Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

IBM Security Guardium Data Protection - Collector

IBM Security | 12.0

Linux/Unix, Other 12.0 - 64-bit Amazon Machine Image (AMI)

Reviews from AWS Marketplace

0 AWS reviews
  • 5 star
    0
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

47 reviews
from G2

External reviews are not included in the AWS star rating for the product.


    Gaurang S.

Safeguard your secured data with IBM security Gardium

  • July 18, 2023
  • Review provided by G2

What do you like best about the product?
IBM security guardium discover and classifes the sensitive data residing on-prem or on cloud , enabling an all inclusive view of your data security & compliance posture.

It helps to verify , define & emforce data rules sets & policies based on latest data user permissions .

Helps with long term security info from different security tools
What do you dislike about the product?
There is no dislike for this tool because it helps us to embrace a Next-Gen Data Security approach and address all data security concerns and challenges . So there is no disadvantage of this tool
What problems is the product solving and how is that benefiting you?
It works on major security pillars like
1. Discover & Classify sensitive data in our cloud environment as well as in our Database.
2. It access data risk with contextual insights & analytics.
3. Protect sensitive data from source using Encryption
4. Simplify compliance & it's reporting


    Sushant D.

Guardian for your data

  • August 16, 2022
  • Review provided by G2

What do you like best about the product?
Data security is a key aspect for any customer and their data. A top notch encryption and availability is what makes this product stand out.
What do you dislike about the product?
The user interactive and friendly nature of the product could be more interactive.
What problems is the product solving and how is that benefiting you?
Data security and integrity are the two main issues getting resolved.


    Telecommunications

Solved the security challenges: Discover, Protect, Analyze, Response and Comply

  • December 29, 2021
  • Review provided by G2

What do you like best about the product?
Complete solution for different type of data collection
What do you dislike about the product?
The lengthy deployment process, in case of Guardium insights. Required the client to have Red hat openshift
What problems is the product solving and how is that benefiting you?
Comprehensive data protection: Advance threat detection to identify suspicious user activity and real-time control to block or quarantine users.


    Halim D.

Why you want IBM Security Guardium?

  • July 16, 2021
  • Review provided by G2

What do you like best about the product?
Ibm Security Guardium data provides complete protection.
What do you dislike about the product?
Nothing, IBM Security Guardium provides complete control in your data with easy and secure way
What problems is the product solving and how is that benefiting you?
Ibm Security Guardium is used for finding any bugs and secure solutions.


    Information Technology and Services

Guardium Data Protection

  • January 12, 2021
  • Review verified by G2

What do you like best about the product?
Integration with different databases, Policies and Knowledge base
What do you dislike about the product?
Customer support should be better and Cloud Integration
What problems is the product solving and how is that benefiting you?
Product bugs and cloud integrations


    Axel L.

Doing the right thing in the right place

  • December 31, 2020
  • Review provided by G2

What do you like best about the product?
Guardiums ability to centrally manage all your database security needs outside your RDBMS. That way segregation of duties is a breeze.
What do you dislike about the product?
Sometimes IBM Security products can be a little prices and Guardium is not an exception ... but then, you get what you pay for.
What problems is the product solving and how is that benefiting you?
Monitoring and enforcing GDPS data protection rules


    Banking

Great tool for data protection

  • September 02, 2020
  • Review verified by G2

What do you like best about the product?
I've used Guardium Data Protection for Databases. It's a great tool that monitors data access and takes action against threats. I enjoyed the using navigation bar in UI v.10. Great advantage are predefined out-of-the box policies.
What do you dislike about the product?
We deployed IBM Guradium Data Protection for databases on AS400. The installation was not straight forward, but we manage to create custom-made reports on user data.
What problems is the product solving and how is that benefiting you?
Protecting critical data in customer database. It monitors who and when is making changes on critical data.
Recommendations to others considering the product:
Great tool for securing database


    Alexey S.

Successful implementations without any performance issues

  • August 03, 2020
  • Review verified by G2

What do you like best about the product?
Guardium Data Protection provides abilities for monitoring and protecting sensitive data without affecting performance of the business users.
What do you dislike about the product?
The Data Retention, Aggregation and long-term storage practice is complex to implement and requires much infrastructure.
What problems is the product solving and how is that benefiting you?
We use Guardium for providing auditing,security and compliance on database level.
Recommendations to others considering the product:
I recommend hiring skilled integrator with knowledge in Information Security, Databases and Regulation.


    Mohsin A.

Best data protection platform, I have deployed this solution to multiple banking and telecom sectors

  • July 31, 2020
  • Review verified by G2

What do you like best about the product?
Data protection , compliance monitoring , and vulnerability scanning capabilities in a single product.
What do you dislike about the product?
Query builder section is too difficult to understand.
What problems is the product solving and how is that benefiting you?
Achieved GDPR and PCI compliance, have great insight into databases.


    Muhammad Burhan F.

IBM Guardium, an Agile way to Monitor and Protect "Crown Jewels"

  • July 26, 2020
  • Review provided by G2

What do you like best about the product?
It comes in two flavors. One is DAM and other is FAM. DAM is Database Activity Monitoring while FAM is File Activity Monitoring. DAM is best suitable for structured data, while FAM is for unstructured data.
Its Vulnerability Assessment tool that gives the vulnerabilities against any compliance requirement. Real Time monitoring on who, when what basis of the added databases.
Real Time Blocking on the basis of unauthorized access made to the database.
Central management of all of your database security requirement. We can push the policies from an Aggregator/Central Manager across all the Collectors.
Easy to deploy.
Database addition under Guardium foot print is done by using a light weight agent installed on DB Server that has negligible performance impact.
No changes are required in Database while installing the agent.
Guardium comes with lots of built in rules and policies. We can have a leverage of using them and these policies and rules can cover most part of our Database Monitoring and Security requirements.
Guardium Licenses are perpetual only the support services needs to be renewed on yearly basis.
What do you dislike about the product?
Guardium Licensing is a bit tricky. We have to understand that the license is based on per server (IP Address) basis. Lets say if you have one server (a physical or virtual) and there are three databases running on this server, your Guardium license will be ONE (01) only. And if you have three distinct servers with separate IP(s) and these servers are hosting 10 databases in each, your Guardium License will be three.
An utmost care must be taken while selecting the agent to be installed on the server.
Ddeployment should be done once all the requirements are well understood by the client. If, initially, all the requirements couldn't be understood and the solution is deployed with some gaps, o can create problems in future. Secondly, the specifications of all the components should be allocated as per recommendations so as to avoid any performance hit.
It is a costly solution.
What problems is the product solving and how is that benefiting you?
Real time Database monitoring.
Real Time blocking of the unauthorized attempts on Databases. This is achieved by carefully crafting the access policies on databases.
We are now able to have a record of even a change made to a very granular level. We can see that changes have been done in a row, column or cell of a database table and who made these changed at what time. If these assesses and changes are not legitimate, than we can terminate the session of unauthorized user within no time.
This gave us a peace of mind now that an agile protection tool is in place to safeguard our "Crown Jewels".
Recommendations to others considering the product:
Highly recommended solution for your Data Protection. It can give you real time agile monitoring capability along with the blocking capability to databases when an unauthorized access is made.