We do not use IBM Guardium Vulnerability Assessment for data encryption or any other tool for analytics, or identity and governance. We do not use any other solution except for protection and monitoring. IBM Guardium Vulnerability Assessment is more popular than other solutions such as Imperva or Audit Vault. Most companies in the world use IBM Guardium Vulnerability Assessment because of its powerful capabilities, features, and flexibility. The installation of the Vulnerability Assessment feature is not challenging. When you take the license and input that license key in Guardium, it gets enabled. You just need to configure the data source to a database and enter the name of that data source while configuring the Vulnerability Assessment feature, and once you make the configuration, you can easily execute these Vulnerability Assessment features to scan any database. On a scale of 1-5, I rate this solution a 5 out of 5.
CTA\Owner at a tech services company with 11-50 employees
Real User
2022-08-24T21:06:59Z
Aug 24, 2022
I wouldn't use it. That would be my advice to others looking into implementing IBM Guardium Vulnerability Assessment. I would rate it a five out of ten.
When trying to implement this product, it is better to have a dedicated IT resource to run with. Most organizations just re-assign the monitoring activities to other members of their team who are doing other things. They need dedicated resources for this tool. This is a good solid product. I would recommend this product. I would rate this solution an eight out of ten.
Vulnerability Management is a cybersecurity process focused on identifying, evaluating, treating, and reporting security vulnerabilities in systems and software.
A thorough understanding of its components and tools is essential for protecting organizational assets. Modern solutions often offer automated scanning, comprehensive risk assessments, and integration with other security operations. Users highlight ease of use and effective remediation capabilities in leading products.
What...
We do not use IBM Guardium Vulnerability Assessment for data encryption or any other tool for analytics, or identity and governance. We do not use any other solution except for protection and monitoring. IBM Guardium Vulnerability Assessment is more popular than other solutions such as Imperva or Audit Vault. Most companies in the world use IBM Guardium Vulnerability Assessment because of its powerful capabilities, features, and flexibility. The installation of the Vulnerability Assessment feature is not challenging. When you take the license and input that license key in Guardium, it gets enabled. You just need to configure the data source to a database and enter the name of that data source while configuring the Vulnerability Assessment feature, and once you make the configuration, you can easily execute these Vulnerability Assessment features to scan any database. On a scale of 1-5, I rate this solution a 5 out of 5.
I wouldn't use it. That would be my advice to others looking into implementing IBM Guardium Vulnerability Assessment. I would rate it a five out of ten.
I would rate this solution a nine out of ten.
When trying to implement this product, it is better to have a dedicated IT resource to run with. Most organizations just re-assign the monitoring activities to other members of their team who are doing other things. They need dedicated resources for this tool. This is a good solid product. I would recommend this product. I would rate this solution an eight out of ten.