


Find out what your peers are saying about IBM, Imperva, Oracle and others in Database Security.
The investment return was good because IBM Security Guardium Data Protection provided significant security and compliance benefits.
My thoughts on the pricing, setup cost, and licensing of the Imperva SecureSphere Database Security are that it could be more competitive.
The answers are quick and clear.
I did not receive support from IBM.
Local vendors provide on-ground support, and if issues cannot be resolved, a support ticket is raised to the OEM via a portal.
Regarding customer support, I would like to see improvements in response time.
Considering that service disruptions were raised as a severity two issue, I would rate my experience with technical support around eight to 8.5.
The scalability of the Imperva SecureSphere Database Security in accommodating the organization's growth and database security needs is excellent.
The solution works well for large organizations and enterprise levels if appropriately sized during the setup.
It is important to manage it correctly by performing health checks with the vendor.
I rate the stability of Imperva SecureSphere Database Security as nine because there are ongoing integration processes between Imperva and Thales.
Oracle Audit Vault is very stable, with the exception of some certificate issues that disrupted the environment for up to a month.
There is a lot of documentation, but you cannot search for it on Google.
Currently, it doesn't use encryption for IBM i, because it's impossible.
Improving the tool learning process would be beneficial.
We cannot be competitive by price alone, though in terms of quality, Imperva SecureSphere Database Security is the best compared to Russian import products and building products such as Garda, which attempt to copy Imperva's data activity monitoring and database firewall functionality.
The archiving functionalities should be enhanced to allow easy conversion of archived logs into CSV or Excel formats for data analysis.
Imperva Data Security Fabric can be improved by being more useful for creating security policies that help to convince customers.
I would like to see more control over the operating system in Oracle Audit Vault.
Guardium is an expensive tool because it is targeted towards corporate enterprises.
The price is high, but it is not as high as competitors like IBM, Guardian, and Oracle.
The best feature is how many databases we can protect with one solution because it has compatibility with different databases, including Oracle, SQL, and DB2.
The valuable features enable us to track all activities on the database.
The most valuable features, in my opinion, included the alerts and protections for specific tables and fields.
Imperva SecureSphere Database Security provides one of the best solutions to analyze data, maintain GDPR compliance, and help investigate any incidents.
The real-time alerts and remediation actions available in Imperva SecureSphere Database Security have helped me promptly address security incidents.
If something malicious occurs, I can set a policy to block it, review the action, and decide whether to release it if it's found not to be malicious.
Oracle Audit Vault's best feature, if configured well and used effectively, includes the blocking and Database Firewall part that makes an impact because it allows you to filter SQLs on the fly and have more control over database access.
| Product | Mindshare (%) |
|---|---|
| IBM Security Guardium Data Protection | 26.4% |
| Imperva Data Security Fabric | 24.8% |
| Oracle Audit Vault | 10.1% |
| Other | 38.699999999999996% |

| Company Size | Count |
|---|---|
| Small Business | 28 |
| Midsize Enterprise | 17 |
| Large Enterprise | 44 |
| Company Size | Count |
|---|---|
| Small Business | 28 |
| Midsize Enterprise | 9 |
| Large Enterprise | 32 |
| Company Size | Count |
|---|---|
| Small Business | 14 |
| Midsize Enterprise | 5 |
| Large Enterprise | 11 |
IBM Security Guardium Data Protection offers real-time data activity monitoring and advanced user behavior analytics to secure sensitive enterprise data and streamline compliance with regulations like PCI, SOX, HIPAA, and CCPA.
IBM Security Guardium Data Protection effectively discovers and classifies sensitive data across enterprises, providing comprehensive auditing and database protection. It enhances security through real-time access control, masking, and firewall capabilities, ensuring compatibility with diverse databases. It includes customizable reports and efficient alert systems, helping organizations manage privileged user access and detect unauthorized activities efficiently. While improvements in reporting, analytics, and cloud service support could enhance its performance, its GUI flexibility and vulnerability assessments make it a preferred choice for data security. Some users query the technical support and seek simpler upgrade processes and improved performance. The deployment is appreciated for its ease, yet integration capabilities are suggested to be strengthened for better usability.
What key features does IBM Security Guardium Data Protection offer?In industries like finance, IBM Security Guardium Data Protection is instrumental in monitoring privileged database access and ensuring compliance with stringent regulations such as PCI and GDPR. Organizations utilize its vulnerability assessments and audit trails to secure sensitive data against unauthorized access, manage risks, and maintain data integrity continuously.
Imperva Data Security Fabric provides cutting-edge database security, featuring capabilities like activity monitoring, web application firewalls, and real-time alerting for comprehensive data protection.
Imperva Data Security Fabric focuses on securing databases through advanced monitoring, logging, and user behavior analysis. With features designed for ease of configuration, it effectively blocks unauthorized access and maintains detailed audit logs. Integration with other systems and automated reporting enhance vulnerability assessments and compliance efforts. Imperva's data discovery, classification, and masking capabilities strengthen security by managing user rights and uncovering vulnerabilities, making it ideal for protecting sensitive data and supporting forensic and compliance needs.
What are the key features of Imperva Data Security Fabric?Imperva Data Security Fabric is widely used across industries like finance and government, focusing on database security, activity monitoring, and user behavior analysis. It is essential for detecting unauthorized access and preventing data breaches while ensuring compliance. Financial institutions and government agencies leverage its capabilities to maintain data integrity and monitor database activities, implementing firewalls and vulnerability assessments that secure on-premises and cloud environments.
Oracle Audit Vault effectively monitors databases for unauthorized SQL, changes, audit activities, and supports compliance needs. With centralized control over logs and reports, it seamlessly integrates and supports real-time threat detection and data encryption.
Oracle Audit Vault is designed to enhance database security by centralizing audit data and simplifying compliance. It enables real-time monitoring through a database firewall, supports agentless deployment, and provides a comprehensive application context. With a focus on user activity auditing and access isolation, it offers advanced compliance reporting. Users find it integrates well, but seek improved detection for network failures, better platform integration, and enhanced security tools. Challenges like custom reporting and transition from older versions present obstacles, while faster support services are desired for more efficient operations.
What are the main features of Oracle Audit Vault?In financial services and banking, Oracle Audit Vault is critical for filtering database traffic and ensuring regulatory compliance. Its centralized auditing helps these industries streamline processes, maintain PCI and GDPR compliance, and conduct proactive monitoring. The ability to set privilege policies and encrypt databases is key for institutions handling sensitive data.