Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs IBM Security Secret Server comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Endpoint Privilege...
Ranking in Privileged Access Management (PAM)
3rd
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Anti-Malware Tools (5th), Application Control (5th), Ransomware Protection (5th)
IBM Security Secret Server
Ranking in Privileged Access Management (PAM)
28th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
7
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of August 2025, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Endpoint Privilege Manager is 3.2%, down from 3.8% compared to the previous year. The mindshare of IBM Security Secret Server is 1.1%, down from 1.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Sumit Chavan - PeerSpot reviewer
Helps secure the infrastructure and control users with admin rights
There are many features that are currently missing. A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good. Currently, no user-based policy option is available inside the EPM console. We can only create computer-based policies. The database is available, but there is a drawback in not being able to create local groups on the EPM console. We only have to depend on Active Directory. This limits infrastructure security as we depend on the Active Directory team to manage user groups. If they remove any users, we lose control. If we could create groups locally and block them or set specific policies, we would have more control. Local endpoint management is missing from the EPM site. Moreover, there is an issue with policies not running as expected when we make enhancements. We have to find multiple ways to whitelist applications or enhance policies.
AsifIqbal - PeerSpot reviewer
Easy to set up and manage and has good scalability and stability, but its technical support team needs to be more aggressive in solving issues
What needs improvement in IBM Security Secret Server is support. The local partner provides good support, but IBM itself doesn't. Most of the time, the IBM support team does not aggressively resolve issues reported through chat or the IBM website. In the next version of IBM Security Secret Server, I want to see more lightweight recording, architecture, or infrastructure requirements. Currently, it's heavy, so I want it reduced to make adapting IBM Security Secret Server much more effortless.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"CyberArk Endpoint Privilege Manager has significantly improved our security posture by preventing virus incidents and restricting users from downloading unwanted applications."
"The most valuable feature of the solution is its performance."
"CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks."
"CyberArk Endpoint Privilege Manager is very easy to manage, which I like. The solution also has a dashboard where you can see which software is suspicious, which I find valuable."
"Regarding the granularity of the managed controls in CyberArk Endpoint Privilege Manager, we have different levels of features to define compensations and capabilities, which help us verify configurations and access, ultimately keeping the safety of rights intact."
"What sets CyberArk apart is its continuous innovation, staying ahead of the competition."
"We did immediately begin to see results when using CyberArk."
"Stability-wise, I think it is a very good solution."
"As a PAM solution, Secret Server performs all the use cases in our environment."
"The live recording is a very useful feature."
"One of the most valuable features is scalability, and how it allows you to scale it without affecting the underlying core components."
"What I like best about IBM Security Secret Server is its single-access console. It's also easy to manage and fulfills the requirements with the least resistance."
 

Cons

"The CyberArk team is working on a feature to identify devices without the Endpoint Privilege Manager running, which is currently missing."
"The product's threat protection and defense capabilities need enhancement."
"One area that has room for improvement is in managing the credentials for network devices."
"While CyberArk Endpoint Privilege Manager is a great tool, I believe the functionality could be wider. If it could work not only with permissions but also involve pure EDR tasks or User and Entity Behavior Analytics, it would be great."
"We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can."
"The solution's pricing could be better."
"The main issues I experience are related to deployment, which requires dependency on other solutions like AD or SCCM. These tools need to be defined and synced with the client or agent and master, sometimes needing manual checks."
"The product needs a streamlined user interface; improvements to the user interface can enhance user experience and make the solution more intuitive to navigate."
"The newer interface is more difficult to use than the previous one, and consequently, new users might need more training."
"It would be preferable if the full proxy was included in the IBM Security Secret Server."
"What needs improvement in IBM Security Secret Server is support. The local partner provides good support, but IBM itself doesn't. Most of the time, the IBM support team does not aggressively resolve issues reported through chat or the IBM website."
"Secret Server should have the ability to discover privileged accounts in the servers, like the administrator or users, from SQL and Oracle without having to import a script."
"The nonclustered index is working in an area with a problem that needs improvement."
 

Pricing and Cost Advice

"It is an expensive solution."
"licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record."
"The solution's pricing is reasonable compared to other vendors' products."
"The cost for CyberArk is very high."
"We pay about $17 per user."
"I rate the solution's pricing an eight out of ten since the price can be too high for smaller businesses."
"It's not at the lower end of the market. I think the price is reasonable considering the quality it delivers. It is a top-notch solution at a fair price point."
"CyberArk Endpoint Privilege Manager has a very high price, so it's a one out of ten for me in terms of pricing."
"My rating for the IBM Security Secret Server pricing is seven out of ten. It could be cheaper."
"I believe that we paid 35,000 or 40,000 US dollars for it."
"The price could be better. I think it's a good price for the on-premises environment and the high availability for enterprises the solution provides."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Financial Services Firm
14%
Manufacturing Company
11%
Government
8%
Computer Software Company
14%
Financial Services Firm
11%
Performing Arts
9%
Insurance Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
Ask a question
Earn 20 points
 

Also Known As

Viewfinity
IBM Secret Server, Secret Server, IBM Security Privileged Identity Manager
 

Overview

Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. IBM Security Secret Server and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.