Fudo PAM vs IBM Security Secret Server comparison

Cancel
You must select at least 2 products to compare!
Fudo Security Logo
1,090 views|644 comparisons
100% willing to recommend
IBM Logo
785 views|528 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Fudo PAM and IBM Security Secret Server based on real PeerSpot user reviews.

Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Fudo PAM vs. IBM Security Secret Server Report (Updated: March 2024).
769,599 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The main benefit of the solution is that it's very easy to set up. It only takes a couple of hours to install everything.""We are convinced that Fudo PAM is better than competing products like WALLIX.""it's perfect to control and administer computers in our company.""Session recording and password management are the two main aspects.""Fudo PAM was the most flexible and intuitive interface out of all of the products in the PAM sector."

More Fudo PAM Pros →

"The live recording is a very useful feature.""One of the most valuable features is scalability, and how it allows you to scale it without affecting the underlying core components.""Stability-wise, I think it is a very good solution.""What I like best about IBM Security Secret Server is its single-access console. It's also easy to manage and fulfills the requirements with the least resistance.""As a PAM solution, Secret Server performs all the use cases in our environment."

More IBM Security Secret Server Pros →

Cons
"Fudo PAM’s scalability is not very strong.""The stability is not very good.""I would like to see better server management. You have to know exactly what you're looking for to get the right server.""The configuration is difficult.""Professional training and certification would be great."

More Fudo PAM Cons →

"The newer interface is more difficult to use than the previous one, and consequently, new users might need more training.""It would be preferable if the full proxy was included in the IBM Security Secret Server.""What needs improvement in IBM Security Secret Server is support. The local partner provides good support, but IBM itself doesn't. Most of the time, the IBM support team does not aggressively resolve issues reported through chat or the IBM website.""Secret Server should have the ability to discover privileged accounts in the servers, like the administrator or users, from SQL and Oracle without having to import a script.""The nonclustered index is working in an area with a problem that needs improvement."

More IBM Security Secret Server Cons →

Pricing and Cost Advice
  • "The pricing is great. We've been given discounts that make it cheaper than using any other solution."
  • More Fudo PAM Pricing and Cost Advice →

  • "I believe that we paid 35,000 or 40,000 US dollars for it."
  • "My rating for the IBM Security Secret Server pricing is seven out of ten. It could be cheaper."
  • "The price could be better. I think it's a good price for the on-premises environment and the high availability for enterprises the solution provides."
  • More IBM Security Secret Server Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    769,599 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Session recording and password management are the two main aspects.
    Top Answer:There are some areas for improvement in the Fudo PAM cake that we want to improve in terms of scaling. Scaling is an optional feature because we closed some big projects with enterprise customers from… more »
    Top Answer:The main use case is for protecting privileged user access, such as securing remote access services. Another important use case is when we work with third-party users and need to provide password… more »
    Top Answer:Stability-wise, I think it is a very good solution.
    Top Answer:The nonclustered index is working in an area with a problem that needs improvement. In some cases, when they create some index in the tool, you may face some problems with the parallelism and some… more »
    Top Answer:I use the tool for dynamic services, integration services, and reporting services. I have years of working experience with the tool. I am a DBA and a support administrator for SQL Server, and also all… more »
    Ranking
    Views
    1,090
    Comparisons
    644
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Views
    785
    Comparisons
    528
    Reviews
    4
    Average Words per Review
    686
    Rating
    8.0
    Comparisons
    Also Known As
    Fudo Privileged Access Management
    IBM Secret Server, Secret Server, IBM Security Privileged Identity Manager
    Learn More
    Overview

    We are the leading vendor of innovative IT security solutions. We focus on privileged access management and privileged session monitoring, combined under the Fudo Security brand. The Fudo product line merges innovation and an intuitive user experience with strong security features. These are the hallmarks of the future designs of the company.

    IBM Security Secret Server protects privileged accounts from hackers and insider threats, helps ensure compliance with evolving regulations, and allows authorized employees to seamlessly gain access to the tools and information they need to drive productivity. Easily detect, manage and audit privileged accounts, and control which applications are permitted to run on endpoints and servers to prevent malicious applications from penetrating the environment. IBM Security Secret Server is fast to deploy, easy to use and scalable for the enterprise.

    Sample Customers
    KFC, BP, Santander, Burger King, ING, Starbucks, Yahoo, DHL
    Information Not Available
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm22%
    Computer Software Company14%
    Media Company8%
    Energy/Utilities Company7%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Financial Services Firm9%
    Healthcare Company7%
    Insurance Company7%
    Company Size
    VISITORS READING REVIEWS
    Small Business29%
    Midsize Enterprise18%
    Large Enterprise53%
    REVIEWERS
    Small Business57%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business24%
    Midsize Enterprise12%
    Large Enterprise64%
    Buyer's Guide
    Fudo PAM vs. IBM Security Secret Server
    March 2024
    Find out what your peers are saying about Fudo PAM vs. IBM Security Secret Server and other solutions. Updated: March 2024.
    769,599 professionals have used our research since 2012.

    Fudo PAM is ranked 21st in Privileged Access Management (PAM) with 5 reviews while IBM Security Secret Server is ranked 13th in Privileged Access Management (PAM) with 7 reviews. Fudo PAM is rated 8.0, while IBM Security Secret Server is rated 8.2. The top reviewer of Fudo PAM writes "Easy to install but needs to provide better server management and organization". On the other hand, the top reviewer of IBM Security Secret Server writes "User-friendly, granular features, and is simple to implement, but the technical support could be improved". Fudo PAM is most compared with WALLIX Bastion, CyberArk Privileged Access Manager, Delinea Secret Server, One Identity Safeguard and Teleport, whereas IBM Security Secret Server is most compared with Delinea Secret Server, CyberArk Privileged Access Manager and Delinea Privileged Access Service. See our Fudo PAM vs. IBM Security Secret Server report.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.