Coming October 25: PeerSpot Awards will be announced! Learn more
Buyer's Guide
Enterprise Password Managers
September 2022
Get our free report covering Microsoft, CyberArk, HashiCorp, and other competitors of BeyondTrust Password Safe. Updated: September 2022.
634,775 professionals have used our research since 2012.

Read reviews of BeyondTrust Password Safe alternatives and competitors

Head of IT Security at a financial services firm with 5,001-10,000 employees
Real User
Top 20
User-friendly, granular features, and is simple to implement, but the technical support could be improved
Pros and Cons
  • "One of the most valuable features is scalability, and how it allows you to scale it without affecting the underlying core components."
  • "It would be preferable if the full proxy was included in the IBM Security Secret Server."

What is our primary use case?

I am an end-user. I primarily worked in two roles. I was the integrator; I installed the product and then went to the customer side to work with the product.

IBM Security Secret Server is used for the entire IT department administrators, all of whom connect via the solution, the IBM Secret Server, in order to access the servers or the target systems, whether they are Windows servers, Linux servers, databases, the core banking system, and so on.

What is most valuable?

It is one of the most well-known names in this field.

It's very easy to deploy, very simple to implement, and very user-friendly.

It has some granular features for the user roles section. 

Pricing has distinct pricing criteria that count the number of users rather than the number of target systems. It doesn't matter if you have two users or five users connecting to 1000 different target systems; it will only count five licenses, not a thousand licenses, as many other technologies or vendors do, which is what make it outstanding in the market.

What needs improvement?

It requires customization, whereas out-of-the-box integrations do not. It takes a lot of coding and customization to integrate with so many different systems.

It is not a networking device, it does not support the full proxy features for all PAM, or Privilege Access Management, access for any target systems. 

Other vendors have a full proxy feature, so we can't access the target system unless we go through the PAM server on the network. Because the IBM Security Secret Server lacks that feature, it will be proxified by the application rather than the network layer.

It would be preferable if the full proxy was included in the IBM Security Secret Server.

It's also not a hard-end appliance like BeyondTrust or One Identity.

Now, rather than just the application, you must obtain the hardware, install the operating system, and manage the operating system. The application is then installed. 

Other vendors, as I have mentioned, such as BeyondTrust and One Identity, simply retrace the entire package, a hardened appliance. You do not have access to the operating system, you do not bear the burden of maintaining the operating system, you do not maintain the operating system's license, you do not install the SQL Server, and you do not install the web server. You don't do anything. You install and configure the entire package.

For how long have I used the solution?

I have been working with IBM Security Secret Server for a year and a half.

If I am not mistaken, it was version seven.

What do I think about the stability of the solution?

It is currently stable. But, once again, if something goes wrong with the underlying operating system, such as a missing update, or if something goes wrong with the web server or the SQL Server, it will affect the product.

What do I think about the scalability of the solution?

One of the most valuable features is scalability, and how it allows you to scale it without affecting the underlying core components.

We have 30 users in our organization. We have a license for 30 administrators.

How are customer service and support?

Unfortunately, the technical support is not very responsive because we purchased it from IBM; however, the actual support comes from Thycotic.

If you buy it from IBM, you are missing out on a lot. If you purchase it from Thycotic, you will receive full support, and access to the entire documentation library, knowledge base, and everything.

I would rate the technical support a four out of ten.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I've previously used Micro Focus Privilege Account Manager. But I haven't worked with it in over a year.

I also work with Thycotic.

Thycotic Secret Server is the same as IBM's product. IBM Secret Server plus IBM's product, it's an OEM that IBM purchased from Thycotic, it's the same product. The same item. You can purchase it from either Thycotic or IBM.

How was the initial setup?

To some extent, it is straightforward, if you are doing a PoC, or you are doing a demo, it will be as smooth and as simple as clicking next, next, next.

However, if it is a large deployment, it will be complicated because the server components must be deployed on multiple servers.

If I had to rate a large deployment on a scale of one to ten, with one being the easiest, it could be one if you want it to be as simple as possible without requiring full redundant deployment. It will, however, be ten if you want to get the most out of it.

The service and issues that may arise outside of this solution make it difficult to maintain this solution.

I would rate the technical support a four out of ten.

What was our ROI?

Yes, there was a return on investment. It is not expensive.

What's my experience with pricing, setup cost, and licensing?

It's been three years. I believe that we paid 35,000 or 40,000 US dollars for it.

That is for the standard license. The standard license covers many aspects.

What other advice do I have?

I would recommend it to others, but the most important thing I would recommend is that the vendor provide professional service.

And this is something that applies to all PAM solutions. Purchasing PAM is simple, but it is extremely difficult to implement it in an efficient manner in order to get the most value out of it, which is why you should seek professional assistance from the vendor.

I would rate IBM Security Secret Server a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
Vladimir Jirasek - PeerSpot reviewer
CEO at Foresight Cyber Ltd
Reseller
Top 5Leaderboard
An easy-to-setup solution with strong security features
Pros and Cons
  • "The solution's most valuable features are its password management security and cloud firewall."
  • "The service could be improved incrementally to enhance programmatic access to the vault."

What is our primary use case?

My company resells the solution and operates similarly to SF Quality to provide consulting and managed service. Clients can access the solution through its operating system that is hosted on the Amazon cloud or via any web browser. 

What is most valuable?

The solution's most valuable features are its password management security and cloud firewall. 

Our company and our customers value security. The business subscription model includes additional security features such as two-factor authentications with strong physical tokens. There are additional role-based access settings in the vault which can be linked to Okta or Azure ID for automated provisioning. 

In addition, the cloud's firewall allows customers to stipulate which countries are permitted to log in.

What needs improvement?

The service could be improved incrementally to enhance programmatic access to the vault. I've been using the solution for a long time and have made suggestions over the years that are typically implemented. 

For how long have I used the solution?

I have been using the solution for 12 years. 

What do I think about the stability of the solution?

The solution is stable and very fast. 

What do I think about the scalability of the solution?

The solution is scalable. 

How are customer service and support?

Technical support is really good. 

How was the initial setup?

The setup is straightforward and takes ten minutes. We complete setup together with our clients on Microsoft Teams or Zoom. Certain configurations need to be set correctly to improve security. We provide training that addresses securing master passwords and then give our clients the keys to the kingdom. 

What's my experience with pricing, setup cost, and licensing?

The solution's pricing model includes team, business, and enterprise. We always suggest the business subscription because it includes additional security features. 

What other advice do I have?

I rate this solution a ten out of ten. 

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: My company has a business relationship with this vendor other than being a customer: reseller
Flag as inappropriate
Manager at a consultancy with 10,001+ employees
Real User
Top 5
Quick, and simple to install, but the scalability has limitations
Pros and Cons
  • "The privileged access management, which is the Safe Access Model is the most valuable feature."
  • "Improvements are needed in session management, behavioral analytics, and the reporting segment."

What is our primary use case?

We provide Thycotic Secret Server as well as use it.

Thycotic Secret Server is used for data security.

What is most valuable?

The privileged access management, which is the Safe Access Model, is the most valuable feature.

What needs improvement?

Some of the features need improvement.

Improvements are needed in session management, behavioral analytics, and the reporting segment.

For how long have I used the solution?

I have been working with Thycotic Secret Server for three or four years.

What do I think about the stability of the solution?

For the most part, Thycotic Secret Server is stable.

What do I think about the scalability of the solution?

Thycotic Secret Server is relatively scalable. Scalability is good, but it does have its limitations. It's scalable to an extent.

How are customer service and support?

Availability of technical support has always been a concern.

Which solution did I use previously and why did I switch?

I have used several products, such as Beyond Trust, and CyberArk.

How was the initial setup?

The initial setup is straightforward.

I can't give you an estimate, as it has been a while since we had an installation, but it was straightforward.

It takes half a day to install.

We have a team of three people to maintain this solution.

What's my experience with pricing, setup cost, and licensing?

Most customers opt for a yearly license. I don't believe that I have seen anyone pays on a monthly basis.

What other advice do I have?

I would recommend this solution if it aligned with their use cases.

I would rate Thycotic Secret Server a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Flag as inappropriate
Buyer's Guide
Enterprise Password Managers
September 2022
Get our free report covering Microsoft, CyberArk, HashiCorp, and other competitors of BeyondTrust Password Safe. Updated: September 2022.
634,775 professionals have used our research since 2012.