2019-06-04T07:43:00Z

What is your primary use case for IBM Guardium Data Protection?

Julia Miller - PeerSpot reviewer
  • 0
  • 431
PeerSpot user
22

22 Answers

VT
Real User
Top 10
2022-10-10T19:23:44Z
Oct 10, 2022

We use this product to protect our information. It provides the added feature of including some protective marking rules on the data. Security is the overall high-level objective for us using this solution. We are customers of IBM and I'm a tech lead.

Search for a product comparison
Alaeddin  Awwad - PeerSpot reviewer
Reseller
Top 10
2022-08-16T13:07:00Z
Aug 16, 2022

We are resellers of this solution and IBM partners. I'm a manager of security solutions.

Farkhund Abbas - PeerSpot reviewer
Real User
Top 10
2022-08-11T11:33:54Z
Aug 11, 2022

Before IBM Guardium Data Protection, we didn't have any solution. We wanted to check our database activities, for example, admin activities, so with IBM Guardium Data Protection, we created some use cases and also wanted to check up on the use cases in our environment, so we deployed the solution. Right now, we have three or four use cases for IBM Guardium Data Protection: creation, table deletion, and making changes to the table, and we receive alerts when any of those activities happen.

AF
Real User
Top 10
2022-06-16T12:13:00Z
Jun 16, 2022

We use Guardium for large and medium-sized clients in the banking sector for things like monitoring, protecting sensitive data, and logins.

CR
Real User
Top 5Leaderboard
2022-05-08T05:51:30Z
May 8, 2022

I mainly use this solution to monitor the activity happening in the database.

AsifIqbal - PeerSpot reviewer
Real User
Top 5Leaderboard
2022-05-06T10:32:49Z
May 6, 2022

We are using the data protection module to look after the PML queries of our Oracle admin accounts. I'm the chief information security officer at a financial institution.

Learn what your peers think about IBM Security Guardium Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,386 professionals have used our research since 2012.
DevidharsanJ - PeerSpot reviewer
Real User
Top 10
2022-04-11T18:30:00Z
Apr 11, 2022

We mostly use Guardium as a data activity monitoring solution (DAM). We also use it to perform vulnerability assessment (VA) for data. We deployed Guardium on a private cloud. It isn't a hardware product. It's all virtual machines.

Peter Arabomen - PeerSpot reviewer
Real User
2022-03-23T00:41:12Z
Mar 23, 2022

IBM Guardium Data Protection is used not just for protecting data, but also for vulnerability protection. We use it to monitor our active users, activity, and databases, to look at the kind of commands users do on the databases. We also use the solution to restrict unauthorized users from accessing the databases. Apart from restricting unauthorized users from accessing these databases, we also need to have the stability to add the database, then switch to another database. We can also turn on the blocking feature of IBM Guardium Data Protection to ensure that some IPs are unable to connect to some databases.

ND
Real User
2022-01-04T21:03:08Z
Jan 4, 2022

We use IBM Guardium Data Protection mostly for data masking and firewalling. We restrict the administrators and other users from altering or deleting anything from the databases.

VG
Real User
2021-12-15T17:35:00Z
Dec 15, 2021

My primary use of this solution is for database activity monitoring.

RM
Real User
2021-12-03T13:53:00Z
Dec 3, 2021

Our primary use case for IBM Guardium Data Protection is audit logging. We monitor transactions and access particular tables in the database with it.

AK
Real User
2021-11-10T11:02:00Z
Nov 10, 2021

The primary use case for most of our customers is for monitoring and compliance. It's mostly deployed on-premises and it's a database activity monitoring solution.

MS
Real User
2021-10-02T07:20:45Z
Oct 2, 2021

We are using IBM Guardium Data Protection for activity monitoring, blocking users, entitlement for knowing the privilege for users, and Guardium data features.

MH
Real User
2021-09-15T13:27:47Z
Sep 15, 2021

We are using this solution for a PoC. IBM Guardium Data Protection is used to create policies, and rules for database access management.

MW
Real User
Top 20
2021-07-30T21:38:16Z
Jul 30, 2021

Our primary use case of this product is for privileged database activity monitoring. We are customers of IBM and I'm the DBA.

Md Saiful Hyder - PeerSpot reviewer
MSP
Top 20
2021-01-26T03:19:13Z
Jan 26, 2021

Currently, my customer has 10 different types of databases for their various banking applications and they intend to deploy IBM Guardium Data Protection to secure their database activities. As soon as it is deployed, we're able to get some insights into what is going on with their databases, to help ensure the integrity of their data in the future. Two banks are also working on two opportunities with IBM Guardium right now. I believe this is a compliance requirement; nowadays, everyone has to buy database protection. In that case, technically, Oracle will get the added advantage here, because most of the banks are already using Oracle database.

VD
Real User
2020-12-20T08:09:07Z
Dec 20, 2020

One of my customers is a company that manages telecommunications in Mexico. It is a very important company, and they use Guardium for compliance purposes. They use it to comply with PCI, for example. We have on-premises and cloud deployments. We are currently deploying a customer's environment in Microsoft Azure with SQL Server.

AsifIqbal - PeerSpot reviewer
Real User
Top 5Leaderboard
2020-07-28T06:50:18Z
Jul 28, 2020

We primarily use the solution for general access management. We use it for compliance and validation. If there's any change in the cable part, this solution will notify us.

TA
Reseller
2020-06-08T06:11:04Z
Jun 8, 2020

We are a solution provider and IBM Guardium is one of the database products that we implement for our clients. Our customers for Guardium are mostly banks and they use it for PCI compliance.

SK
Real User
2020-06-03T06:54:50Z
Jun 3, 2020

We deal with a range of customers and lately the issue of data privacy and user identity has become very important and many companies are now seriously evaluating tools like Guardium. Companies want to know who is accessing database applications and what they are doing. This product is geared towards medium and large size enterprise companies. We're partners of IBM and I'm a company Vice President.

AV
Real User
Top 20
2020-05-10T08:06:04Z
May 10, 2020

The primary use case is for ensuring compliance with databases. It allows monitoring of what kind of statements and alterations are going on, as well as who is accessing what data.

MN
Real User
2019-06-04T07:43:00Z
Jun 4, 2019

This solution is for database security and protecting the core of the data. It allows us to put in controls to make sure that only the right persons access the proper records in the database. It prevents unauthorized access. For example, a customer may want to restrict the database so that it is accessible only from within a specific application. This means that the database administrator will not be able to access the data from outside of the application, as is normally allowed by their administrative rights. It can prevent the administrator from seeing or modifying any data for which they are not allowed to do so. It is also possible to set specific permissions, such as restrictions on the field, table, or record level of the database. Only people with explicit permissions can view or modify the data.

IBM Security Guardium Data Protection automatically discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data. Deploy the solution to help discover regulated data in your data stores and use pre-built templates for regulations such as PCI, SOX, HIPAA, CCPA and many more, to streamline and automate compliance workflows.
Download IBM Security Guardium Data Protection ReportRead more