IBM Security Guardium Data Encryption Reviews & Product Details

IBM Guardium for File and Database Encryption offers encryption solutions to enable organizations to secure their file and database data on-premises. The solution also facilitates separation of duties, to restrict administrators from freely accessing the sensitive data.

Features:
Conducts transparent encryption and decryption - Guardium performs encryption and decryption above the file system or logical volume layer so it is transparent to users.
Offers granular support for regulatory compliance - The solution enables granular and configurable auditing and reporting of access requests to secured data, policies and keys. Provides secure, centralized key and policy management - IBM Guardium also provides a secure solution for protecting structured and unstructured data by enforcing policy-based encryption and centralized encryption key management.

USP : IBM Guardium doesn't require any coding or modification to applications or databases and it secures both structured and unstructured data. The solution scales and adapts for large and complex environments. It also delivers extensible protection to log files, configuration files and other database output. It facilitates Live data transformation, which allows businesses to encrypt data without needing their applications to remain offline, speed the data protection process while also supporting business continuity and efficiency.

BUYERS
VENDORS
EXPERTS
3.9
ANALYSTS
 

IBM CORPORATION detailed analysis

Product Maturity
Company Maturity
Most IMPORTANT
0.0
0.0
0.0
Support and Services
1.60
1.60
1.60
Services
3.70
5.00
5.00
Focus on Product Innovation
2.85
3.95
3.45
Delivery
5.00
5.00
5.00
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

IBM CORPORATION has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    15 Participants

  • Niche Quadrant

    All-Asia-Pacific

    21 Participants

  • Niche Quadrant

    All-Europe

    24 Participants

STRENGTHS
  • Product Maturity / Services
    Professional Services
  • Product Maturity / Professional Services
    Consulting Service
  • Product Maturity / Professional Services
    Support and Maintenance
  • Product Maturity / Professional Services
    Training and education
  • Product Maturity / Channel for Delivery of Support Services
    On-Site Support
  • Product Maturity / Channel for Delivery of Support Services
    Remote Support
  • Product Maturity / Type of Algorithm
    AES
  • Product Maturity / Deployment Model
    IaaS
  • Product Maturity / Deployment Model
    SaaS
  • Product Maturity / End Users
    Large Enterprises
  • Product Maturity / Deployment Model
    Cloud
  • Product Maturity / Channel of Delivery
    Directly
  • Product Maturity / Deployment Model
    On-Premise
  • Product Maturity / Channel of Delivery
    Through Partners / Third-Party Vendors
  • Product Maturity / Solutions Offered
    Cloud Encryption
  • Product Maturity / Solutions Offered
    Database and Application Encryption
  • Product Maturity / Support and Services
    Data Encryption
  • Product Maturity / Solutions Offered
    Disk Encryption
  • Product Maturity / Solutions Offered
    File/Folder Encryption
  • Product Maturity / Support and Services
    Key Management
WEAKNESSES
  • Product Maturity / Services
    Managed Services
  • Product Maturity / Support and Services
    Customer Redressal Mechanism/Program
  • Product Maturity / Support and Services
    Level of Support
  • Product Maturity / Type of Algorithm
    Patented inhouse algorithm
  • Product Maturity / Deployment Model
    PaaS
  • Product Maturity / Solutions Offered
    Communication Encryption (Voice email, and message)
  • Product Maturity / Support and Services
    Data Loss Prevention
  • Product Maturity / Support and Services
    Tokenization
  • Product Maturity / Support and Services
    Others
  • Product Maturity / Applications Catered
    Application-level tokenization
  • Product Maturity / Applications Catered
    Data-in- process/use encryption
  • Product Maturity / Applications Catered
    Virtual machine instance encryption
  • Product Maturity / Type of Algorithm
    Others (RSA, Blowfish, DES)
  • Product Maturity / Applications Catered
    Application-level encryption
  • Product Maturity / Applications Catered
    Column-level encryption
  • Product Maturity / Applications Catered
    Data-at-rest encryption
  • Product Maturity / Applications Catered
    Data-in-motion encryption
  • Product Maturity / Applications Catered
    File level encryption
  • Product Maturity / End Users
    SMEs
See More

Have you EVER used IBM CORPORATION Products?

Share your experience with potential buyers.

TOP FEATURES
  • Services
    Professional Services
  • Channel for Delivery of Support Services
    Remote Support
  • Deployment Model
    On-Premise
  • Channel of Delivery / Through Partners
    Third-Party Vendors
  • Deployment Model
    SaaS
  • Solutions Offered
    Cloud Encryption
  • Support and Services
    Data Encryption
  • Applications Catered
    File level encryption
  • Deployment Model
    Cloud
  • Applications Catered
    Data-in-motion encryption

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

Questions & Answers

TOP REVIEWS

Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

...

Marie Stelle

Engagement Partner - 360Quadrants.com