2019-12-31T09:39:00Z

What is your primary use case for IBM Guardium Vulnerability Assessment?

Julia Miller - PeerSpot reviewer
  • 0
  • 3
PeerSpot user
3

3 Answers

KB
Real User
Top 10Leaderboard
2022-08-24T21:06:59Z
Aug 24, 2022

We are a full security base integration and application business. We help with implementation and deployments. I used Guardium to help with a cloud migration to check and do some validation for a client's data landscape and services so that they made sure that they were all secure in overall posture and all the way throughout their data security life cycle. I helped with automating some of their other services, which provided another way of providing a more fundamental catalog discovery type of scenario. I also helped with using some activity monitoring for their on-premises and cloud data sources.

Search for a product comparison
OA
Reseller
2020-03-16T06:56:13Z
Mar 16, 2020

We are a solution provider and this is one of the systems that I deploy for our customers. It is used to test systems for security vulnerabilities.

GK
Real User
2019-12-31T09:39:00Z
Dec 31, 2019

We are service providers, we don't use it internally. Where it is mostly being used is for enterprise clients, because they need to comply with all of the requirements, they need increased security and visibility. It's popular with enterprise clients who are more mature in their security implementations.

Find out what your peers are saying about IBM, Tenable, Invicti and others in Vulnerability Management. Updated: March 2024.
765,234 professionals have used our research since 2012.
Vulnerability Management
What is vulnerability management? Vulnerability management is the meticulous, exhaustive, systematic process implemented to discover any potential threats or vulnerabilities, stop those threats, and repair those vulnerabilities before any serious problems develop with your important operating systems. Vulnerability management also involves fixes and patches to repair those threats and vulnerabilities. It is generally accomplished in combination with additional risk assessment and...
Download Vulnerability Management ReportRead more