BeyondTrust DevOps Secrets Safe vs IBM Security Secret Server comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between BeyondTrust DevOps Secrets Safe and IBM Security Secret Server based on real PeerSpot user reviews.

Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed BeyondTrust DevOps Secrets Safe vs. IBM Security Secret Server Report (Updated: March 2024).
771,157 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The local administrator can manage all the user's logins in one, simple, straight-away account access. Additionally, the solution is user-friendly.""A sophisticated and mature solution.""The most valuable features of BeyondTrust DevOps Secrets Safe are the ease of use and the API is very nice. Additionally, the interface is very good between AD and Unix.""DevOps Secrets Safe allows you to customize a lot of rules."

More BeyondTrust DevOps Secrets Safe Pros →

"The live recording is a very useful feature.""What I like best about IBM Security Secret Server is its single-access console. It's also easy to manage and fulfills the requirements with the least resistance.""Stability-wise, I think it is a very good solution.""As a PAM solution, Secret Server performs all the use cases in our environment.""One of the most valuable features is scalability, and how it allows you to scale it without affecting the underlying core components."

More IBM Security Secret Server Pros →

Cons
"The support for the solution is not very good, they could improve by being quicker.""The product contains some bugs.""You need to improvise many of the customized rules, which can lead to some errors. BeyondTrust should reduce the error rate.""We had some issues with the solution and once we contacted support they eventually solved the problem. They could improve their response time."

More BeyondTrust DevOps Secrets Safe Cons →

"Secret Server should have the ability to discover privileged accounts in the servers, like the administrator or users, from SQL and Oracle without having to import a script.""The newer interface is more difficult to use than the previous one, and consequently, new users might need more training.""The nonclustered index is working in an area with a problem that needs improvement.""It would be preferable if the full proxy was included in the IBM Security Secret Server.""What needs improvement in IBM Security Secret Server is support. The local partner provides good support, but IBM itself doesn't. Most of the time, the IBM support team does not aggressively resolve issues reported through chat or the IBM website."

More IBM Security Secret Server Cons →

Pricing and Cost Advice
  • "There is an annual license required to use BeyondTrust DevOps Secrets Safe."
  • More BeyondTrust DevOps Secrets Safe Pricing and Cost Advice →

  • "I believe that we paid 35,000 or 40,000 US dollars for it."
  • "My rating for the IBM Security Secret Server pricing is seven out of ten. It could be cheaper."
  • "The price could be better. I think it's a good price for the on-premises environment and the high availability for enterprises the solution provides."
  • More IBM Security Secret Server Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    771,157 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable features of BeyondTrust DevOps Secrets Safe are the ease of use and the API is very nice. Additionally, the interface is very good between AD and Unix.
    Top Answer:There are still some bugs in the solution but a lot less than there used to be. Unfortunately, CyberArk and BeyondTrust are in fierce competition. Many customers have already adopted CyberArk, but… more »
    Top Answer:My advice to those wanting to implement BeyondTrust DevOps Secrets Safe is for them to plan it very well before making a decision. If they are changing from another solution to BeyondTrust DevOps… more »
    Top Answer:Stability-wise, I think it is a very good solution.
    Top Answer:The nonclustered index is working in an area with a problem that needs improvement. In some cases, when they create some index in the tool, you may face some problems with the parallelism and some… more »
    Top Answer:I use the tool for dynamic services, integration services, and reporting services. I have years of working experience with the tool. I am a DBA and a support administrator for SQL Server, and also all… more »
    Ranking
    Views
    97
    Comparisons
    68
    Reviews
    1
    Average Words per Review
    524
    Rating
    8.0
    Views
    785
    Comparisons
    528
    Reviews
    4
    Average Words per Review
    686
    Rating
    8.0
    Comparisons
    Also Known As
    IBM Secret Server, Secret Server, IBM Security Privileged Identity Manager
    Learn More
    Overview

    DevOps Secrets Safe is a highly scalable solution that adapts to the speed and agility required in dynamic DevOps workflows. It will help organizations limit the risk associated with substantial unmanaged privileged credentials and secrets without causing friction in highly dynamic environments such as DevOps.

    IBM Security Secret Server protects privileged accounts from hackers and insider threats, helps ensure compliance with evolving regulations, and allows authorized employees to seamlessly gain access to the tools and information they need to drive productivity. Easily detect, manage and audit privileged accounts, and control which applications are permitted to run on endpoints and servers to prevent malicious applications from penetrating the environment. IBM Security Secret Server is fast to deploy, easy to use and scalable for the enterprise.

    Sample Customers
    Starbucks, Ebay, CSC, RBC, Williams-Sonoma, Carbonite
    Information Not Available
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm45%
    Computer Software Company10%
    Healthcare Company7%
    Engineering Company6%
    VISITORS READING REVIEWS
    Computer Software Company16%
    Financial Services Firm9%
    Healthcare Company7%
    Insurance Company7%
    Company Size
    VISITORS READING REVIEWS
    Small Business12%
    Midsize Enterprise15%
    Large Enterprise73%
    REVIEWERS
    Small Business57%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business24%
    Midsize Enterprise12%
    Large Enterprise64%
    Buyer's Guide
    BeyondTrust DevOps Secrets Safe vs. IBM Security Secret Server
    March 2024
    Find out what your peers are saying about BeyondTrust DevOps Secrets Safe vs. IBM Security Secret Server and other solutions. Updated: March 2024.
    771,157 professionals have used our research since 2012.

    BeyondTrust DevOps Secrets Safe is ranked 19th in Privileged Access Management (PAM) with 4 reviews while IBM Security Secret Server is ranked 13th in Privileged Access Management (PAM) with 7 reviews. BeyondTrust DevOps Secrets Safe is rated 7.6, while IBM Security Secret Server is rated 8.2. The top reviewer of BeyondTrust DevOps Secrets Safe writes "Integrates well between AD and Unix, scalable, and easy to use". On the other hand, the top reviewer of IBM Security Secret Server writes "User-friendly, granular features, and is simple to implement, but the technical support could be improved". BeyondTrust DevOps Secrets Safe is most compared with HashiCorp Vault, BeyondTrust Password Safe, Delinea Secret Server and Azure Key Vault, whereas IBM Security Secret Server is most compared with Delinea Secret Server, CyberArk Privileged Access Manager and Delinea Privileged Access Service. See our BeyondTrust DevOps Secrets Safe vs. IBM Security Secret Server report.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.