Listing Thumbnail

    IBM Security Guardium Data Protection - Aggregator or CM

     Info
    Deployed on AWS
    Safeguard critical, sensitive, or regulated data wherever it resides
    4.4

    Overview

    An Aggregator consolidates data from Collectors, while providing data retention and management capabilities through export, archive, and purge operations. Optionally, an Aggregator can also be designated as a Central Manager, allowing for top-down administration of all Guardium instances and a holistic view of stored data across the environment - all from a single location.

    Current Guardium customers can use their existing licenses.

    New to Guardium? View our interactive demo: https://www.ibm.com/security/resources/guardium-data-protection-demo 

    We recommend using IBM Security Guardium version 11.2 plus any new fix bundles from Fix Central. Older versions are made available for archival purposes and may contain bugs and/or security vulnerabilities. Security bulletins contain instructions for the security vulnerability addressed therein, and may require upgrading to a newer version. Fix bundles to update this version can be found on IBM Support Fix Central (https://www.ibm.com/support/fixcentral/ ). Link to IBM PSIRT Blog: https://www.ibm.com/blogs/psirt/ 

    Highlights

    • Discover sensitive data, harden the environment against vulnerabilities
    • Monitor user activity for data and files, providing real-time visibility and threat analytics
    • Protect sensitive data using real-time alerting, dynamic masking, blocking, and quarantining

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    OtherLinux 12.2

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    IBM Security Guardium Data Protection - Aggregator or CM

     Info
    Pricing and entitlements for this product are managed through an external billing relationship between you and the vendor. You activate the product by supplying a license purchased outside of AWS Marketplace, while AWS provides the infrastructure required to launch the product. AWS Subscriptions have no end date and may be canceled any time. However, the cancellation won't affect the status of the external license.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Vendor refund policy

    N/A

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Additional details

    Usage instructions

    1. Login to the CLI a. Use access key pair i. In Linux run ssh -i <PEM file> cli@<instance IP> ii. In Windows/Putty convert PEM file to .ppk See http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/putty.html  for more information

    Resources

    Vendor resources

    Support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    4.4
    97 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    33%
    56%
    9%
    2%
    0%
    0 AWS reviews
    |
    97 external reviews
    External reviews are from G2 .
    Andrew B.

    Comprehensive Data Protection with Easy Setup

    Reviewed on Jan 07, 2026
    Review provided by G2
    What do you like best about the product?
    I use IBM Guardium Data Protection to protect sensitive data from breaches and get notified of suspicious activity. It has made our data much more secure, giving us peace of mind and likely helping us save money while greatly reducing risk. I appreciate how it helps classify data easily, is proficient in controlling user access, and detects threats early. The automatic data classification saves time, and controlling user access is made easier and more efficient by allowing certain users different levels of access. I also liked that the initial setup was quick and easy.
    What do you dislike about the product?
    There wasn't anything I disliked.
    What problems is the product solving and how is that benefiting you?
    I use IBM Guardium Data Protection to secure sensitive data, which gives me peace of mind and reduces risk. It helps me classify data automatically to save time, control user access efficiently, and detect threats early, potentially saving money.
    Information Technology and Services

    Exceptional Real-Time Data Monitoring and Compliance Reporting

    Reviewed on Dec 11, 2025
    Review provided by G2
    What do you like best about the product?
    IBM Guardium is best known for real-time monitoring of sensitive data, strong compliance reporting, and broad integration across hybrid environments.
    What do you dislike about the product?
    IBM Guardium can feel complex to deploy and manage, requires significant tuning for large environments, and comes with a high licensing cost.
    What problems is the product solving and how is that benefiting you?
    IBM Guardium solves data security and compliance challenges by:

    Protecting sensitive data through real-time monitoring and policy enforcement, reducing insider threats and breaches.
    Ensuring regulatory compliance with automated audits and reporting, saving time and avoiding penalties.
    Providing visibility across hybrid environments, improving risk management and operational efficiency.
    Utilities

    Powerful Data Monitoring, But Complex to Configure

    Reviewed on Dec 08, 2025
    Review provided by G2
    What do you like best about the product?
    This tool offers continuous, in-depth monitoring and auditing of data access across on-premises, cloud, and big data environments. It leverages analytics, including machine learning and outlier detection, to immediately identify unusual behavior, SQL injection attempts, and possible data leaks.
    What do you dislike about the product?
    The interface and configuration are frequently considered complex, often demanding substantial training and expertise. Additionally, the high total cost of ownership, including considerable licensing and implementation fees, can make it less accessible to smaller businesses.
    What problems is the product solving and how is that benefiting you?
    This tool streamlines compliance with regulations such as GDPR, HIPAA, and PCI-DSS by automating the collection of evidence needed for audits, which significantly reduces manual work. It also enforces least-privilege access and protects sensitive data by using techniques like query rewriting, resulting in improved performance.
    Roxana S.

    Robust Security, Challenging Setup

    Reviewed on Dec 05, 2025
    Review provided by G2
    What do you like best about the product?
    I like IBM Guardium Data Protection, it's a great security platform for protecting my most sensitive information. I like the real-time visibility into sensitive data access, AI-driven threat detection, and the ability to monitor diverse environments from a single platform. It's valuable because it automates threat responses and improves operational efficiency, transforming reactive operations into a proactive and resilient strategy.
    What do you dislike about the product?
    The steep learning curve and complexity. It does have a high cost which doesn't help for small to mid-sized businesses.
    What problems is the product solving and how is that benefiting you?
    IBM Guardium Data Protection solves threat detection and improves data visibility. It automates threat responses and enhances operational efficiency, transforming reactive operations into a proactive strategy. I like the real-time visibility into data access and monitoring diverse environments.
    Financial Services

    Top-Notch Security and Ergonomics

    Reviewed on Dec 05, 2025
    Review provided by G2
    What do you like best about the product?
    Security and ergonomy
    Use experience plus prtection
    What do you dislike about the product?
    I have nothing to dislike about the ibm guardium product
    What problems is the product solving and how is that benefiting you?
    Data govrnance and data protect
    View all reviews