IBM Security Secret Server and ARCON Privileged Access Management compete in providing security solutions. IBM Secret Server is favored for its cost-effectiveness and support, while ARCON is noted for its extensive features, despite higher pricing.
Features: IBM Secret Server is praised for its integration capabilities that streamline operations, comprehensive reporting tools that enhance organizational efficiency, and the ability to customize security protocols to fit specific needs. ARCON offers advanced risk management features that improve oversight, extensive session monitoring for increased security, and high configurability for complex access scenarios.
Room for Improvement: IBM Secret Server could enhance its scalability to better support growing enterprises, improve alert systems for faster response times, and advance user interface design for easier navigation. ARCON users recommend improving documentation for better clarity, enhancing user training resources for smoother onboarding, and optimizing system performance for quicker access facilitation.
Ease of Deployment and Customer Service: IBM Secret Server offers straightforward deployment with flexible options suitable for various IT environments and is supported by responsive customer service. ARCON, while having a more complex deployment process, provides dedicated technical support, effectively addressing enterprise-level needs and ensuring steady system performance.
Pricing and ROI: IBM Secret Server's setup costs are seen as affordable, providing a satisfying ROI, aligning with small to medium enterprises' budgets. ARCON, with higher initial investment, offers significant ROI through reduced risk and enhanced security controls, appealing to larger enterprises focused on long-term value despite upfront expenses.
ARCON PAM is a full blown Privileged Access Management solution. It has a robust password vaulting technology that comes with AES- 256 Database encryption. Dual Factor Authentication, 4Eye Authentication functionalities and Granular Access Control enables an enterprise to block any unauthorized access attempt to critical information assets. All access is based on “Need to know” and “Need to do” basis. It has the largest connector stack. Its Single Sign On enables seamless access to a host of devices with just a single click.
The Solution enables an enterprise to monitor and analyze advanced threats in a real time. It has the best-in-class real-time threat analytics. It provides comprehensive audit trails and session recordings to ensure that all activities are tracked and these logs are encrypted and separately stored creating a legal hold.
Further, it has a highly scalable architecture that easily integrates with Third Party SIEM Solutions. It also supports cloud environment.
ARCON PAM is full-functionality solution at the most optimum pricing. More than 250 global enterprises spanning wide-ranging industries such as Banking, Financial Services and Insurance (BFSI), Government Organizations, Media, Health Care, and Fintech have deployed ARCON PAM as of today.
While the company continues to be a leader in India and the Middle East, it has gained a solid traction in Africa and APAC market thanks to its well-distributed global channel network and strong industry reputation it enjoys in the cyber security domain.
IBM Security Secret Server protects privileged accounts from hackers and insider threats, helps ensure compliance with evolving regulations, and allows authorized employees to seamlessly gain access to the tools and information they need to drive productivity. Easily detect, manage and audit privileged accounts, and control which applications are permitted to run on endpoints and servers to prevent malicious applications from penetrating the environment. IBM Security Secret Server is fast to deploy, easy to use and scalable for the enterprise.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.