Earn 20 points
Managing and controlling access to privileged accounts is of the utmost importance for every organization, regardless of its size. As the concern for insider threats and data breaches is growing, the demand for solutions is also reaching an all-time high. Unfortunately, the majority of existing privileged access management solutions have focused primarily on meeting the needs of large scale organizations. This results in solutions less suited for the specific needs of SMBs, as they tend to be overly complex, challenging to deploy, and beyond budget. This dilemma is what drove Devolutions to create a set of solutions specifically designed to meet the growing needs of small and medium-sized businesses. We call it "PAM for the rest of us."
IBM Security Secret Server protects privileged accounts from hackers and insider threats, helps ensure compliance with evolving regulations, and allows authorized employees to seamlessly gain access to the tools and information they need to drive productivity. Easily detect, manage and audit privileged accounts, and control which applications are permitted to run on endpoints and servers to prevent malicious applications from penetrating the environment. IBM Security Secret Server is fast to deploy, easy to use and scalable for the enterprise.
Devolutions Password Server is ranked 34th in Privileged Access Management (PAM) while IBM Security Secret Server is ranked 10th in Privileged Access Management (PAM) with 1 review. Devolutions Password Server is rated 0.0, while IBM Security Secret Server is rated 10.0. On the other hand, the top reviewer of IBM Security Secret Server writes "Lightweight, helpful and comprehensive knowledge base, provides live session recording capabilities". Devolutions Password Server is most compared with , whereas IBM Security Secret Server is most compared with Delinea Secret Server, CyberArk Privileged Access Manager, Delinea Privileged Access Service, WALLIX Bastion and Symantec Privileged Access Manager.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.