Coming October 25: PeerSpot Awards will be announced! Learn more
2019-06-04T07:43:00Z
Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)
  • 0
  • 247

What is your primary use case for IBM Guardium Data Protection?

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

20
PeerSpot user
20 Answers
Farkhund Abbas - PeerSpot reviewer
Internet Security Specialist at National Bank of Pakistan
Real User
Top 20
2022-08-11T11:33:54Z
11 August 22

Before IBM Guardium Data Protection, we didn't have any solution. We wanted to check our database activities, for example, admin activities, so with IBM Guardium Data Protection, we created some use cases and also wanted to check up on the use cases in our environment, so we deployed the solution. Right now, we have three or four use cases for IBM Guardium Data Protection: creation, table deletion, and making changes to the table, and we receive alerts when any of those activities happen.

AF
CyberSecurity Leader Specialist at KLNCIT
Real User
Top 20
2022-06-16T12:13:00Z
16 June 22

We use Guardium for large and medium-sized clients in the banking sector for things like monitoring, protecting sensitive data, and logins.

CR
Head, Cybersecurity at a tech services company with 11-50 employees
Real User
Top 5Leaderboard
2022-05-08T05:51:30Z
08 May 22

I mainly use this solution to monitor the activity happening in the database.

AsifIqbal - PeerSpot reviewer
Chief Information Security Officer at MIB
Real User
Top 5Leaderboard
2022-05-06T10:32:49Z
06 May 22

We are using the data protection module to look after the PML queries of our Oracle admin accounts. I'm the chief information security officer at a financial institution.

DevidharsanJ - PeerSpot reviewer
Information Security Engineering Consultant at Optum
Consultant
Top 20
2022-04-11T18:30:00Z
11 April 22

We mostly use Guardium as a data activity monitoring solution (DAM). We also use it to perform vulnerability assessment (VA) for data. We deployed Guardium on a private cloud. It isn't a hardware product. It's all virtual machines.

Peter Arabomen - PeerSpot reviewer
Security Engineering, Team Lead at Fidelity Bank Plc
Real User
Top 5Leaderboard
2022-03-23T00:41:12Z
23 March 22

IBM Guardium Data Protection is used not just for protecting data, but also for vulnerability protection. We use it to monitor our active users, activity, and databases, to look at the kind of commands users do on the databases. We also use the solution to restrict unauthorized users from accessing the databases. Apart from restricting unauthorized users from accessing these databases, we also need to have the stability to add the database, then switch to another database. We can also turn on the blocking feature of IBM Guardium Data Protection to ensure that some IPs are unable to connect to some databases.

Learn what your peers think about IBM Security Guardium Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: September 2022.
633,572 professionals have used our research since 2012.
ND
Technical Manager at a computer software company with 51-200 employees
Real User
Top 5Leaderboard
2022-01-04T21:03:08Z
04 January 22

We use IBM Guardium Data Protection mostly for data masking and firewalling. We restrict the administrators and other users from altering or deleting anything from the databases.

VG
Security Engineer at a tech services company with 501-1,000 employees
Real User
Top 20
2021-12-15T17:35:00Z
15 December 21

My primary use of this solution is for database activity monitoring.

RM
Senior Analyst at a energy/utilities company with 10,001+ employees
Real User
Top 5Leaderboard
2021-12-03T13:53:00Z
03 December 21

Our primary use case for IBM Guardium Data Protection is audit logging. We monitor transactions and access particular tables in the database with it.

AK
CTO at a tech services company with 11-50 employees
Real User
Top 20
2021-11-10T11:02:00Z
10 November 21

The primary use case for most of our customers is for monitoring and compliance. It's mostly deployed on-premises and it's a database activity monitoring solution.

MS
Security Specialist at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
2021-10-02T07:20:45Z
02 October 21

We are using IBM Guardium Data Protection for activity monitoring, blocking users, entitlement for knowing the privilege for users, and Guardium data features.

mehrab hussain - PeerSpot reviewer
Junior Software Engineer at a computer software company with 201-500 employees
Real User
Top 5Leaderboard
2021-09-15T13:27:47Z
15 September 21

We are using this solution for a PoC. IBM Guardium Data Protection is used to create policies, and rules for database access management.

MW
DBA at a pharma/biotech company with 10,001+ employees
Real User
Top 5Leaderboard
2021-07-30T21:38:16Z
30 July 21

Our primary use case of this product is for privileged database activity monitoring. We are customers of IBM and I'm the DBA.

Md Saiful Hyder - PeerSpot reviewer
AGM, Enterprise Solutions at Omgea Exim Ltd
MSP
Top 5Leaderboard
2021-01-26T03:19:13Z
26 January 21

Currently, my customer has 10 different types of databases for their various banking applications and they intend to deploy IBM Guardium Data Protection to secure their database activities. As soon as it is deployed, we're able to get some insights into what is going on with their databases, to help ensure the integrity of their data in the future. Two banks are also working on two opportunities with IBM Guardium right now. I believe this is a compliance requirement; nowadays, everyone has to buy database protection. In that case, technically, Oracle will get the added advantage here, because most of the banks are already using Oracle database.

VD
Socio Director at RAMDIA
Real User
Top 20
2020-12-20T08:09:07Z
20 December 20

One of my customers is a company that manages telecommunications in Mexico. It is a very important company, and they use Guardium for compliance purposes. They use it to comply with PCI, for example. We have on-premises and cloud deployments. We are currently deploying a customer's environment in Microsoft Azure with SQL Server.

AsifIqbal - PeerSpot reviewer
Chief Information Security Officer at MIB
Real User
Top 5Leaderboard
2020-07-28T06:50:18Z
28 July 20

We primarily use the solution for general access management. We use it for compliance and validation. If there's any change in the cable part, this solution will notify us.

TA
Information Security Consultant at a tech services company with 51-200 employees
Reseller
2020-06-08T06:11:04Z
08 June 20

We are a solution provider and IBM Guardium is one of the database products that we implement for our clients. Our customers for Guardium are mostly banks and they use it for PCI compliance.

SK
VP - Enterprise Security & Cloud Business at a tech vendor with 1,001-5,000 employees
Real User
2020-06-03T06:54:50Z
03 June 20

We deal with a range of customers and lately the issue of data privacy and user identity has become very important and many companies are now seriously evaluating tools like Guardium. Companies want to know who is accessing database applications and what they are doing. This product is geared towards medium and large size enterprise companies. We're partners of IBM and I'm a company Vice President.

AV
Information Technology Consultant at a tech services company with 201-500 employees
Consultant
2020-05-10T08:06:04Z
10 May 20

The primary use case is for ensuring compliance with databases. It allows monitoring of what kind of statements and alterations are going on, as well as who is accessing what data.

MN
Trusted Security Advisor at a tech services company with 501-1,000 employees
Real User
2019-06-04T07:43:00Z
04 June 19

This solution is for database security and protecting the core of the data. It allows us to put in controls to make sure that only the right persons access the proper records in the database. It prevents unauthorized access. For example, a customer may want to restrict the database so that it is accessible only from within a specific application. This means that the database administrator will not be able to access the data from outside of the application, as is normally allowed by their administrative rights. It can prevent the administrator from seeing or modifying any data for which they are not allowed to do so. It is also possible to set specific permissions, such as restrictions on the field, table, or record level of the database. Only people with explicit permissions can view or modify the data.

Related Questions
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Nov 01, 2021
How does IBM Guardium Data Protection compare with Imperva SecureSphere Database Security? Which is the better product?
See 1 answer
01 November 21
IBM Security Guardium Data Protection is a solution for database security from IBM that gives complete visibility, control, and analysis to secure sensitive data and comply with regulations. IBM Security Guardium is ideal for enterprise-level companies. One of our clients, a bank, uses it for monitoring their database activity. IBM Guardium can track the database activity and detect vulnerabilities such as SQL injections. It is very stable and ideal for safeguarding sensitive client information and data. It prevents leaks and data loss. One of the advantages of IBM Guardium is that it monitors the database without changing the configuration. The policy setup process enables you to define security policies down to the last detail. Guardium makes it easier to comply with regulations because it has pre-defined policies according to GDPR. The support is very good, and the reporting is very straightforward. The interface is not very user-friendly if you are not used to IBM products, though. Once you get over the learning curve, it does get easier. We found that the SIEM integration is pretty poor. Imperva Data Security is also an enterprise application for data security, but unlike IBM Guardium, it combines a database with file security management. Imperva is very reliable and sends alerts whenever it detects suspicious activity. It records all database transactions for analysis. Imperva works very well to monitor new access to the database and provide alerts about unauthorized users. Regarding compliance, Imperva offers multiple options for auditing; the data is presented in an audit-friendly format and is extremely resilient, even in Linux. The user interface can be confusing, though, with so many menu options. Someone not familiar with the product will have a difficult time trying to configure the agents. Additionally, it requires fine-tuning to get actionable insights from the alerts. A big inconvenience is that some common encryption keys are not compatible with Imperva. Conclusions All in all, if your use case requires tight auditing processes, then Imperva is a better solution. IBM would be more suitable for enterprises using other IBM products.
it_user812028 - PeerSpot reviewer
Database Expert
Feb 12, 2018
Which solution is better for database security? IBM Guardium or Imperva SecureSphere Database Security? If we look at the technical aspects which one should we choose?
2 out of 8 answers
it_user724434 - PeerSpot reviewer
Systems Engineer at IBM
05 February 18
I work for IBM so my response is going to be biased. Of course, Guardium is far superior to Imperva. Both products do a great job at providing database activity monitoring. The difference is in the details. There are architectural and administrative qualities that I believe set Guardium apart.
Victor López Medina - PeerSpot reviewer
Implementation Engineer at a comms service provider with 51-200 employees
05 February 18
Hi, both solutions have good things, but in operational environments, Imperva works better, I think IBM works better in infrastructure or another stuff, Imperva is the specialist in DBF and data protection, all imperva engineers work for it, Imperva solutions was born as firewall solution, is its main functionality. I'd worked with both, and support as well, and If I can recomended one of them, the answer is imperva without doubts.