CyberArk Endpoint Privilege Manager vs IBM Security Secret Server comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between CyberArk Endpoint Privilege Manager and IBM Security Secret Server based on real PeerSpot user reviews.

Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed CyberArk Endpoint Privilege Manager vs. IBM Security Secret Server Report (Updated: March 2024).
769,630 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management.""We can do both server and endpoint protection.""The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is.""I am impressed with the product's seamless integration. The PAM wallet and enterprise password wallet are good also good.""The solution is scalable.""The department management aspect of the solution is the most valuable aspect.""CyberArk Endpoint Privilege Manager (EPM) 's most valuable feature is its ability to manage user application privileges and protect against ransomware attacks by controlling access to specific files and applications.""The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically."

More CyberArk Endpoint Privilege Manager Pros →

"What I like best about IBM Security Secret Server is its single-access console. It's also easy to manage and fulfills the requirements with the least resistance.""Stability-wise, I think it is a very good solution.""As a PAM solution, Secret Server performs all the use cases in our environment.""The live recording is a very useful feature.""One of the most valuable features is scalability, and how it allows you to scale it without affecting the underlying core components."

More IBM Security Secret Server Pros →

Cons
"Can be improved by allowing computers to be excluded from policies.""Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources.""The solution's pricing could be better.""It cannot be on-prem. It is only cloud-based. Sometimes, that's a restriction in terms of usage.""Technical support is slow to respond when we run into issues.""The product needs a streamlined user interface; improvements to the user interface can enhance user experience and make the solution more intuitive to navigate.""They need much better integration with Azure AD.""The tool should be more user-friendly."

More CyberArk Endpoint Privilege Manager Cons →

"It would be preferable if the full proxy was included in the IBM Security Secret Server.""The nonclustered index is working in an area with a problem that needs improvement.""Secret Server should have the ability to discover privileged accounts in the servers, like the administrator or users, from SQL and Oracle without having to import a script.""What needs improvement in IBM Security Secret Server is support. The local partner provides good support, but IBM itself doesn't. Most of the time, the IBM support team does not aggressively resolve issues reported through chat or the IBM website.""The newer interface is more difficult to use than the previous one, and consequently, new users might need more training."

More IBM Security Secret Server Cons →

Pricing and Cost Advice
  • "licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record."
  • "I think that it was in the range of $200,000 that had to get approved."
  • "Pricing depends on how many devices you use. Right now, on-premise, it costs us a little, but it's worth it. It seems like the cloud solution is much more expensive. We got this solution one year ago, and it's like we bought the solution, and now they are not going to support it on-premise anymore. We are in the implementation phase, and we missed this, and we already paid for the licenses. This is wasted time from my perspective, and CyberArk should be more customer-friendly."
  • "The cost for CyberArk is very high."
  • "The price of CyberArk Endpoint Privilege Manager is expensive."
  • "The price of CyberArk Endpoint Privilege Manager is expensive. The solution is priced based on the number of accounts onboarded and the number of concurrent sessions. Everyone else is included in the price, such as support."
  • "We pay about $17 per user."
  • "CyberArk Endpoint Privilege Manager has a very high price, so it's a one out of ten for me in terms of pricing."
  • More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →

  • "I believe that we paid 35,000 or 40,000 US dollars for it."
  • "My rating for the IBM Security Secret Server pricing is seven out of ten. It could be cheaper."
  • "The price could be better. I think it's a good price for the on-premises environment and the high availability for enterprises the solution provides."
  • More IBM Security Secret Server Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    769,630 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpoint… more »
    Top Answer:CyberArk Endpoint Privilege Manager (EPM) 's most valuable feature is its ability to manage user application privileges and protect against ransomware attacks by controlling access to specific files… more »
    Top Answer:It's not at the lower end of the market. I think the price is reasonable considering the quality it delivers. It is a top-notch solution at a fair price point.
    Top Answer:Stability-wise, I think it is a very good solution.
    Top Answer:The nonclustered index is working in an area with a problem that needs improvement. In some cases, when they create some index in the tool, you may face some problems with the parallelism and some… more »
    Top Answer:I use the tool for dynamic services, integration services, and reporting services. I have years of working experience with the tool. I am a DBA and a support administrator for SQL Server, and also all… more »
    Ranking
    Views
    1,604
    Comparisons
    1,084
    Reviews
    15
    Average Words per Review
    601
    Rating
    8.0
    Views
    785
    Comparisons
    528
    Reviews
    4
    Average Words per Review
    686
    Rating
    8.0
    Comparisons
    Also Known As
    Viewfinity
    IBM Secret Server, Secret Server, IBM Security Privileged Identity Manager
    Learn More
    Overview

    CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments.

    Click here for a free 30 day trial: CyberArk Endpoint Privilege Manager free trial

    IBM Security Secret Server protects privileged accounts from hackers and insider threats, helps ensure compliance with evolving regulations, and allows authorized employees to seamlessly gain access to the tools and information they need to drive productivity. Easily detect, manage and audit privileged accounts, and control which applications are permitted to run on endpoints and servers to prevent malicious applications from penetrating the environment. IBM Security Secret Server is fast to deploy, easy to use and scalable for the enterprise.

    Sample Customers
    Information Not Available
    Top Industries
    REVIEWERS
    Computer Software Company33%
    Manufacturing Company17%
    Comms Service Provider17%
    Wholesaler/Distributor8%
    VISITORS READING REVIEWS
    Computer Software Company14%
    Financial Services Firm14%
    Manufacturing Company10%
    Government8%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Financial Services Firm9%
    Healthcare Company7%
    Insurance Company7%
    Company Size
    REVIEWERS
    Small Business41%
    Midsize Enterprise22%
    Large Enterprise38%
    VISITORS READING REVIEWS
    Small Business18%
    Midsize Enterprise13%
    Large Enterprise70%
    REVIEWERS
    Small Business57%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business24%
    Midsize Enterprise12%
    Large Enterprise64%
    Buyer's Guide
    CyberArk Endpoint Privilege Manager vs. IBM Security Secret Server
    March 2024
    Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. IBM Security Secret Server and other solutions. Updated: March 2024.
    769,630 professionals have used our research since 2012.

    CyberArk Endpoint Privilege Manager is ranked 6th in Privileged Access Management (PAM) with 27 reviews while IBM Security Secret Server is ranked 13th in Privileged Access Management (PAM) with 7 reviews. CyberArk Endpoint Privilege Manager is rated 8.0, while IBM Security Secret Server is rated 8.2. The top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". On the other hand, the top reviewer of IBM Security Secret Server writes "User-friendly, granular features, and is simple to implement, but the technical support could be improved". CyberArk Endpoint Privilege Manager is most compared with Microsoft Defender for Endpoint, BeyondTrust Endpoint Privilege Management, CrowdStrike Falcon, CyberArk Privileged Access Manager and Tanium, whereas IBM Security Secret Server is most compared with Delinea Secret Server, CyberArk Privileged Access Manager and Delinea Privileged Access Service. See our CyberArk Endpoint Privilege Manager vs. IBM Security Secret Server report.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.