Database logging and audit functions are the most valuable features. In some fields like banking, it's very important to be aware of the actions of database users, and ensure that those without the permission to access information do not access it.
Senior Middleware Engineer at a tech company with 501-1,000 employees
We used it to harden databases by defining policies for alerting and blocking access to prohibited and restricted data.
Pros and Cons
- "Database logging and audit functions are the most valuable features."
- "I would like to be able to upgrade appliances within major versions without needing to rebuild the appliance."
What is most valuable?
How has it helped my organization?
We succeeded at hardening our customer databases by defining policies for alerting and blocking access to prohibited and restricted data.
What needs improvement?
I would like to be able to upgrade appliances within major versions without needing to rebuild the appliance. Once, I tried to upgrade a Guardium Appliance from v9.5 to v10 and there was no available patch for that. Therefore, the solution was to back up the appliance data, rebuild the appliance with the v10 image and then restore the data. This procedure is highly risky, because you can lose all the data if the restoration does not succeed. Installing a patch is much easier and there is no data loss risk!
For how long have I used the solution?
I have used it for 2 years.
Buyer's Guide
IBM Security Guardium Data Protection
September 2025

Learn what your peers think about IBM Security Guardium Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,759 professionals have used our research since 2012.
What do I think about the stability of the solution?
I have not encountered any stability issues.
What do I think about the scalability of the solution?
I have not encountered any scalability issues.
How are customer service and support?
Technical support is unsatisfactory. IBM Support failed to provide me with the v9-v10 upgrade patch as it is suggested on a upgrade roadmap technote.
Which solution did I use previously and why did I switch?
Back when I was a developer, I developed an audit trail module in Java/JEE. Obviously, it was not as sophisticated as Guardium.
How was the initial setup?
Initial setup was straightforward.
Which other solutions did I evaluate?
Before choosing this product, I did not evaluate other options. We implement exclusively IBM products.
What other advice do I have?
At first, IBM Guardium may seem complicated, but once you learn the basics, it becomes simple to use.
Disclosure: My company has a business relationship with this vendor other than being a customer. We're IBM business partners.

Senior IT Consultant, Pre-Sales Manager, Project Leader at a tech services company with 51-200 employees
Fulfills the international standard security requirements, such as PCI DSS.
What is most valuable?
- Database Activity Monitoring: Fulfills the international standard security requirements, such as PCI DSS
- It is very transparent on all of the query access controls of the monitored databases
How has it helped my organization?
According to my client, it fulfills the PCI DSS standard requirements that are implemented in his bank.
What needs improvement?
The graphics are so lame. I am sure that the latest version of Guardium, Version 10, would have improved it perfectly.
I see that they have improved the chart and diagram in the latest version of Guardium. However, there are some limitations on how the chart displays the data for analytic needs.
I am not sure if Guardium has the dashboard design to see the information much better.
For how long have I used the solution?
I have used it for three years.
What do I think about the stability of the solution?
We did encounter stability issues. Do not upgrade directly to the latest fix pack unless people have confirmed that it is stable.
What do I think about the scalability of the solution?
There were no scalability issues.
How is customer service and technical support?
Technical support is always available for you. I suggest the following:
- Call IBM and make a Severity 2 request instead of Severity 3 request.
- Ask them to provide remote access to your system right away.
- Prepare the log files that they usually request.
What's my experience with pricing, setup cost, and licensing?
They have changed the way of licensing. It is no longer according to your core. It is now based on how many servers you use. The price should be way less expensive.
Disclosure: My company has a business relationship with this vendor other than being a customer. Optus Solution is an IBM Business partner and I work for Optus. If you are looking for a company or a consultant, you may contact me via my email: lin.guangming2010@gmail.com.
Buyer's Guide
IBM Security Guardium Data Protection
September 2025

Learn what your peers think about IBM Security Guardium Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,759 professionals have used our research since 2012.
Database Security Specialist at a tech services company with 51-200 employees
Provides database activity monitoring. Can discover databases on your network and find their vulnerabilities.
What is most valuable?
- Monitors database activities of end users who are connected to databases (DBAs and developers)
- Classifies critical objects on the databases
- Discovers databases on your network
- Finds vulnerabilities of your databases
- Blocks critical activities
How has it helped my organization?
- Helps us define and monitor critical data in the environment, even when stored in RDBMS, big data, or unstructured files.
- Helps us to pass compliance audits, such as like HIPAA, SOX, and PCI.
What needs improvement?
The blocking and dynamic data masking features need improvement.
For how long have I used the solution?
I am working as an IBM partner. We have provided solutions for nearly 50 customers for five years. Most of our customers are banks and telecoms.
What do I think about the stability of the solution?
IBM Security Guardium is a mature product. Although it needs agents on the server to monitor their database or file traffic, we did not encounter serious issues so far.
How are customer service and technical support?
IBM has three layers for Guardium support. In critical cases, technical support analyzes the issues very quickly to find a solution.
Which solution did I use previously and why did I switch?
I did not use another solution before this one.
How was the initial setup?
The setup is straightforward. There is an ISO file that is developed by IBM that contains all of the OS and Guardium application files. All that remains to be done is to configure the post-installation settings.
What's my experience with pricing, setup cost, and licensing?
Licensing is the worst part of the product. This is because IBM uses Processor Value Units (PVUs) to calculate the license. The customers complain about this.
In the latest version of the product, there are four types of licenses:
- DAM (Database Activity Monitoring)
- DAM Advanced
- FAM (File Activity Monitoring)
- FAM Advanced
If you only need database activity monitoring, then DAM is enough.
If you need blocking and masking features, you will need the DAM Advanced license.
Which other solutions did I evaluate?
I did not evaluate other options. I am an IBM partner.
What other advice do I have?
There are three main steps when implementing a Data Activity Monitor (DAM) solution.
- Discover and Classify: Find your databases in your environment, and decide which one of them has confidential data that you need to monitor. Classify your data in your database if it includes critical data like personal ID, credit card, or IMEI numbers.
- Monitor Activities: Monitor all end-user activities while developing your policy rules and critical activities.
- Block Critical Activities: Define and block critical activities to prevent data leakage.
Disclosure: My company has a business relationship with this vendor other than being a customer. I am an IBM partner.
Pre Sales Engineer at a tech services company with 501-1,000 employees
It provides visibility for the DB activity and secures the customer information in the DB from any misuse.
What is most valuable?
All the features are useful for the customer and they have many use cases, especially for DB protection.
They have a module called Redaction. For query rewriting, it can protect some data stored in the table by the DB admin to return the masked data, in case he tries to view our customer personal information such as phone numbers,names, account number etc.
In some cases it blocked the bad user from deleting or copying data , For example, in use cases to block creation of the users on the DB without filing forum/ following the company policy.
How has it helped my organization?
It provides the customer to help secure the DB, especially for the multi-DB environments. It also provides visibility for the DB activity, secures the customer information in the DB, from any privilege misuse by an insider.
What needs improvement?
The FAM module needs to be improved. This module is for file activity monitoring and here if IBM would focus on marketing this part, it will be good as the end-user can monitor any configuration file in servers and not only the DB.
For how long have I used the solution?
I have used this solution for around six years.
What do I think about the stability of the solution?
Some issues have been experienced but no big issues as such. The solution is 90% stable.
What do I think about the scalability of the solution?
We have not encountered any scalability issues.
How is customer service and technical support?
I would give the technical support a 9/10.
How was the initial setup?
The setup was very easy. It took us around one day to set it up and running.
What's my experience with pricing, setup cost, and licensing?
You should make sure of the DB size before you buy the product. It is also important to define the requirement very carefully as it could affect the sizing. You should make sure of the monitoring mode that they would like to apply.
Which other solutions did I evaluate?
We looked at the Oracle and Imperva solutions.
What other advice do I have?
Take care of the scope and the monitoring mode. Also, if the size of the DB is high then do not do it over virtual.
Disclosure: My company has a business relationship with this vendor other than being a customer. We're resellers.
Security Software Presales Specialist
Reporting is automated and activity alerts are routed to the appropriate responders.
What is most valuable?
Heterogeneous support for data activity monitoring. I have not been able to find any other product that can monitor as many platforms from one application. Guardium can monitor Windows servers, Linux, Unix, mainframe, and big data environments from one policy. Guardium captures data access activity across networks and local connections.
How has it helped my organization?
We now have one go-to application for all data monitoring. This has decreased the number of skills needed and enabled a faster route to compliance. Reporting is automated and activity alerts are routed to the appropriate responders.
What needs improvement?
While Guardium is great at structured monitoring (DAM), the product is lacking features on the file activity side (FAM). We would also like to see tighter integration with Active Directory and Exchange monitoring.
For how long have I used the solution?
I have been using Guardium for seven years.
What do I think about the stability of the solution?
We had some minor issues with earlier versions around agent compatibility. These were solved through support.
What do I think about the scalability of the solution?
Guardium scales easily. Simply add another collector appliance and the system will balance the load across all available appliances.
How are customer service and technical support?
IBM support has been responsive and we rarely need to escalate.
Which solution did I use previously and why did I switch?
Previously, we were using home grown scripts and native database tools. The issue with this approach is the need for expertise on every platform and ending up with dozens of tools to manage.
How was the initial setup?
Guardium is an enterprise class product and, with that, does require some training. I would suggest any enterprise looking to implement Guardium to purchase some amount of services. There is an option for Quickstarts. Once you understand how the agents work and have setup the first few, the rest are relatively simple. The real work is aligning your business goals with the Guardium policies you create. We often know we need to monitor a system but are not exactly sure what policy is needed. There has to be collaboration between IT, business owners, and compliance.
What's my experience with pricing, setup cost, and licensing?
Previously, Guardium fell under the IBM PVU license model. This was complicated to license and costly. The new license structure is per server and includes all features. Now we simply count the number of servers to monitor and purchase accordingly.
Which other solutions did I evaluate?
Besides native database auditing, which is very resource intensive, and homegrown tools, there are not a lot of options out there. The closest competitor is Imperva. Imperva is a close second. We chose Guardium over Imperva based on the ability for greater custom reporting, more platform support, and better integration with other IT tools.
What other advice do I have?
Buy services. You do not need to have services for the entire implementation, but, at a minimum, invest in the Quickstart option to get up and running and to provide knowledge transfer. Once Guardium is installed on a few systems, it is very easy to add and manage.
Disclosure: My company has a business relationship with this vendor other than being a customer. My company sells, implements, and manages this product.
Security Consultant at a energy/utilities company
Captures data requests from various sources and consolidates them for analysis.
What is most valuable?
It captures all data requests regardless of the source and consolidates them for analysis.
How has it helped my organization?
The ability to audit across multiple data environments led to a greater understanding of the data traffic and the potential weaknesses in the access controls. This eased the creation of audit trails for customers.
What needs improvement?
Reporting has always been a weakness, but it has improved across the versions. In early versions, the reporting always seemed like a late add-on, and the graphics were poor. This has improved over the years and the reporting is a lot better now, with greater filtering and display options.
For how long have I used the solution?
I have used this solution with various clients for ten years.
What do I think about the stability of the solution?
There were issues with stability of the agent software in previous versions, but it is less of an issue now.
What do I think about the scalability of the solution?
The only issues are when users have not maintained the collection policies or the archiving and aggregation policies correctly. Units can fill up if not maintained and managed.
How are customer service and technical support?
Over the years, it has changed many times, but the US support is very good.
Which solution did I use previously and why did I switch?
I have often replaced internal database auditing features with Guardium. The main reason for the switch was to segregate the auditing from the database administrators.
How was the initial setup?
It is very dependent on the environment in which it is being installed. It can be complex if users do not take the time to build their policies carefully.
What other advice do I have?
Take your time. Think about the elements you want to audit. Don't just audit everything. Understand the normal traffic, so you can focus on the abnormal traffic.
Disclosure: My company has a business relationship with this vendor other than being a customer. I am a freelance implementer for the product, so I am known to the company and they have used me in the past.
Technical Specialist/Consultant Ibm at a tech services company with 5,001-10,000 employees
Monitors database activity, and blocks firewalls and malicious connections.
What is most valuable?
The main features are database activity monitoring and firewall feature blocking.
How has it helped my organization?
I'm working as a consultant for security products. I'm not a user of this product. Guardium is helping customers to get insights into who is accessing company data, when they are doing it, and from which location.
Guardium can block malicious connections to the databases. For example, if someone is accessing sensitive data in a production database during non-working hours, Guardium can block this connection.
What needs improvement?
I would like to see a better GUI. IBM is working on GUI improvements with every new release.
For how long have I used the solution?
I have used this solution for five years.
What do I think about the stability of the solution?
I did not encounter any issues with stability.
What do I think about the scalability of the solution?
The system is scalable.
How is customer service and technical support?
Technical support is fast and responsive. The typical response time is less than two hours.
How was the initial setup?
The initial setup is relatively simple. It depends on how many collectors and aggregators are in the setup and the number of databases included in the monitoring solution.
After the initial setup, the level of complexity depends on the customer’s needs.
What other advice do I have?
Ask for a PoC project and then decide.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Advisory Consultant - Cyber Security Practice at a consultancy with 10,001+ employees
The Data Activity Monitor covers data warehouses and file shares. It helped control excessive administrator rights to databases.
What is most valuable?
It’s available as a hardware appliance as well as software. This provides flexibility as to how you want to deploy the tool.
It can automatically locate DBs, as well as discover and classify sensitive data.
Data Activity Monitor covers what appears to be every DB imaginable, even data warehouses and file shares.
It allows administrators to enforce trigger alerts built around predefined policies, so that any access to sensitive data can be tracked and blocked if necessary.
How has it helped my organization?
It helped control excessive administrator rights to databases and automated the compliance auditing process.
It located/discovered unknown databases and the sensitive data that existed in those databases.
What needs improvement?
There was a slight performance tax on the system and load balancing could be better. We would also like more robust reporting.
For how long have I used the solution?
I have used Guardium for six months.
What do I think about the stability of the solution?
Once it was installed and implemented, it seemed to be a very stable product.
What do I think about the scalability of the solution?
This is definitely a scalable product. You can build out a basic stand-alone architecture with one collector all the way to enterprise wide architecture that covers multiple datacenters and continents.
How are customer service and technical support?
I never interacted with tech support.
Which solution did I use previously and why did I switch?
No previous or different solution was used.
How was the initial setup?
If I remember correctly, the setup was a bit complex; not so much the installation, but a lot of tweaking and tuning of policies, setting up traffic filters, whitelisting the traffic, and so on.
What's my experience with pricing, setup cost, and licensing?
I was not privy to this information.
Which other solutions did I evaluate?
I wasn’t part of the evaluation for the tool.
What other advice do I have?
Try to have a dedicated team. There are a lot of moving parts and you need take a hands-on approach. It doesn’t come configured out of the box.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free IBM Security Guardium Data Protection Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Product Categories
Database SecurityPopular Comparisons
Imperva Data Security Fabric
Oracle Audit Vault
Protegrity’s Data Protection Platform
DataSunrise Database Security
Trustwave DbProtect
Oracle Database Vault
IDERA SQL Compliance Manager
Informatica Secure@Source
Buyer's Guide
Download our free IBM Security Guardium Data Protection Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- IBM Guardium vs Imperva SecureSphere Database Security
- IBM Guardium Data Protection vs. Vormetric Application Crypto Suite for a tech services company
- How does IBM Guardium Data Protection compare with Imperva SecureSphere Database Security?
- What are the differences between IBM Guardium and Imperva?
- When evaluating Database Security, what aspect do you think is the most important to look for?
- IBM Guardium vs Imperva SecureSphere Database Security
- What is the difference between "data protection in transit" vs "data protection at rest"?
- Audit Vault vs. InfoSphere Guardium?
- Database security tools comparison report?
- Why is Database Security important for companies?