Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

IBM Security Guardium Analyzer

5.0
(2)

Efficiently find GDPR-relevant data, understand data and database exposures, and act to address issues and minimize risk.

Work for IBM Security Guardium Analyzer?

Learning about IBM Security Guardium Analyzer?

We can help you find the solution that fits you best.

IBM Security Guardium Analyzer Reviews

Ask IBM Security Guardium Analyzer a Question
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • For Category
  • Industry
Ratings
Company Size
User Role
For Category
Industry
Showing 2 IBM Security Guardium Analyzer reviews
LinkedIn Connections
IBM Security Guardium Analyzer review by frauzelimar p.
frauzelimar p.
Validated Reviewer
Review Source
content

"Back up your applications more securely with IBM Security "

What do you like best?

Good programs have good solutions IBM comes out this new tool which aims to improve the security of your applications and even mobile phones, this tool allows you to detect security vulnerabilities that may present, something that seems important because with so much hacker that exists, the important documentation of the company can be safe and supported.

What do you dislike?

This application explains to you step by step, the way in which you must make the scan of the applications that you are going to reapaldar, already with that you can suddenly capture methods that you did not know to have an armored security as for your possibilities, I think that this application has nothing negative.

Recommendations to others considering the product

My recommendation is that you do the free trial and you will be convinced of the wonders of this tool.

What business problems are you solving with the product? What benefits have you realized?

I just uploaded a test application to the cloud to scan it and I diagnose it based on the security it has and how it can help me keep it safer, I'm testing, although I find this application very complete because it allows you to have more security of classified information even on your cell phone, very happy with this application really amazing.

Sign in to G2 to see what your connections have to say about IBM Security Guardium Analyzer
IBM Security Guardium Analyzer review by Administrator in Financial Services
Administrator in Financial Services
Validated Reviewer
Review Source
content
Business partner of the vendor or vendor's competitor, not included in G2 scores.

"Find the sensitive data and scan vulnerability"

What do you like best?

Compare with IBM Guardium Vulnerability Assessment, Database Activity Monitoring and Guardium Data Protection, Guardium Analyer provides the almost the same functions of Discovery, Classification and Vulnerability Assessment on databases. It is easy to implement as SaSS. Customers do not need to install the product by themselves, just a few steps for the configuration. It supports most of the widely used database, no matter cloud-based and on-prem databases. It is a substitute option for those companies who do not want to hire extra employees to manage this tool.

What do you dislike?

Unlike IBM Guardium Vulnerability Assessment, Database Activity Monitoring or Guardium Data Protection, you may need to pay extra license to enable the function to export/import Classification Policy. Also, as a Software as Service, users may have less control of this tool and if you have any problem, you may need to contact IBM for supporting instead of troubleshooting by yourself.

What business problems are you solving with the product? What benefits have you realized?

As the EU has announced the new data security regulation GDPR, most of the companies don't know what to do in order to be complianced with GDPR. Guardium Analyzer can help the client to first find where the sensitiive data and which databases need to take more attention. Also, it is very important for companied to find out where are the vulnerabilites in their databases and better control security risks.

What Data-Centric Security solution do you use?

Thanks for letting us know!

There are not enough reviews of IBM Security Guardium Analyzer for G2 to provide buying insight. Below are some alternatives with more reviews:

1
StealthAUDIT Management Platform Logo
StealthAUDIT Management Platform
4.4
(24)
StealthAUDIT Management Platform (SMP) is an IT infrastructure management framework designed to facilitate data collection, analysis, remediation, and reporting.
2
IBM Security Guardium Logo
IBM Security Guardium
4.0
(15)
IBM Security® Guardium® helps ensure the security, privacy and integrity of your critical data across a full range of environments, from databases to big data, cloud, file systems and more.
3
Azure Information Protection Logo
Azure Information Protection
4.5
(4)
Control and help secure email, documents, and sensitive data that you share outside your company. From easy classification to embedded labels and permissions, enhance data protection at all times with Azure Information Protection—no matter where it’s stored or who it's shared with.
4
Datadvantage Logo
Datadvantage
4.5
(2)
DatAdvantage uses machine learning and bi-directional cluster analysis to pinpoint users that have access to files they don’t need to do their job. It’s your single interface for managing permissions and security groups.
5
ManageEngine DataSecurity Plus Logo
ManageEngine DataSecurity Plus
3.0
(1)
ManageEngine DataSecurity Plus continuously monitors Windows file servers and reports on every change or access attempt made to a file or folder stored on those servers.
6
StealthINTERCEPT Logo
StealthINTERCEPT
4.0
(1)
See threats, both malicious and accidental, as they happen. Get alerts in real time or use blocking to ensure threats don’t become disasters.
7
IBM Data Risk Manager Logo
IBM Data Risk Manager
4.0
(2)
IBM Data Risk Manager provides executives and their teams a business-consumable data risk control center that helps to uncover, analyze, and visualize data-related business risks so they can take action to protect their business.
8
Symantec Information Centric Tagging Logo
Symantec Information Centric Tagging
4.0
(2)
Empower users to determine what data is truly sensitive and protect it.
9
StealthRECOVER Logo
StealthRECOVER
(0)
StealthRECOVER enables point-in-time rollback and recovery of AD objects, attributes, Active Directory Integrated DNS, and more, allowing organizations to restore all or just the information they need.
10
FileAudit Logo
FileAudit
(0)
Secure and report on all access to files, folders and file shares that reside on Windows Systems.
Show more
Kate from G2

Learning about IBM Security Guardium Analyzer?

I can help.
* We monitor all IBM Security Guardium Analyzer reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.