IBM Security Guardium Big Data Intelligence

IBM Security Guardium Big Data Intelligence offers the following features:
  • Big data lake built for data security- The solution is capable to aggregate, store, analyze, and offer reports for database, file system, and big data platform security and compliance, data and file activity monitoring, data loss prevention (DLP), and other sources
  • Automated trusted connection profiling- Allows users to understand who is accessing which databases, file systems, and other data sources — and what access methods and tools they are using — leveraging a fully automated approach to involve appropriate reviewers.
  • Direct, real-time access to data and risk insights- Offers authorized users (such as auditors, security analysts, and other users) with secure, direct access and self-service reporting capabilities to speed time to insights and to help Guardium administrators become less involved in data management and access issues, and more focused on data security, data protection and compliance progress.
  • User activity analytics- Using machine learning it is capable to control normal user behavior at the data-source level, and then persistently evaluate this behavior to identify anomalies and risks.
  • Data enrichment- Stores data security and compliance information in a dynamic big-data lake with cost-effective storage and enhanced with related data from other business processes and applications.

USP : IBM offers the IBM Security Guardium Big Data Intelligence to the big data security market. IBM Security Guardium Big Data Intelligence offering helps prevent unauthorized access to data and alerts users about the changes or the leak of data that are caused anonymously, which helps maintain the integrity of data. Further, it also automates the compliance control and protects data against any internal or an external threat. The IBM Security Guardium Big Data Intelligence is designed to address a full-range of security needs, from constantly monitoring and formulating real-time security policies, to ensuring protection of data across enterprises, without impacting the performance and source of data.

BUYERS
VENDORS
EXPERTS
3.7
ANALYSTS
 

IBM detailed analysis

Product Maturity
Company Maturity
Use Case Maturity
Most IMPORTANT
3.8
3.7
3.7
Breadth and Depth of Product Offerings
4.30
3.95
3.85
Product Features and Functionality
4.00
3.60
3.85
Focus on Product Innovation
2.55
3.40
3.30
Product Differentiation and Impact on Customer Value
5.00
5.00
5.00
Product Differentiation and Impact on Customer Value
3.50
3.00
2.85
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

IBM has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    20 Participants

  • Niche Quadrant

    All-Asia-Pacific

    23 Participants

  • Niche Quadrant

    All-Europe

    24 Participants

STRENGTHS
  • Product Maturity
    Breadth and Depth of Product Offerings
  • Product Maturity
    Product Differentiation and Impact on Customer Value
  • Product Maturity
    Product Features and Functionality
  • Product Maturity / Focus on Product Innovation
    R&D Spend
  • Product Maturity / Services Offered
    Consulting Services
  • Product Maturity / Services Offered
    Education and Training
  • Product Maturity / Services Offered
    Managed Security Services
  • Product Maturity / Services Offered
    Support and Maintenance
  • Product Maturity / Technology
    Intrusion Detection System/Intrusion Prevention System (IDS/IPS)
  • Product Maturity / Technology
    Product Variants
  • Product Maturity / Technology
    Security Information And Event Management (Siem)
  • Product Maturity / Technology
    Unified Threat Management (Utm)
  • Product Maturity / Software Offered
    Access Control
  • Product Maturity / Software Offered
    Backup and Recovery
  • Product Maturity / Software Offered
    Big Data Governance
  • Product Maturity / Software Offered
    Others (Big Data Customization and Discovery, and Audit and Reporting)
  • Product Maturity / Software Offered
    Security Intelligence
  • Product Maturity / Software Offered
    Technology
  • Product Maturity / Product Differentiation and Impact on Cus...
    Ability to Expand the Capability
  • Product Maturity
    Focus on Product Innovation
WEAKNESSES
  • Product Maturity / Product Enhancement Development
    Product Upgradation
  • Product Maturity / Technology
    Other Technology Offered
  • Product Maturity / Focus on Product Innovation
    No. of Innovations
  • Product Maturity / Product Enhancement Development
    New Product Launches
  • Product Maturity / Breadth and Depth of Product Offerings
    Product Variants
  • Product Maturity / Product Differentiation and Impact on Cus...
    Customer Feedback
  • Product Maturity / Product Features and Functionality
    Type of Channels
  • Product Maturity / Data Type
    Data in Motion
  • Product Maturity / Data Type
    Data in Rest
  • Product Maturity / Breadth and Depth of Product Offerings
    Solutions Offered
See More

Have you EVER used IBM Products?

Share your experience with potential buyers.

TOP FEATURES
  • Product Features and Functionality
    Data Type
  • Technology / Intrusion Detection System/Intrusion Prevention..
    IPS)
  • Software Offered
    Big Data Governance
  • Services Offered
    Support and Maintenance
  • Software Offered
    Others (Big Data Customization and Discovery..
  • Services Offered
    Managed Security Services
  • Software Offered
    Security Intelligence
  • Software Offered
    Backup and Recovery
  • Technology
    Product Variants
  • Services Offered
    Education and Training

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

IBM Presence in Big Data Security Solutions

Questions & Answers

TOP REVIEWS

Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

...

Marie Stelle

Engagement Partner - 360Quadrants.com