Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Database Security Specialist at a tech services company with 51-200 employees
Consultant
Provides database activity monitoring. Can discover databases on your network and find their vulnerabilities.

What is most valuable?

  • Monitors database activities of end users who are connected to databases (DBAs and developers)
  • Classifies critical objects on the databases
  • Discovers databases on your network
  • Finds vulnerabilities of your databases
  • Blocks critical activities

How has it helped my organization?

  • Helps us define and monitor critical data in the environment, even when stored in RDBMS, big data, or unstructured files.
  • Helps us to pass compliance audits, such as like HIPAA, SOX, and PCI.

What needs improvement?

The blocking and dynamic data masking features need improvement.

For how long have I used the solution?

I am working as an IBM partner. We have provided solutions for nearly 50 customers for five years. Most of our customers are banks and telecoms.

Buyer's Guide
IBM Security Guardium Data Protection
June 2025
Learn what your peers think about IBM Security Guardium Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.

What do I think about the stability of the solution?

IBM Security Guardium is a mature product. Although it needs agents on the server to monitor their database or file traffic, we did not encounter serious issues so far.

How are customer service and support?

IBM has three layers for Guardium support. In critical cases, technical support analyzes the issues very quickly to find a solution.

Which solution did I use previously and why did I switch?

I did not use another solution before this one.

How was the initial setup?

The setup is straightforward. There is an ISO file that is developed by IBM that contains all of the OS and Guardium application files. All that remains to be done is to configure the post-installation settings.

What's my experience with pricing, setup cost, and licensing?

Licensing is the worst part of the product. This is because IBM uses Processor Value Units (PVUs) to calculate the license. The customers complain about this.

In the latest version of the product, there are four types of licenses:

  • DAM (Database Activity Monitoring)
  • DAM Advanced
  • FAM (File Activity Monitoring)
  • FAM Advanced

If you only need database activity monitoring, then DAM is enough.

If you need blocking and masking features, you will need the DAM Advanced license.

Which other solutions did I evaluate?

I did not evaluate other options. I am an IBM partner.

What other advice do I have?

There are three main steps when implementing a Data Activity Monitor (DAM) solution.

  1. Discover and Classify: Find your databases in your environment, and decide which one of them has confidential data that you need to monitor. Classify your data in your database if it includes critical data like personal ID, credit card, or IMEI numbers.
  2. Monitor Activities: Monitor all end-user activities while developing your policy rules and critical activities.
  3. Block Critical Activities: Define and block critical activities to prevent data leakage.
Disclosure: My company has a business relationship with this vendor other than being a customer. I am an IBM partner.
PeerSpot user
PeerSpot user
Pre Sales Engineer at a tech services company with 501-1,000 employees
Real User
It provides visibility for the DB activity and secures the customer information in the DB from any misuse.

What is most valuable?

All the features are useful for the customer and they have many use cases, especially for DB protection.

They have a module called Redaction. For query rewriting, it can protect some data stored in the table by the DB admin to return the masked data, in case he tries to view our customer personal information such as phone numbers,names, account number etc.

In some cases it blocked the bad user from deleting or copying data , For example, in use cases to block creation of the users on the DB without filing forum/ following the company policy.

How has it helped my organization?

It provides the customer to help secure the DB, especially for the multi-DB environments. It also provides visibility for the DB activity, secures the customer information in the DB, from any privilege misuse by an insider.

What needs improvement?

The FAM module needs to be improved. This module is for file activity monitoring and here if IBM would focus on marketing this part, it will be good as the end-user can monitor any configuration file in servers and not only the DB.

For how long have I used the solution?

I have used this solution for around six years.

What do I think about the stability of the solution?

Some issues have been experienced but no big issues as such. The solution is 90% stable.

What do I think about the scalability of the solution?

We have not encountered any scalability issues.

How is customer service and technical support?

I would give the technical support a 9/10.

How was the initial setup?

The setup was very easy. It took us around one day to set it up and running.

What's my experience with pricing, setup cost, and licensing?

You should make sure of the DB size before you buy the product. It is also important to define the requirement very carefully as it could affect the sizing. You should make sure of the monitoring mode that they would like to apply.

Which other solutions did I evaluate?

We looked at the Oracle and Imperva solutions.

What other advice do I have?

Take care of the scope and the monitoring mode. Also, if the size of the DB is high then do not do it over virtual.

Disclosure: My company has a business relationship with this vendor other than being a customer. We're resellers.
PeerSpot user
Buyer's Guide
IBM Security Guardium Data Protection
June 2025
Learn what your peers think about IBM Security Guardium Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
it_user588594 - PeerSpot reviewer
Security Software Presales Specialist
Vendor
Reporting is automated and activity alerts are routed to the appropriate responders.

What is most valuable?

Heterogeneous support for data activity monitoring. I have not been able to find any other product that can monitor as many platforms from one application. Guardium can monitor Windows servers, Linux, Unix, mainframe, and big data environments from one policy. Guardium captures data access activity across networks and local connections.

How has it helped my organization?

We now have one go-to application for all data monitoring. This has decreased the number of skills needed and enabled a faster route to compliance. Reporting is automated and activity alerts are routed to the appropriate responders.

What needs improvement?

While Guardium is great at structured monitoring (DAM), the product is lacking features on the file activity side (FAM). We would also like to see tighter integration with Active Directory and Exchange monitoring.

For how long have I used the solution?

I have been using Guardium for seven years.

What do I think about the stability of the solution?

We had some minor issues with earlier versions around agent compatibility. These were solved through support.

What do I think about the scalability of the solution?

Guardium scales easily. Simply add another collector appliance and the system will balance the load across all available appliances.

How are customer service and technical support?

IBM support has been responsive and we rarely need to escalate.

Which solution did I use previously and why did I switch?

Previously, we were using home grown scripts and native database tools. The issue with this approach is the need for expertise on every platform and ending up with dozens of tools to manage.

How was the initial setup?

Guardium is an enterprise class product and, with that, does require some training. I would suggest any enterprise looking to implement Guardium to purchase some amount of services. There is an option for Quickstarts. Once you understand how the agents work and have setup the first few, the rest are relatively simple. The real work is aligning your business goals with the Guardium policies you create. We often know we need to monitor a system but are not exactly sure what policy is needed. There has to be collaboration between IT, business owners, and compliance.

What's my experience with pricing, setup cost, and licensing?

Previously, Guardium fell under the IBM PVU license model. This was complicated to license and costly. The new license structure is per server and includes all features. Now we simply count the number of servers to monitor and purchase accordingly.

Which other solutions did I evaluate?

Besides native database auditing, which is very resource intensive, and homegrown tools, there are not a lot of options out there. The closest competitor is Imperva. Imperva is a close second. We chose Guardium over Imperva based on the ability for greater custom reporting, more platform support, and better integration with other IT tools.

What other advice do I have?

Buy services. You do not need to have services for the entire implementation, but, at a minimum, invest in the Quickstart option to get up and running and to provide knowledge transfer. Once Guardium is installed on a few systems, it is very easy to add and manage.

Disclosure: My company has a business relationship with this vendor other than being a customer. My company sells, implements, and manages this product.
PeerSpot user
it_user589479 - PeerSpot reviewer
Security Consultant at a energy/utilities company
Consultant
Captures data requests from various sources and consolidates them for analysis.

What is most valuable?

It captures all data requests regardless of the source and consolidates them for analysis.

How has it helped my organization?

The ability to audit across multiple data environments led to a greater understanding of the data traffic and the potential weaknesses in the access controls. This eased the creation of audit trails for customers.

What needs improvement?

Reporting has always been a weakness, but it has improved across the versions. In early versions, the reporting always seemed like a late add-on, and the graphics were poor. This has improved over the years and the reporting is a lot better now, with greater filtering and display options.

For how long have I used the solution?

I have used this solution with various clients for ten years.

What do I think about the stability of the solution?

There were issues with stability of the agent software in previous versions, but it is less of an issue now.

What do I think about the scalability of the solution?

The only issues are when users have not maintained the collection policies or the archiving and aggregation policies correctly. Units can fill up if not maintained and managed.

How are customer service and technical support?

Over the years, it has changed many times, but the US support is very good.

Which solution did I use previously and why did I switch?

I have often replaced internal database auditing features with Guardium. The main reason for the switch was to segregate the auditing from the database administrators.

How was the initial setup?

It is very dependent on the environment in which it is being installed. It can be complex if users do not take the time to build their policies carefully.

What other advice do I have?

Take your time. Think about the elements you want to audit. Don't just audit everything. Understand the normal traffic, so you can focus on the abnormal traffic.

Disclosure: My company has a business relationship with this vendor other than being a customer. I am a freelance implementer for the product, so I am known to the company and they have used me in the past.
PeerSpot user
it_user593442 - PeerSpot reviewer
Technical Specialist/Consultant Ibm at a tech services company with 5,001-10,000 employees
Consultant
Monitors database activity, and blocks firewalls and malicious connections.

What is most valuable?

The main features are database activity monitoring and firewall feature blocking.

How has it helped my organization?

I'm working as a consultant for security products. I'm not a user of this product. Guardium is helping customers to get insights into who is accessing company data, when they are doing it, and from which location.

Guardium can block malicious connections to the databases. For example, if someone is accessing sensitive data in a production database during non-working hours, Guardium can block this connection.

What needs improvement?

I would like to see a better GUI. IBM is working on GUI improvements with every new release.

For how long have I used the solution?

I have used this solution for five years.

What do I think about the stability of the solution?

I did not encounter any issues with stability.

What do I think about the scalability of the solution?

The system is scalable.

How is customer service and technical support?

Technical support is fast and responsive. The typical response time is less than two hours.

How was the initial setup?

The initial setup is relatively simple. It depends on how many collectors and aggregators are in the setup and the number of databases included in the monitoring solution.

After the initial setup, the level of complexity depends on the customer’s needs.

What other advice do I have?

Ask for a PoC project and then decide.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user551505 - PeerSpot reviewer
Senior Advisory Consultant - Cyber Security Practice at a consultancy with 10,001+ employees
Real User
The Data Activity Monitor covers data warehouses and file shares. It helped control excessive administrator rights to databases.

What is most valuable?

It’s available as a hardware appliance as well as software. This provides flexibility as to how you want to deploy the tool.

It can automatically locate DBs, as well as discover and classify sensitive data.

Data Activity Monitor covers what appears to be every DB imaginable, even data warehouses and file shares.

It allows administrators to enforce trigger alerts built around predefined policies, so that any access to sensitive data can be tracked and blocked if necessary.

How has it helped my organization?

It helped control excessive administrator rights to databases and automated the compliance auditing process.

It located/discovered unknown databases and the sensitive data that existed in those databases.

What needs improvement?

There was a slight performance tax on the system and load balancing could be better. We would also like more robust reporting.

For how long have I used the solution?

I have used Guardium for six months.

What do I think about the stability of the solution?

Once it was installed and implemented, it seemed to be a very stable product.

What do I think about the scalability of the solution?

This is definitely a scalable product. You can build out a basic stand-alone architecture with one collector all the way to enterprise wide architecture that covers multiple datacenters and continents.

How are customer service and technical support?

I never interacted with tech support.

Which solution did I use previously and why did I switch?

No previous or different solution was used.

How was the initial setup?

If I remember correctly, the setup was a bit complex; not so much the installation, but a lot of tweaking and tuning of policies, setting up traffic filters, whitelisting the traffic, and so on.

What's my experience with pricing, setup cost, and licensing?

I was not privy to this information.

Which other solutions did I evaluate?

I wasn’t part of the evaluation for the tool.

What other advice do I have?

Try to have a dedicated team. There are a lot of moving parts and you need take a hands-on approach. It doesn’t come configured out of the box.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user549432 - PeerSpot reviewer
Senior IT Consultant at a government with 1,001-5,000 employees
Vendor
It can capture database queries and use policies to feed SIEM tools for deeper correlation and for analysis. It gives us a tamper-proof audit of logged data.

What is most valuable?

The Data Activity Monitor is the most valuable feature of this product.

It has the capability to capture database queries and is using policies to feed SIEM tools for deeper correlation and for analysis of cyber security concerns on monitored databases.

How has it helped my organization?

It provides our organization with an integrated and tamper-proof audit of logged data to ensure that the database activities are checked and operating according to the industrial best practices.

What needs improvement?

The maintenance and support aspects of the product need improvement.

Probably, it should be more related to the product patching method. Even though the support service was great, the resolution doesn't comes quick enough to address the client's issue. We understand those resolutions only exist in the next patch version after quality testing. However, till that release comes out, we have to suffer in silence with the bug issues.

For how long have I used the solution?

I have used this solution for around two and half years.

What do I think about the stability of the solution?

We have encountered issues with stability.

What do I think about the scalability of the solution?

We have encountered issues with scalability.

How are customer service and technical support?

I would give the technical support a 7/10 rating.

Which solution did I use previously and why did I switch?

We were not using any other product prior to this one.

How was the initial setup?

The setup was not straightforward. There was some level of complexity in setting it up.

What's my experience with pricing, setup cost, and licensing?

Ensure what you want to protect, since it is charged as per the database instances.

Which other solutions did I evaluate?

We evaluated a couple of other options.

I would not like to discuss this much as it affects the other companies' image and integrity. The competitive products have their own good and bad.

What other advice do I have?

You need to know what you want to protect very well.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
BI Consultant /Data Security at a tech services company with 51-200 employees
Consultant
You can divide roles, creating safe access zones; manage credentials; and access rules.

What is most valuable?

  • Detailed and customizable reports with real-time alerts for the full vision of database/files activity.
  • Versatile rules for access control in real-time including blocking, masking, etc.: These rules are really helpful to fulfill enterprise security specifications. With them, you could divide roles, creating safe access zones; manage credentials; and access rules. The rules are easy to develop and customize.

What needs improvement?

  • UI: Version 10 of Guardium was introduced with a new UI that was completely redesigned. Some fast-access functions and options are not easy to find in the new UI.
  • Real-time masking is a bit simple and doesn't allow you to create complex masking rules.

For how long have I used the solution?

I have about one year of hands-on experience.

What do I think about the stability of the solution?

I have not encountered any stability issues.

What do I think about the scalability of the solution?

I have not encountered any scalability issues.

How are customer service and technical support?

Technical support is 9/10. I participated in communication with tech support only once.

Which solution did I use previously and why did I switch?

I did not previously use a different solution.

How was the initial setup?

Initial setup is straightforward. All the commands are simple to understand. The installation guide is simple and comprehensive.

Which other solutions did I evaluate?

Before choosing this product, I evaluated Imperva products.

What other advice do I have?

This product could by easily used with other security products; for example, SIEM products such as IBM QRadar and ArcSight.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free IBM Security Guardium Data Protection Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Product Categories
Database Security
Buyer's Guide
Download our free IBM Security Guardium Data Protection Report and get advice and tips from experienced pros sharing their opinions.