

IBM Security Secret Server and Fudo PAM compete in privileged access management. Fudo PAM holds the upper hand due to its comprehensive feature set, offering advanced security capabilities users find valuable.
Features: IBM Security Secret Server is noted for automation capabilities, integration with third-party applications, and cost-effectiveness. Fudo PAM offers advanced session monitoring, user behavior analytics, and a more robust feature set, which enhances security management.
Room for Improvement: IBM Security Secret Server users often seek better customization, enhanced reporting capabilities, and a reduction in hidden setup costs. Fudo PAM users point to the need for improved scalability, more extensive third-party integrations, and a less steep learning curve during deployment.
Ease of Deployment and Customer Service: IBM Security Secret Server offers straightforward deployment but can be slow with issue resolution. Fudo PAM, despite its steep initial learning curve, provides reliable and supportive customer service throughout the deployment process.
Pricing and ROI: IBM Security Secret Server is considered cost-effective with concerns about hidden setup costs impacting ROI. Fudo PAM, although associated with higher upfront costs, is valued for long-term security benefits and offers satisfactory ROI, justifying initial investment through its comprehensive capabilities.
| Product | Mindshare (%) |
|---|---|
| IBM Security Secret Server | 1.3% |
| Fudo PAM | 2.4% |
| Other | 96.3% |

| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 2 |
| Large Enterprise | 2 |
Fudo PAM provides an effective solution for managing privileged user access with advanced session recording, password management, and protocol compatibility, ensuring organizations efficiently control server activities.
Fudo PAM offers a flexible, intuitive interface that supports SCTP, STTPS, SQL, and MySQL protocols. It's known for its ease of installation and operation, facilitating server activity monitoring and control. However, there are areas for improvement in scaling, session, and password management usability. Users have noted setup complications and a lack of regional support, specifically in Ukraine, eyeing better educational services and an improved account-server matching system. Basic improvements are desired for privileged account search capabilities and the reduction of buggy installations. Primarily used by businesses to secure privileged access, it aids in remote access and password management, serving IT and database administrators, third parties, and clients, while integrators and resellers handle configuration and deployment.
What are the main features of Fudo PAM?Fudo PAM is commonly implemented across industries focusing on securing privileged user access, enhancing remote access management, and maintaining secure, detailed user logs. Businesses use it internally or for clients, while integrators and resellers deploy it for their customers.
IBM Security Secret Server provides centralized management of privileged credentials, secure access, session recording, and replay. Its pricing model is unique, being based on user count rather than system connections, making it a flexible choice for organizations.
IBM Security Secret Server enhances cybersecurity by integrating with frameworks and offering features like monitoring, high availability, and adaptable reporting. It simplifies password management, automates changes, and ensures compliance with security protocols. The platform is valued for its ease of deployment and user-friendly interface, although it can improve in areas such as the GUI and integration process. Complex high availability and disaster recovery setups are noted challenges, along with nonclustered indexing issues affecting performance. Users desire improvements in local support and migration processes.
What are the key features of IBM Security Secret Server?Organizations across various industries implement IBM Security Secret Server for managing privileged access and securing critical systems. It serves financial institutions by providing a secure jump server for accessing core banking platforms and databases. IT managers benefit from workflow approvals and automated password management, ensuring compliance and boosting security posture. The platform's session recording and auditing features are crucial for sectors needing detailed activity documentation.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.