Introducing G2.ai, the future of software buying.Try now
Tresorit
Sponsored
Tresorit
Visit Website
Product Avatar Image
IBM Guardium Data Encryption

By IBM

4.0 out of 5 stars

How would you rate your experience with IBM Guardium Data Encryption?

Tresorit
Sponsored
Tresorit
Visit Website
It's been two months since this profile received a new review
Leave a Review

IBM Guardium Data Encryption Reviews & Product Details

Profile Status

This profile is currently managed by IBM Guardium Data Encryption but has limited features.

Are you part of the IBM Guardium Data Encryption team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

IBM Guardium Data Encryption Media

IBM Guardium Data Encryption Demo - GDE Dashboard
Summary view of the current state.
IBM Guardium Data Encryption Demo - GDE Hosts
View of connected hosts.
IBM Guardium Data Encryption Demo - Edit Encryption Key Policy
Alter key policy and customize rules.
IBM Guardium Data Encryption Demo - Logs
In-depth view of logs.
IBM Guardium Data Encryption Demo - DAM Outlier Mining
Control outlier mining.
Product Avatar Image

Have you used IBM Guardium Data Encryption before?

Answer a few questions to help the IBM Guardium Data Encryption community

IBM Guardium Data Encryption Reviews (4)

Reviews

IBM Guardium Data Encryption Reviews (4)

4.0
4 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Chiquita B.
CB
Dental Assistant
Mid-Market (51-1000 emp.)
"Very productive and efficient. "
What do you like best about IBM Guardium Data Encryption?

This product has made it a lot easier to protect user information that has been sent or received. Review collected by and hosted on G2.com.

What do you dislike about IBM Guardium Data Encryption?

There have been a few instances where the program has caused a computer to freeze or run slower. Review collected by and hosted on G2.com.

Verified User in Internet
UI
Mid-Market (51-1000 emp.)
"IBM Security guardian data review "
What do you like best about IBM Guardium Data Encryption?

Helps securing private data and integrity of data. Mostly used it for relational databases and file systems and various types of data Review collected by and hosted on G2.com.

What do you dislike about IBM Guardium Data Encryption?

Setting up is a complex and tiersome process. It could be made more streamlined. Review collected by and hosted on G2.com.

Verified User in Security and Investigations
US
Mid-Market (51-1000 emp.)
"Tried and True"
What do you like best about IBM Guardium Data Encryption?

This system is set up to ensure confidence amongst users so I am more than satisfied with it. Review collected by and hosted on G2.com.

What do you dislike about IBM Guardium Data Encryption?

I have had no problems as of yet and am hoping not to develop any. Review collected by and hosted on G2.com.

Verified User in Building Materials
UB
Mid-Market (51-1000 emp.)
"IBM Summary"
What do you like best about IBM Guardium Data Encryption?

What offers protection to databases Review collected by and hosted on G2.com.

What do you dislike about IBM Guardium Data Encryption?

That despite offering protection to databases, it cannot be protected one hundred percent. Review collected by and hosted on G2.com.

There are not enough reviews of IBM Guardium Data Encryption for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Egnyte Logo
Egnyte
4.4
(1,108)
Egnyte delivers the only modern content platform that is purpose-built for businesses. Egnyte gives IT centralized control and protection over their files, and users fast access to their content, no matter how or where work happens.
2
Virtru Email Encryption Logo
Virtru Email Encryption
4.4
(391)
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
3
Salesforce Platform Logo
Salesforce Platform
4.5
(3,793)
Platform as a Service (PaaS) eliminates the expense and complexity of evaluating, buying, configuring, and managing all the hardware and software needed for custom-built applications.
4
Keeper Password Manager Logo
Keeper Password Manager
4.6
(1,178)
Securely store, share and manage your passwords, logins, credit card numbers, bank accounts and private information in your encrypted digital vault.
5
Progress MOVEit Logo
Progress MOVEit
4.4
(515)
Exchanging files over the Internet shouldn’t be complicated. That’s why more than 40 million users from around the world rely on MOVEit – The Managed File Transfer Software from Progress to simplify and secure the file transfer tasks, save time, and improve communications.
6
Signal Logo
Signal
4.4
(450)
Making private communication simple.
7
BlackBerry UEM Logo
BlackBerry UEM
3.8
(376)
BlackBerry UEM is a suite of solutions that all rely on the same foundation of security to secure the digital workplace. It keeps employees productive on any device, anywhere, while allowing your security team to manage diverse devices, ensure data security, support remote work, and reduce operational costs. Gain comprehensive control, enhance security, and streamline your IT operations.
8
WatchGuard Network Security Logo
WatchGuard Network Security
4.7
(262)
WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle.
9
Tresorit Logo
Tresorit
4.5
(243)
Tresorit provides an end-to-end encrypted productivity solution for ultra-secure collaboration including managing, storing, syncing, and transferring files.
10
Kaspersky Endpoint Security for Business Logo
Kaspersky Endpoint Security for Business
4.3
(190)
Kaspersky Endpoint Security for Business offers a tightly integrated combination of superior security technologies and far-reaching systems management capabilities, which can all be controlled via a single management console.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
IBM Guardium Data Encryption
View Alternatives