

Find out what your peers are saying about IBM, Imperva, Oracle and others in Database Security.
| Product | Market Share (%) |
|---|---|
| IBM Security Guardium Data Protection | 26.0% |
| Imperva Data Security Fabric | 24.4% |
| Oracle Audit Vault | 13.5% |
| Other | 36.1% |
| Product | Market Share (%) |
|---|---|
| Vormetric Application Crypto Suite | 2.6% |
| Perforce Delphix | 11.4% |
| Informatica Intelligent Data Management Cloud (IDMC) | 7.5% |
| Other | 78.5% |
| Company Size | Count |
|---|---|
| Small Business | 28 |
| Midsize Enterprise | 15 |
| Large Enterprise | 45 |
IBM Security Guardium Data Protection offers automatic discovery and classification of sensitive data, real-time monitoring, and advanced analytics to identify unusual activities around data.
IBM Security Guardium Data Protection is designed to safeguard sensitive data across enterprises with real-time activity monitoring and comprehensive security features. Its capabilities include data discovery, classification, and compliance automation with pre-built templates for regulations like PCI, SOX, HIPAA, and CCPA. Supporting a variety of platforms, it facilitates seamless monitoring, making it a valuable asset for diverse environments in maintaining data security and compliance.
What are the key features?Industries like banking and finance utilize IBM Security Guardium Data Protection to enhance database security and compliance efforts. Enterprises employ it to detect incidents and manage vulnerabilities, focusing on protecting customer data and maintaining privacy standards. The technology aids in incident detection and supports adherence to security regulations.
At the core of the Vormetric Application Crypto Suite from Thales is a set of products that streamline development efforts to add encryption, tokenization, masking and other cryptographic functions to applications. The job of the developer is made easy and fast by leveraging sample code and APIs that are best for their environment, while key management functions are kept separate and secure in a FIPS 140-2 hardware or virtual appliance that is operated by IT or SecOps. Securing data at the application, with separation of duties for key management, provides the highest levels of protection and compliance.
The Vormetric Application Crypto Suite also includes applications and utilities that leverage the core components to add security layers to databases and other structured data stores.
We monitor all Database Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.