it_user551505 - PeerSpot reviewer
Senior Advisory Consultant - Cyber Security Practice at a consultancy with 10,001+ employees
Real User
The Data Activity Monitor covers data warehouses and file shares. It helped control excessive administrator rights to databases.

What is most valuable?

It’s available as a hardware appliance as well as software. This provides flexibility as to how you want to deploy the tool.

It can automatically locate DBs, as well as discover and classify sensitive data.

Data Activity Monitor covers what appears to be every DB imaginable, even data warehouses and file shares.

It allows administrators to enforce trigger alerts built around predefined policies, so that any access to sensitive data can be tracked and blocked if necessary.

How has it helped my organization?

It helped control excessive administrator rights to databases and automated the compliance auditing process.

It located/discovered unknown databases and the sensitive data that existed in those databases.

What needs improvement?

There was a slight performance tax on the system and load balancing could be better. We would also like more robust reporting.

For how long have I used the solution?

I have used Guardium for six months.

Buyer's Guide
IBM Security Guardium Data Protection
March 2024
Learn what your peers think about IBM Security Guardium Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
769,630 professionals have used our research since 2012.

What do I think about the stability of the solution?

Once it was installed and implemented, it seemed to be a very stable product.

What do I think about the scalability of the solution?

This is definitely a scalable product. You can build out a basic stand-alone architecture with one collector all the way to enterprise wide architecture that covers multiple datacenters and continents.

How are customer service and support?

I never interacted with tech support.

Which solution did I use previously and why did I switch?

No previous or different solution was used.

How was the initial setup?

If I remember correctly, the setup was a bit complex; not so much the installation, but a lot of tweaking and tuning of policies, setting up traffic filters, whitelisting the traffic, and so on.

What's my experience with pricing, setup cost, and licensing?

I was not privy to this information.

Which other solutions did I evaluate?

I wasn’t part of the evaluation for the tool.

What other advice do I have?

Try to have a dedicated team. There are a lot of moving parts and you need take a hands-on approach. It doesn’t come configured out of the box.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user841977 - PeerSpot reviewer
Sr. Security Engineer
Real User
Saves us time monitoring and protecting a vast environment
Pros and Cons
  • "The solution has definitely saved us time, because if you want to monitor this kind of vast environment of different products, it's going to take a lot of time. Let's say one database server has 100 database instances running on it; I don't need to install 100 data instances, I just need to install on the one database server and that will cover all of my instances on that particular database."
  • "Initially it did not have support external applications like, say, Tableau, ServiceNow, Remedy, and the like. They have started growing into it, but I would like to have more and more integration with outside applications."

What is our primary use case?

We are monitoring about 1500 or more applications, we have 150 million customers and their PHI/PII data in the repository. We have to protect that data. That is a big challenge because it's a vast environment that we have to protect. That is one of the prime use cases which caused us to select this product.

Initially, we had some challenges, but as we talked with IBM and they provided some good support on it, now we are evolving pretty well. Certainly, everything is not perfect yet, but we are moving into that direction. We are far better than we were two years back.

How has it helped my organization?

We use Guardium to support security initiatives and compliance policies within the organization. For example, an audit comes in once every three months or six months. In that case they ask specific questions and they say, "Hey, just check the box if you are doing this stuff or not," and we are providing them all the evidence that we have collected through Guardium.

It helps comply with industry regulations. It's basically the same thing. If somebody wants to know if we are protecting their data or not and, if yes, how? And they ask us to present the definitions of what we are doing, we just go and get the reports that are required. Let's say for a particular application, it says "This database was down last night, who did it, and how?" we provide all that kind of information.

The solution has definitely saved us time, because if you want to monitor this kind of vast environment of different products, it's going to take a lot of time. Let's say one database server has 100 database instances running on it; I don't need to install 100 data instances, I just need to install on the one database server and that will cover all of my instances on that particular database. 

In terms of saving money, today, if you want to monitor and protect your environment, you have to spend money. So, that's not a question.

What is most valuable?

In terms of advanced features, we are using the Database Activity Monitoring and the Vulnerability Assessment as well. Now we are thinking of using the GDPR because that's going to be a compliance as well. So some but not all of them.

What needs improvement?

Initially it did not have support external applications like, say, Tableau, ServiceNow, Remedy, and the like. They have started growing into it, but I would like to have more and more integration with outside applications. So that, let's say my one of my application owners has Tableau and wants to directly report on that; if I can just pick and see that report with one click, that would help.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

It's stable. When I used this product back in 2007 it was challenging, but now it's it's stable.

What do I think about the scalability of the solution?

The scalability is not that easy to use because, you need a lot of knowledge about it, on data security; basically you need to know where your sensitive data is. We tried to use Guardium for that, to find out with the Discovery feature, but it didn't work, because we had a lot of irregular data. We found it ourselves, but Guardium is protecting it; so that's good for us.

How is customer service and technical support?

I would say eight and a half out of 10. I've been in this Guardium stuff for the last 10 to 11 years. I have worked with IBM throughout that time. It has improved, but still it is eight and a half out of 10.

How was the initial setup?

It was pretty straightforward.

What other advice do I have?

I would definitely recommend it. It's easy to use and it can save a lot of headaches, by just implementing it and being able to ask at the time of audit. When it comes to audits, every company wants to be safe.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
IBM Security Guardium Data Protection
March 2024
Learn what your peers think about IBM Security Guardium Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
769,630 professionals have used our research since 2012.
Information Security Analyst Consultant at a insurance company with 10,001+ employees
Real User
It has automated a bunch of manual tasks, but it is fairly buggy at times
Pros and Cons
  • "You could easily throw it onto a VM or add additional hardware. One central manager supports about a hundred managed units, so scalability is excellent.​"
  • "Guardium does a great job of capturing data and having the ability of trying to pull it out and make sense of it. Using it for business applications is its biggest capability."
  • "It has automated a bunch of manual tasks, giving us insights into activities that we would not otherwise be able to capture."
  • "We have had some issues with patches breaking things unexpectedly in our environments."
  • "​Overall testing and quality need improvement. It is fairly buggy at times, so it feels like it could use additional staff on the product, testing and trying it out."
  • "I would like to see a lot of additional reporting and analytics features. They have basic outlier detection, but I would love to see that go further, and model it after analytics tools like Splunk."

What is our primary use case?

Our primary use case would be for compliance reporting: DBA activity monitoring for SOX regulations.

It has performed fairly well. There are issues here and there, but it is the only product on the market that can do this job. It is the industry leader in database security.

How has it helped my organization?

It has improved the way our organization functions. It has automated a bunch of manual tasks, giving us insights into activities that we would not otherwise be able to capture.

We use it to support our top two security initiatives. We have one large project that is focused around locating our sensitive data elements and we have used the discovery agent to do just that. Then, we also have another stream in that project towards monitoring these sensitive data stores, so we use some of the Guardium monitoring features and alerting features to monitor these sensitive databases.

We use it for our SOX compliance reporting. We have it integrated with LDAP and Active Directory. We are looking to integrate it further with Splunk and a change management system. 

The integration process is challenging: 

  • Pulling from the Active Directory and LDAP is not bad once you figure it out. Typically, customers need to work with IBM support to do this. 
  • For the Splunk integration, we are in process of doing this. We have been working with Splunk to pull the data out. 
  • For the change management piece, we have not really started this yet.

What is most valuable?

Some of its reporting capabilities. Guardium does a great job of capturing data and having the ability of trying to pull it out and make sense of it. Using it for business applications is its biggest capability. 

We use many of the advanced features. We are one of the more advanced Guardium clients, thus we use features, such as custom tables and the ability to import custom data. We have used some of the data discovery pieces before, along with the classification builder. Therefore, we are pretty strong power users in the product.

We have been looking into Guardium Big Data Intelligence and seeing if it makes sense for our organization.

What needs improvement?

Overall testing and quality need improvement. It is fairly buggy at times, so it feels like it could use additional staff on the product, testing and trying it out.

I would like to see a lot of additional reporting and analytics features. They have basic outlier detection, but I would love to see that go further, and model it after analytics tools like Splunk. If the product could integrate with Splunk, or mimic it, it would provide a lot of value. 

What do I think about the stability of the solution?

Stability is average. There are frequently new issues with releases. As long as you stay a version or two behind, you are pretty stable. However, we have had some issues with patches breaking things unexpectedly in our environments.

What do I think about the scalability of the solution?

Scalability is very good. You could easily throw it onto a VM or add additional hardware. One central manager supports about a hundred managed units, so scalability is excellent.

How are customer service and technical support?

We frequently use technical support. We have some arrangements made with them, but our support is generally pretty good for smaller issues. For larger issues, we would like a bit more communication from them. Therefore, when there is a known product bugs, known fixes, or known issues, it would be great if they made those a little easier to find or published them at all. That would save us a lot of time and effort.

Which solution did I use previously and why did I switch?

We invested in Guardium because of regulatory compliance issues. Guardium is the only product in the market that could meet these needs. 

How was the initial setup?

I was not involved in the initial setup.

What was our ROI?

Guardium has not saved us time or money. Senior management is aware of this.

What's my experience with pricing, setup cost, and licensing?

If you are researching this type of solution, work with IBM.

Which other solutions did I evaluate?

Only Guardium.

What other advice do I have?

Most important criteria when selecting a vendor: 

  1. The ability to meet requirements.
  2. Costing
  3. Scalability and market share.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1260978 - PeerSpot reviewer
reviewer1260978Works at a tech services company with 501-1,000 employees
Real User

users intelligence and automation to safeguard data

Sr. Network Specialist at a tech services company with 501-1,000 employees
MSP
A mature product that identifies abnormal activity on the database
Pros and Cons
  • "The purpose of EBM Guardium is to monitor database activity and who is accessing it. This is the most valuable feature."
  • "IBM Guardium Data Protection is a mature product. There is a lot of encryption that is not owned by IBM and is done by a third party and is not an integral part of the solution."

What is our primary use case?

We are resellers of IBM. Most of the use cases of IBM Guardium are to monitor the database activity. The first is to identify any abnormal activities like trying to access the database or trying to create or delete any scheme on the tables. 

What is most valuable?

The purpose of EBM Guardium is to monitor database activity and who is accessing it. This is the most valuable feature.

We have privileged users, like the DBAs, who are most often the ones accessing the database. We also have web services and application services that talk to the database. With IBM Guardium Data Protection we can see who the previous users were and what web or server actually connected to the data business. 

Secondly, any changes done by the DBAs are recorded so we know that the DB has changed in the data structure, scheme, or creation of a table or drop of a table. 

What needs improvement?

IBM Guardium Data Protection is a mature product. There is a lot of encryption that is not owned by IBM and is done by a third party and is not an integral part of the solution.

What do I think about the stability of the solution?

This solution is stable, I don't believe there is another product that is more stable.

What do I think about the scalability of the solution?

The solution is part of IP so you can scale it.

How are customer service and support?

IBM Guardium Data Protection has one of the best supports out there.

How was the initial setup?

The initial setup of IBM Guardium is straightforward. The deployment depends on the organization and types of servers. The only delay is when there are critical data servers that require a planned approach. 

You can deploy the solution by pushing it through a central aggregator or a collector.

What about the implementation team?

We engage a consult to deploy the solution because it is not only installing the solution but also doing a report. 

The installation requires the involvement of a DBA, but it depends on the number of databases.

What's my experience with pricing, setup cost, and licensing?

The licensing is much easier now. It's for IP, it is not part It's not part number of databases of schema, it's for the IP so it's much simpler now.

What other advice do I have?

If you are considering IBM Guardian Data Protection you should be aware of your environment. For example, if you are in the banking sector you need to plan very well so it can be scaled accordingly.

It is important to hire a consultant when installing this solution. They can provide an analysis of what exactly needs to be done. Keep in mind that this is a data access management database, it's not only about data but also about files. 

I rate this solution a 9 out of 10.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Ahmer Faisel Khan - PeerSpot reviewer
Director | CTO at COMMTEL
Real User
Easy to use and has comprehensive monitoring options
Pros and Cons
  • "The most valuable features have been how easy it is to deploy and use, as well as the comprehensive monitoring options. These are a few things that customers like most about this product."
  • "The analysis part of this product could be improved. It's a very comprehensive product, so the features it has complement customer requirements. But I would like to see more emphasis on analytics, and it would be great if they added machine learning. They already have analysis insights, but a comprehensive analytical feature that's already incorporated into the solution would be very helpful."

What is our primary use case?

The primary use case for most of our customers is for monitoring and compliance. It's mostly deployed on-premises and it's a database activity monitoring solution. 

What is most valuable?

The most valuable features have been how easy it is to deploy and use, as well as the comprehensive monitoring options. These are a few things that customers like most about this product. 

What needs improvement?

The analysis part of this product could be improved. It's a very comprehensive product, so the features it has complement customer requirements. But I would like to see more emphasis on analytics, and it would be great if they added machine learning. They already have analysis insights, but a comprehensive analytical feature that's already incorporated into the solution would be very helpful. 

For how long have I used the solution?

I have been working with IBM Guardium for the past 10 years. 

What do I think about the stability of the solution?

This solution is stable and reliable. 

What do I think about the scalability of the solution?

This solution is scalable. That's one of the missions of this product—it can scale. 

How are customer service and support?

I think technical support is generally helpful, but it depends on the situation and the complexity of the problem. Most of the time, we resolve customers' issues ourselves, but technical support is helpful whenever I do require their help. 

How was the initial setup?

Most of the time, the deployment process is straightforward. There is a specific process which isn't too complicated or difficult. The amount of maintenance that will be required depends on the deployment. When we set up the solution, we usually try to optimize it so that it requires little maintenance. 

What about the implementation team?

My company provides implementation services to customers. 

What's my experience with pricing, setup cost, and licensing?

Guardium is most suitable for large scale enterprises because the pricing model is better if you are implementing a large number of databases. It may be suited to medium enterprises, but to a lesser extent. It depends on customer requirements, but it's best suited to large companies because of affordability. 

Which other solutions did I evaluate?

I have experience with Oracle Audit Vault and Imperva SecureSphere Database Security, which are the two main competitors. If you compare Guardium with Audit Vault, the main differences are in the deployment model, how they work, and the focus of each product with regard to monitoring. Audit Vault has a different deployment method. Imperva is more similar to Guardium. 

What other advice do I have?

If you are looking to implement Guardium, you first need to understand your requirements. The objective of these database and security monitoring solutions is for compliance and auditing. You want a solution that will monitor everything, but the main objective is to monitor the right areas or the key parts of the area that should be monitored. This is the one thing customers should consider before choosing any database or similar solution. 

We have good relationships with our customers, so whenever they're looking for a solution, we try to partner with them and align them with a product that will meet their needs. Usually when we go with this product, we go with SQL first, then go for integration deployment. Our recommendations are based on customer requirements. Even if it's a good product, it may not be a good fit for the customer. 

I would rate this product an eight out of ten, just because there's always room for improvement. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
DBA Dept. Manager at a computer software company with 501-1,000 employees
Real User
Flexible, stable, and easy to use
Pros and Cons
  • "The product has proven to be flexible"
  • "The installation should be a bit easier."

What is our primary use case?

We will primarily use the solution for protecting our database. We're still implementing the product. It's not fully in place just yet.

What is most valuable?

The solution is easy to use.

We've found the solution to be very stable.

The product has proven to be flexible.

The system, overall, is quite reliable.

What needs improvement?

The installation should be a bit easier. It's pretty hard to implement right now.

The solution is very expensive. It's expected, as IBM is known to be pricey. It would be nice if they could make it cheaper.

As we are still in the process of implementing the product, it's hard to discuss the features and what might be missing, or could be added. We need more time with the solution to see how it works or what's missing.

For how long have I used the solution?

We've only been using the solution for a short time by now. We're in the middle of implementing it. It's likely only been a couple of weeks.

What do I think about the stability of the solution?

We have found the stability to be quite good. It doesn't crash or freeze. There are no bugs or glitches. Its performance has been very good so far.

What do I think about the scalability of the solution?

The solution is very scalable. If a company needs to expand it, it can do so easily.

Only the administrators really deal with the solution at this time. There are four of us.

We did pay for it, therefore we do plan to continue to use it for the foreseeable future.

How are customer service and technical support?

Our support is through a third-party service, and not directly through IBM itself.

It's been very good so far. They are helpful and responsive.

Which solution did I use previously and why did I switch?

We did not previously use another solution before choosing this IBM product.

How was the initial setup?

The installation is not straightforward at all. In fact, it is very, very complicated. We found the process to be quite difficult to handle. The hardest part is the tuning of the system, to make it work right.

What's my experience with pricing, setup cost, and licensing?

The product is expensive, which is what you tend to expect from IBM products. It's not cheap.

What other advice do I have?

We may be using version 11 of the product at this time.

We're still in the process of implementing the solution. It's still quite new to us.

Right now, I would rate the solution at a nine out of ten, however, I do need more time to really get to know it to evaluate it properly. I likely need another good six months or so with the solution before I can really rate it effectively.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
AsifIqbal - PeerSpot reviewer
Chief Information Security Officer at a financial services firm with 1,001-5,000 employees
Real User
Top 5Leaderboard
Very stable with good access but requires better technical support, in addition it required heavy hardware resources in recovery which is a big challenge.
Pros and Cons
  • "he solution offers trouble-free access."
  • "The technical support is very poor."

What is our primary use case?

We primarily use the solution for database access management where they are using DML commands. We use it for compliance and validation. If there's any change in the record, this solution will notify us.

How has it helped my organization?

It provide real time alerts and report for the review with senior management.  

What is most valuable?

The solution is very good at marking.

The initial setup is quite easy.

The solution offers trouble-free access.

What needs improvement?

The reporting on the solution is weak. It needs to be improved and enhanced. From a management point of view, it's really important to have reports. They should be offering easily extractable reports that we, as users, can benefit from.

The technical support is very poor.

Integrations are difficult to configure upon the initial setup.

The solution needs to offer data encryption.

For how long have I used the solution?

We've been using the solution for the last three and a half years.

What do I think about the stability of the solution?

The solution is very stable. We don't seem to experience bugs or glitches. It doesn't crash or freeze.

What do I think about the scalability of the solution?

The product's scalability is fine, however, the requirements for scalability make it somewhat limited, as you will need to add hardware resources in order to expand it. Other than that, yes, the scalability is there, and you can use it, but you need to keep in mind that there is hardware that you have to have in place.

How are customer service and support?

We haven't been happy with the support. We're always facing issues with integration with one database and we don't get a detailed response. Their help just hasn't been adequate. Our team is now basically working with a local partner for support, however, it's an aspect of the product I'm very unhappy with.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We didn't previously use a different solution.

How was the initial setup?

The initial setup is quite easy. It's not an issue and is very straightforward. That said, teamwork becomes an issue due to the fact that the troubleshooting part is a little bit difficult. We need to have some more insights from IBM to help us along. 

If you are new to the product, you need to have a more qualified person to assist you with the process, and ultimately we have to engage with technical support. The response is not fast, however. The product is a critical part of our environment, so we need a rapid response from the site to sort out the issue, whatever it might be.

We have two people currently managing the product.

You only need one person to deploy the product.

What about the implementation team?

We had one person from the vendor come and help us deploy the solution.

We definitely needed more assistance and have tried to get the help of technical support for some integration issues, however, the response hasn't been fast enough.

What's my experience with pricing, setup cost, and licensing?

I'm not sure of the exact cost of the solution, however, I believe the features have separate costs. We have a data protection license and on top of that, we need to buy however many databases we need to monitor everything effectively.

Which other solutions did I evaluate?

In the current environment that I'm working in, I did not evaluate other products. However, in the past, I have had to utilize other products.  don't recall what it was exactly, though. The other solution was from McAfee.

In terms of the ease of access and ease of deployment, IBM Guardium was much easier to deploy. However, in terms of maturity, then definitely that the other product that I used in the past was more mature than the IBM Guardium Products. 

What other advice do I have?

We're looking to upgrade the solution soon. I'm not sure which version we are currently using.

I would recommend others considering the solution to make sure they get local partners who can basically deploy the product. They need to have someone with sound experience. I have found a partner who applies the product often just simply deploys it and they don't have a use case available. They don't have the right experience. You need to choose your partner carefully or be ready to work hard yourself to deploy the product in the best possible way. 

I would rate the solution seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user844467 - PeerSpot reviewer
VP Systems Engg at a financial services firm with 10,001+ employees
Real User
Heuristic network traffic analysis enables us to implement rule-based algorithms
Pros and Cons
  • "It has been very difficult to analyze all the network traffic with something else. Guardium provides that feature, it's heuristic. So we have rule-based algorithms in place to take care of that."
  • "There are features like end-to-end and S-TAP mapping, and the ability to install policies for your configuration builder. They're not there, but we'd like to see them in the next version."

What is our primary use case?

Database activity monitoring.

It performs its job quite well.

How has it helped my organization?

We use Guardium to support security initiatives and compliance policies such as  APCI, SOX, GDPR, pretty much everything.

We are in the process of integrating Guardium with a couple of systems including IDSM.

It does save us time and money. I can't quantify it in terms of money, but it has been very difficult to analyze all the network traffic somewhere else. Guardium provides that feature, it's heuristic. So we have rule-based algorithms in place to take care of that.

What is most valuable?

The ability to do its job properly, database activity monitoring for insider threat. That's primarily why we use it and it does a good job.

Among the advanced features, we use Vulnerability Assessments. We are in the process of using Discovery Classification as well.

What needs improvement?

We have made a list of RFIs. There are features like end-to-end and S-TAP mapping, and the ability to install policies for your configuration builder. They're not there, but we'd like to see them in the next version.

What do I think about the stability of the solution?

Stability has improved with the newer versions.

What do I think about the scalability of the solution?

It scales well. The newer versions scale very well compared to the earlier versions.

How is customer service and technical support?

They're brilliant. 

How was the initial setup?

I was not involved in the initial setup, my manager was. But I have been involved with the latest versions. Initially, from 32-bit to 64-bit was a nightmare, but the latest 64-bit versions are pretty straightforward.

What other advice do I have?

When selecting a vendor, what's important for us is 

  • how quickly they can provide customer support
  • scalability
  • reliability
  • dependency.

Overall, I'd rate it at eight out of 10. It could be a 10, however there are few features, like the ones I mentioned, that are still a work in progress.

Regarding advice to a colleague, determine what your business needs are. If your business needs are similar to the ones Guardium solves then you should go for it. The implementation is seamless, the requirements are straightforward, and it's easy to use the product.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free IBM Security Guardium Data Protection Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2024
Product Categories
Database Security
Buyer's Guide
Download our free IBM Security Guardium Data Protection Report and get advice and tips from experienced pros sharing their opinions.