
We monitor all Database Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.