(1,161)
4.7 out of 5
Visit Website
Sponsored
Supported Databases | Supports different database platforms and data types. Typically integrates with a variety of existing databases. 14 reviewers of IBM Guardium Data Detection and Response have provided feedback on this feature. | 87% (Based on 14 reviews) | |
Data Management | Administrators can access and organize data related to incidents to produce reports or make data more navigable. 12 reviewers of IBM Guardium Data Detection and Response have provided feedback on this feature. | 90% (Based on 12 reviews) | |
Logging and Reporting | As reported in 12 IBM Guardium Data Detection and Response reviews. Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing. | 86% (Based on 12 reviews) | |
API / integrations | As reported in 12 IBM Guardium Data Detection and Response reviews. Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | 78% (Based on 12 reviews) | |
Auditing | Based on 13 IBM Guardium Data Detection and Response reviews. Documents access and alterations of the database for analytics and reporting. | 88% (Based on 13 reviews) | |
Data Discovery | Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems. This feature was mentioned in 13 IBM Guardium Data Detection and Response reviews. | 91% (Based on 13 reviews) | |
Access Control | Based on 12 IBM Guardium Data Detection and Response reviews. Supports LDAP Protocol to enable access control and governance. | 90% (Based on 12 reviews) |
Compliance | Based on 12 IBM Guardium Data Detection and Response reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | 86% (Based on 12 reviews) |
Database Activity Monitoring | Documents the actions related to the database. Alerts users of incidents and abnormal activities and documents the access point. 12 reviewers of IBM Guardium Data Detection and Response have provided feedback on this feature. | 83% (Based on 12 reviews) | |
Firewall | As reported in 12 IBM Guardium Data Detection and Response reviews. Protects database and sensitive information from a variety of attacks and malware threats. | 85% (Based on 12 reviews) | |
Data Masking | Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties. 12 reviewers of IBM Guardium Data Detection and Response have provided feedback on this feature. | 89% (Based on 12 reviews) | |
Audits | Based on 12 IBM Guardium Data Detection and Response reviews. Perform ad-hoc or ongoing IT audits at different levels of the company. | 89% (Based on 12 reviews) |
Data Masking | Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties. | Not enough data | |
Data Encryption/Security | Based on 12 IBM Guardium Data Detection and Response reviews. Manages policies for user data access and data encryption. | 94% (Based on 12 reviews) | |
Anomoly Detection | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. This feature was mentioned in 13 IBM Guardium Data Detection and Response reviews. | 91% (Based on 13 reviews) | |
Sensitive Data Compliance | As reported in 13 IBM Guardium Data Detection and Response reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | 90% (Based on 13 reviews) |
Cloud Gap Analytics | Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | Not enough data | |
Compliance Monitoring | Based on 13 IBM Guardium Data Detection and Response reviews. Monitors data quality and send alerts based on violations or misuse. | 90% (Based on 13 reviews) | |
User Analytics | As reported in 13 IBM Guardium Data Detection and Response reviews. Allows for reporting and documentation of individual user behavior and privileges. | 90% (Based on 13 reviews) |