User Reviews of CyberArk Privileged Access Manager & IBM Security Secret Server

Updated March 2024

Would you like to learn about products from people using them now? Simplify your research with trusted advice from people like you.

Download our FREE report comparing CyberArk Privileged Access Manager and IBM Security Secret Server based on reviews, features, and more!

Where should we email your report?






CyberArk Privileged Access Manager review

SatishIyer
SatishIyer
Assistant Vice President at a financial services firm with 10,001+ employees
Lets you ensure relevant, compliant access in good time and with an audit trail,...
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a...
IBM Security Secret Server review

reviewer1953252
Head of IT Security at a financial services firm with 5,001-10,000 employees
User-friendly, granular features, and is simple to implement, but the technical...
It requires customization, whereas out-of-the-box integrations do not. It takes a lot of coding and customization to integrate with so many different systems. It is not a networking device, it does not support the full proxy features for all PAM, or Privilege Access Management, access for any target systems. Other vendors have a full proxy...

Since 2012, we've had 765,386 professionals use our research.

As seen in