IT Central Station is now PeerSpot: Here's why

HelpSystems Powertech Identity & Access Manager vs IBM Security Secret Server comparison

Cancel
You must select at least 2 products to compare!
Featured Review
Buyer's Guide
Privileged Access Management (PAM)
June 2022
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: June 2022.
610,336 professionals have used our research since 2012.
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"HelpSystems Powertech's feature that I have found most valuable is its flexibility. It is able to be extended. A lot of the products these days, especially the ones on the cloud, are limited and can't handle all the use cases. Often there is not even a way to customize the application to meet uncommon use cases and HelpSystems provides an infrastructure that lends itself to the ability to be customized."

More HelpSystems Powertech Identity & Access Manager Pros →

"The live recording is a very useful feature."

More IBM Security Secret Server Pros →

Cons
"In terms of what could be improved, I would say the support of the product. It's hard to get support for it. I think this is emblematic of the fact that they don't have a lot of employees who have long-term experience with it."

More HelpSystems Powertech Identity & Access Manager Cons →

"The newer interface is more difficult to use than the previous one, and consequently, new users might need more training."

More IBM Security Secret Server Cons →

report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
610,336 professionals have used our research since 2012.
Questions from the Community
Top Answer:HelpSystems Powertech's feature that I have found most valuable is its flexibility. It is able to be extended. A lot of the products these days, especially the ones on the cloud, are limited and can't… more »
Top Answer:In terms of what could be improved, I would say the support of the product. It's hard to get support for it. I think this is emblematic of the fact that they don't have a lot of employees who have… more »
Top Answer:Our customers use it for onboarding, terminations, password reset, and certifications.
Top Answer:The live recording is a very useful feature.
Top Answer:I Think Vendor always working on that as every period of time not so long a new release version is available which is mean research and development team always working and alerted for any request or… more »
Top Answer:This is one of the products that we provide to our customers. Many of them work in the banking and industrial sector and We have a POC in place with one of our customers right now. The last use case… more »
Ranking
Views
133
Comparisons
107
Reviews
1
Average Words per Review
533
Rating
5.0
Views
899
Comparisons
751
Reviews
1
Average Words per Review
648
Rating
10.0
Comparisons
Also Known As
Powertech Identity & Access Manager, BoKS, BoKS ServerControl, Fox Technologies ApplicationControl, ApplicationControl
IBM Secret Server, Secret Server, IBM Security Privileged Identity Manager
Learn More
Overview

Powertech Identity & Access Manager (BoKS) transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. It simplifies your organization’s ability to enforce security policies, and control access to critical systems and information. With full control over accounts, access and privilege, IT and security teams can proactively prevent internal and external attacks on critical systems before they start.

IBM Security Secret Server protects privileged accounts from hackers and insider threats, helps ensure compliance with evolving regulations, and allows authorized employees to seamlessly gain access to the tools and information they need to drive productivity. Easily detect, manage and audit privileged accounts, and control which applications are permitted to run on endpoints and servers to prevent malicious applications from penetrating the environment. IBM Security Secret Server is fast to deploy, easy to use and scalable for the enterprise.

Offer
Learn more about HelpSystems Powertech Identity & Access Manager
Learn more about IBM Security Secret Server
Sample Customers
Integris Health
Information Not Available
Top Industries
VISITORS READING REVIEWS
Computer Software Company31%
Educational Organization8%
Government7%
Wholesaler/Distributor7%
VISITORS READING REVIEWS
Computer Software Company27%
Comms Service Provider16%
Government7%
Retailer6%
Company Size
VISITORS READING REVIEWS
Small Business37%
Midsize Enterprise10%
Large Enterprise53%
VISITORS READING REVIEWS
Small Business25%
Midsize Enterprise11%
Large Enterprise64%
Buyer's Guide
Privileged Access Management (PAM)
June 2022
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: June 2022.
610,336 professionals have used our research since 2012.

HelpSystems Powertech Identity & Access Manager is ranked 13th in Privileged Access Management (PAM) with 1 review while IBM Security Secret Server is ranked 7th in Privileged Access Management (PAM) with 1 review. HelpSystems Powertech Identity & Access Manager is rated 5.0, while IBM Security Secret Server is rated 10.0. The top reviewer of HelpSystems Powertech Identity & Access Manager writes "Inexperienced support for old product, but good flexibility for use case customization". On the other hand, the top reviewer of IBM Security Secret Server writes "Lightweight, helpful and comprehensive knowledge base, provides live session recording capabilities". HelpSystems Powertech Identity & Access Manager is most compared with CyberArk Privileged Access Manager, whereas IBM Security Secret Server is most compared with Delinea Secret Server, CyberArk Privileged Access Manager, Symantec Privileged Access Manager, WALLIX Bastion and Delinea Privileged Access Service.

See our list of best Privileged Access Management (PAM) vendors.

We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.