To keep track of client information, index security risks, and other information needed at a moments notice. IBM Guardium performs transparent encryption and decryption provides on the fly encryption without needing to be indoctrinated into lengthy training to use it.
Operator at a tech vendor with 10,001+ employees
Provides a unified key management system to help simplify encryption key management
Pros and Cons
- "Efficiency is key and IBM Guardium provides information in a heartbeat, but protects the data with military grade encryption."
- "Security policy enforcement of policy-based encryption and centralized encryption key management allows us to maintain data in a secure environment."
- "Provides a unified key management system to help simplify encryption key management."
- "I would like to see IBM Guardium have other encryption algorithms employed."
What is our primary use case?
How has it helped my organization?
Efficiency is key and IBM Guardium provides information in a heartbeat, but protects the data with military grade encryption. IBM Guardium is used for file and database security for protecting structured and unstructured data. Security policy enforcement of policy-based encryption and centralized encryption key management allows us to maintain data in a secure environment.
What is most valuable?
IBM Guardium provides a unified key management system to help simplify encryption key management. In a large organization, this is a critical feature and IBM went above and beyond while developing the software.
What needs improvement?
Personally, I would like to see IBM Guardium have other encryption algorithms employed, such as DES/3DES or TripleDES, Twofish, Blowfish, or IDEA. I especially would like to see Twofish used, since it is a block cipher designed by Counterpane Labs. It was one of the five Advanced Encryption Standard (AES) finalists and is unpatented and open source.
Buyer's Guide
IBM Security Guardium Data Protection
January 2026
Learn what your peers think about IBM Security Guardium Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,757 professionals have used our research since 2012.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
No, IBM Guardium is well designed and compatible with Windows-based computers.
What do I think about the scalability of the solution?
I have not had nor do I know of any such issues. I believe the design of IBM Guardium is perfect for small to large scale settings, and does not reduce accessibility to content with on the fly encryption.
Which solution did I use previously and why did I switch?
No, IBM Guardium was already in use.
What was our ROI?
Unknown, since I was not involved with the purchase.
What's my experience with pricing, setup cost, and licensing?
I would suggest to review the type of data, need for security, and if the organizational structure needs the options IBM Guardium provides.
Which other solutions did I evaluate?
No, there was no need to.
What other advice do I have?
Put simply, human error is often the downfall of computer security. When using IBM Guardium, or any encryption software for that matter, use common sense: Encrypt data when not in use, watch where you enter in passwords (not at Starbucks in view of security cameras that can be retrieved by an adversary, or the person next to you), and watch out not to inadvertently install spyware while clicking on a random link.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Solution Architect at a financial services firm with 10,001+ employees
Ability to define reports based on SQL query, especially when you have complex report criteria.
Pros and Cons
- "Ability to define reports based on SQL query, especially when you have complex report criteria."
- "Deployment process is very complicated as you need to now all advanced parameters. Almost not possible to figure out for yourself."
What is most valuable?
* Quick search
* Ability to define reports based on SQL query, especially when you have complex report criteria.
* Stream audit data to 2 collectors simultaneously.
* GIM passive install. You can connect GIM from Colletor or CM when GIM is running in listening mode.
How has it helped my organization?
Can't tell as I did POC only.
What needs improvement?
* First of all. GUI and user experience needs to be reworked from scratch. Product management console look like from 90's.
* Deployment process is very complicated as you need to now all advanced parameters. Almost not possible to figure out for yourself.
* Central Manager (CM) needs rework to. Some configuration params still needs to be done on collectors locally.
* Agent statistics is not available by default. You have to make a report and still you will not see all information like data interface activity.
* Dynamic datasets is rocket science. To make it work you have to build several additional procedure, which make it extremely fragile.
* Audit data is a single block. if you have several policies you can't purge data for specific policy.
* Collectors requires enormous amounts of resources comparing to other products available on the market.
For how long have I used the solution?
a month only to evaluate this product
What was my experience with deployment of the solution?
Yes, during the deployment you get nothing out of the box. You have to manually configure everything. Tune parameters for agent, collectors. Agent deployment is very complicated.
What do I think about the stability of the solution?
Yes, scaling the product might be a tricky task as you have to configure parameters locally or collectors or agents.
What do I think about the scalability of the solution?
Product looks easily scalable.
How are customer service and technical support?
Customer Service:
SMEs that were together with me during the POC were very technical and did understand their product.
Technical Support:n/a for POC
Which solution did I use previously and why did I switch?
Yes we use Imperva SecureSphere, and still use it as Guardium has failed POC. We were not able to replicate our current deployment and some major issues, Guardium had, prevented us from selecting this product.
How was the initial setup?
It was extremely complex. Without IBM support it would take years for you to setup infrastructure.
What about the implementation team?
Throught the vendor team. These guys were very technical and helped me to understand each steps during the POC
What was our ROI?
n/a
What's my experience with pricing, setup cost, and licensing?
We haven't talked much about pricing and licencing. But it is not cheap for sure
Which other solutions did I evaluate?
We haven't chosen this product.
What other advice do I have?
If you have complicated report requirements which involves very specific filtering and/or aggregation. And you have lots of resources in your virtual platform. Then give it a try.
Also I suggest you take a look at other top grade product like Imperva SecureShere. the reduction in resource requirements is 3 times less and it have plenty of nice features out of the box.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
IBM Security Guardium Data Protection
January 2026
Learn what your peers think about IBM Security Guardium Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,757 professionals have used our research since 2012.
Senior System Administrator IBM Certified Specialist Infosphere Guardium at a financial services firm with 1,001-5,000 employees
It can provide the logs for the activities performed by the privileged users across the all databases including MSSQL, DB2, Teradata, Oracle Sybase and many more.
What is most valuable?
Database activity monitoring (DAM)
How has it helped my organization?
It can provide the logs for the activities performed by the privileged users across the all databases (MSSQL, DB2, Teradata, Oracle Sybase and many more) which can avoid the internal frauds and keep data secured. It can also alert if any hackers tried to log-in to the databases from failed login alerts.
What needs improvement?
Some improvements were needed in version 9.6, those are covered in version 10 already. If we face any issues or bugs in the product IBM provides the patch on that.
For how long have I used the solution?
Since last 4 years I am working on this project and organisation using this sine seven years
What was my experience with deployment of the solution?
There are very less or minimal issues deployment those might be due to the human error , IBM documented the all steps in details for the deployment and they are available on internet.
What do I think about the stability of the solution?
Yes there was the issue on the high CPU utilisation by Guardium services ,on the database host but IBM has introduce the Guardium service monitoring service(watch dog process) which auto restart the Guardium services when CPU utilisation reach the defined threshold percentage.
What do I think about the scalability of the solution?
If you follow the recommended configuration as per the IBM and correct capacity sizing done there is no issues.
How are customer service and technical support?
Customer Service:
8 out of 10
Technical Support:8 out of 10
Which solution did I use previously and why did I switch?
NA
How was the initial setup?
Initial setup is very easy to perform . this has only 4 level architecture (Central Manager-->Aggregator-->Collector-->Guardium STAP agent)
What about the implementation team?
we are implementing In-house with help of documents
What's my experience with pricing, setup cost, and licensing?
Little high as compare to other products available in the market but the service provided by vendor is great and there are many additional functionalities as compare to other tools
Which other solutions did I evaluate?
NA
What other advice do I have?
vast product as there are many features of this product to full fill the customer requirements, and less expertise are the there worldwide.
Disclosure: My company has a business relationship with this vendor other than being a customer. I worked for the bank , this is very useful tool to secure the information .
Senior Middleware Engineer at a tech company with 501-1,000 employees
We used it to harden databases by defining policies for alerting and blocking access to prohibited and restricted data.
Pros and Cons
- "Database logging and audit functions are the most valuable features."
- "I would like to be able to upgrade appliances within major versions without needing to rebuild the appliance."
What is most valuable?
Database logging and audit functions are the most valuable features. In some fields like banking, it's very important to be aware of the actions of database users, and ensure that those without the permission to access information do not access it.
How has it helped my organization?
We succeeded at hardening our customer databases by defining policies for alerting and blocking access to prohibited and restricted data.
What needs improvement?
I would like to be able to upgrade appliances within major versions without needing to rebuild the appliance. Once, I tried to upgrade a Guardium Appliance from v9.5 to v10 and there was no available patch for that. Therefore, the solution was to back up the appliance data, rebuild the appliance with the v10 image and then restore the data. This procedure is highly risky, because you can lose all the data if the restoration does not succeed. Installing a patch is much easier and there is no data loss risk!
For how long have I used the solution?
I have used it for 2 years.
What do I think about the stability of the solution?
I have not encountered any stability issues.
What do I think about the scalability of the solution?
I have not encountered any scalability issues.
How are customer service and technical support?
Technical support is unsatisfactory. IBM Support failed to provide me with the v9-v10 upgrade patch as it is suggested on a upgrade roadmap technote.
Which solution did I use previously and why did I switch?
Back when I was a developer, I developed an audit trail module in Java/JEE. Obviously, it was not as sophisticated as Guardium.
How was the initial setup?
Initial setup was straightforward.
Which other solutions did I evaluate?
Before choosing this product, I did not evaluate other options. We implement exclusively IBM products.
What other advice do I have?
At first, IBM Guardium may seem complicated, but once you learn the basics, it becomes simple to use.
Disclosure: My company has a business relationship with this vendor other than being a customer. We're IBM business partners.
Senior IT Consultant, Pre-Sales Manager, Project Leader at a tech services company with 51-200 employees
Fulfills the international standard security requirements, such as PCI DSS.
What is most valuable?
- Database Activity Monitoring: Fulfills the international standard security requirements, such as PCI DSS
- It is very transparent on all of the query access controls of the monitored databases
How has it helped my organization?
According to my client, it fulfills the PCI DSS standard requirements that are implemented in his bank.
What needs improvement?
The graphics are so lame. I am sure that the latest version of Guardium, Version 10, would have improved it perfectly.
I see that they have improved the chart and diagram in the latest version of Guardium. However, there are some limitations on how the chart displays the data for analytic needs.
I am not sure if Guardium has the dashboard design to see the information much better.
For how long have I used the solution?
I have used it for three years.
What do I think about the stability of the solution?
We did encounter stability issues. Do not upgrade directly to the latest fix pack unless people have confirmed that it is stable.
What do I think about the scalability of the solution?
There were no scalability issues.
How is customer service and technical support?
Technical support is always available for you. I suggest the following:
- Call IBM and make a Severity 2 request instead of Severity 3 request.
- Ask them to provide remote access to your system right away.
- Prepare the log files that they usually request.
What's my experience with pricing, setup cost, and licensing?
They have changed the way of licensing. It is no longer according to your core. It is now based on how many servers you use. The price should be way less expensive.
Disclosure: My company has a business relationship with this vendor other than being a customer. Optus Solution is an IBM Business partner and I work for Optus. If you are looking for a company or a consultant, you may contact me via my email: lin.guangming2010@gmail.com.
Database Security Specialist at a tech services company with 51-200 employees
Provides database activity monitoring. Can discover databases on your network and find their vulnerabilities.
What is most valuable?
- Monitors database activities of end users who are connected to databases (DBAs and developers)
- Classifies critical objects on the databases
- Discovers databases on your network
- Finds vulnerabilities of your databases
- Blocks critical activities
How has it helped my organization?
- Helps us define and monitor critical data in the environment, even when stored in RDBMS, big data, or unstructured files.
- Helps us to pass compliance audits, such as like HIPAA, SOX, and PCI.
What needs improvement?
The blocking and dynamic data masking features need improvement.
For how long have I used the solution?
I am working as an IBM partner. We have provided solutions for nearly 50 customers for five years. Most of our customers are banks and telecoms.
What do I think about the stability of the solution?
IBM Security Guardium is a mature product. Although it needs agents on the server to monitor their database or file traffic, we did not encounter serious issues so far.
How are customer service and technical support?
IBM has three layers for Guardium support. In critical cases, technical support analyzes the issues very quickly to find a solution.
Which solution did I use previously and why did I switch?
I did not use another solution before this one.
How was the initial setup?
The setup is straightforward. There is an ISO file that is developed by IBM that contains all of the OS and Guardium application files. All that remains to be done is to configure the post-installation settings.
What's my experience with pricing, setup cost, and licensing?
Licensing is the worst part of the product. This is because IBM uses Processor Value Units (PVUs) to calculate the license. The customers complain about this.
In the latest version of the product, there are four types of licenses:
- DAM (Database Activity Monitoring)
- DAM Advanced
- FAM (File Activity Monitoring)
- FAM Advanced
If you only need database activity monitoring, then DAM is enough.
If you need blocking and masking features, you will need the DAM Advanced license.
Which other solutions did I evaluate?
I did not evaluate other options. I am an IBM partner.
What other advice do I have?
There are three main steps when implementing a Data Activity Monitor (DAM) solution.
- Discover and Classify: Find your databases in your environment, and decide which one of them has confidential data that you need to monitor. Classify your data in your database if it includes critical data like personal ID, credit card, or IMEI numbers.
- Monitor Activities: Monitor all end-user activities while developing your policy rules and critical activities.
- Block Critical Activities: Define and block critical activities to prevent data leakage.
Disclosure: My company has a business relationship with this vendor other than being a customer. I am an IBM partner.
Pre Sales Engineer at a tech services company with 501-1,000 employees
It provides visibility for the DB activity and secures the customer information in the DB from any misuse.
What is most valuable?
All the features are useful for the customer and they have many use cases, especially for DB protection.
They have a module called Redaction. For query rewriting, it can protect some data stored in the table by the DB admin to return the masked data, in case he tries to view our customer personal information such as phone numbers,names, account number etc.
In some cases it blocked the bad user from deleting or copying data , For example, in use cases to block creation of the users on the DB without filing forum/ following the company policy.
How has it helped my organization?
It provides the customer to help secure the DB, especially for the multi-DB environments. It also provides visibility for the DB activity, secures the customer information in the DB, from any privilege misuse by an insider.
What needs improvement?
The FAM module needs to be improved. This module is for file activity monitoring and here if IBM would focus on marketing this part, it will be good as the end-user can monitor any configuration file in servers and not only the DB.
For how long have I used the solution?
I have used this solution for around six years.
What do I think about the stability of the solution?
Some issues have been experienced but no big issues as such. The solution is 90% stable.
What do I think about the scalability of the solution?
We have not encountered any scalability issues.
How is customer service and technical support?
I would give the technical support a 9/10.
How was the initial setup?
The setup was very easy. It took us around one day to set it up and running.
What's my experience with pricing, setup cost, and licensing?
You should make sure of the DB size before you buy the product. It is also important to define the requirement very carefully as it could affect the sizing. You should make sure of the monitoring mode that they would like to apply.
Which other solutions did I evaluate?
We looked at the Oracle and Imperva solutions.
What other advice do I have?
Take care of the scope and the monitoring mode. Also, if the size of the DB is high then do not do it over virtual.
Disclosure: My company has a business relationship with this vendor other than being a customer. We're resellers.
Security Software Presales Specialist
Reporting is automated and activity alerts are routed to the appropriate responders.
What is most valuable?
Heterogeneous support for data activity monitoring. I have not been able to find any other product that can monitor as many platforms from one application. Guardium can monitor Windows servers, Linux, Unix, mainframe, and big data environments from one policy. Guardium captures data access activity across networks and local connections.
How has it helped my organization?
We now have one go-to application for all data monitoring. This has decreased the number of skills needed and enabled a faster route to compliance. Reporting is automated and activity alerts are routed to the appropriate responders.
What needs improvement?
While Guardium is great at structured monitoring (DAM), the product is lacking features on the file activity side (FAM). We would also like to see tighter integration with Active Directory and Exchange monitoring.
For how long have I used the solution?
I have been using Guardium for seven years.
What do I think about the stability of the solution?
We had some minor issues with earlier versions around agent compatibility. These were solved through support.
What do I think about the scalability of the solution?
Guardium scales easily. Simply add another collector appliance and the system will balance the load across all available appliances.
How are customer service and technical support?
IBM support has been responsive and we rarely need to escalate.
Which solution did I use previously and why did I switch?
Previously, we were using home grown scripts and native database tools. The issue with this approach is the need for expertise on every platform and ending up with dozens of tools to manage.
How was the initial setup?
Guardium is an enterprise class product and, with that, does require some training. I would suggest any enterprise looking to implement Guardium to purchase some amount of services. There is an option for Quickstarts. Once you understand how the agents work and have setup the first few, the rest are relatively simple. The real work is aligning your business goals with the Guardium policies you create. We often know we need to monitor a system but are not exactly sure what policy is needed. There has to be collaboration between IT, business owners, and compliance.
What's my experience with pricing, setup cost, and licensing?
Previously, Guardium fell under the IBM PVU license model. This was complicated to license and costly. The new license structure is per server and includes all features. Now we simply count the number of servers to monitor and purchase accordingly.
Which other solutions did I evaluate?
Besides native database auditing, which is very resource intensive, and homegrown tools, there are not a lot of options out there. The closest competitor is Imperva. Imperva is a close second. We chose Guardium over Imperva based on the ability for greater custom reporting, more platform support, and better integration with other IT tools.
What other advice do I have?
Buy services. You do not need to have services for the entire implementation, but, at a minimum, invest in the Quickstart option to get up and running and to provide knowledge transfer. Once Guardium is installed on a few systems, it is very easy to add and manage.
Disclosure: My company has a business relationship with this vendor other than being a customer. My company sells, implements, and manages this product.
Buyer's Guide
Download our free IBM Security Guardium Data Protection Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
Database SecurityPopular Comparisons
Imperva Data Security Fabric
Oracle Audit Vault
Protegrity’s Data Protection Platform
DataSunrise Database Security
Trustwave DbProtect
Oracle Database Vault
IDERA SQL Compliance Manager
IDERA SQL Secure
Buyer's Guide
Download our free IBM Security Guardium Data Protection Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- IBM Guardium vs Imperva SecureSphere Database Security
- IBM Guardium Data Protection vs. Vormetric Application Crypto Suite for a tech services company
- How does IBM Guardium Data Protection compare with Imperva SecureSphere Database Security?
- What are the differences between IBM Guardium and Imperva?
- When evaluating Database Security, what aspect do you think is the most important to look for?
- IBM Guardium vs Imperva SecureSphere Database Security
- What is the difference between "data protection in transit" vs "data protection at rest"?
- Audit Vault vs. InfoSphere Guardium?
- Database security tools comparison report?
- Why is Database Security important for companies?











csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402annexa.pdf
Most of the ciphers you ask for should not be used, or are not FIPS 140-2 compliant, can I ask why you want those grade C/D ciphers?
The reasons why they might not be provided are in the above NIST guideline.
Disclaimer: I do not work for IBM Security and therefore do not speak as a vendor or for IBM, for official responses please contact IBM support.