IBM Security Secret Server vs One Identity Manager comparison

Cancel
You must select at least 2 products to compare!
IBM Logo
785 views|528 comparisons
100% willing to recommend
One Identity Logo
5,257 views|2,919 comparisons
86% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between IBM Security Secret Server and One Identity Manager based on real PeerSpot user reviews.

Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM).
To learn more, read our detailed Privileged Access Management (PAM) Report (Updated: April 2024).
769,479 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"One of the most valuable features is scalability, and how it allows you to scale it without affecting the underlying core components.""The live recording is a very useful feature.""Stability-wise, I think it is a very good solution.""As a PAM solution, Secret Server performs all the use cases in our environment.""What I like best about IBM Security Secret Server is its single-access console. It's also easy to manage and fulfills the requirements with the least resistance."

More IBM Security Secret Server Pros →

"Even without any customization, if you install it, configure it, it's ready... It's very powerful. Without any customization, it starts working.""Nobody has to put people in AD groups by hand anymore. It goes automatically and that's very good. It's also very flexible. It's quite easy to customize and we have customized it a lot.""It is a flexible because it is customizable. It allows you to build anything on top of it.""This solution helps with compliance by having a way of controlling an audit trail, knowing how things are done, and knowing how to control who has access to what.""Business roles are one way to help companies to identify job codes and position codes. It enables the grouping and automating of certain types of access for certain departments... Doing that in One Identity Manager is a very simple task and it is very well organized.""It has many features which can be combined and configured in a great way, then put together in projects and ways that developers didn't think were possible, which has been great.""Workflow management is an important feature. With other identity management products, there was no workflow management so we had to build it ourselves.""We have reduced about 60% of our help desk calls, especially for onboarding and simple tasks that do One Identity automation."

More One Identity Manager Pros →

Cons
"The nonclustered index is working in an area with a problem that needs improvement.""The newer interface is more difficult to use than the previous one, and consequently, new users might need more training.""Secret Server should have the ability to discover privileged accounts in the servers, like the administrator or users, from SQL and Oracle without having to import a script.""It would be preferable if the full proxy was included in the IBM Security Secret Server.""What needs improvement in IBM Security Secret Server is support. The local partner provides good support, but IBM itself doesn't. Most of the time, the IBM support team does not aggressively resolve issues reported through chat or the IBM website."

More IBM Security Secret Server Cons →

"The web interface has room for improvement. It could be more performant and the design of the web interface is relatively complicated. It could be simplified.""There is a small area inside of the administrator's GUI that could be a little bit more organized.""One of the things we would like is the ability to have more than one system role manager. That would be nice. For example, when people are on vacation, sometimes it gets a little hard to administrate system roles.""It should be able to give a client version of the product, rather than just a web-portal.""There are a few aspects of One Identity Manager's user experience that could be improved.""The policy and role management features are a bit hard to scale. The whole model for who can do what and how to set it up is not so well-governed for a larger organization. The demos are always shown for a 100 or a 1000 people, but when it is a large number, it is quite difficult to maintain.""The customization process should be simplified.""Integration with various applications should be made smoother. It is very difficult right now for regular implementers. Access reviews are another thing that is not that good in the solution. It needs improvement."

More One Identity Manager Cons →

Pricing and Cost Advice
  • "I believe that we paid 35,000 or 40,000 US dollars for it."
  • "My rating for the IBM Security Secret Server pricing is seven out of ten. It could be cheaper."
  • "The price could be better. I think it's a good price for the on-premises environment and the high availability for enterprises the solution provides."
  • More IBM Security Secret Server Pricing and Cost Advice →

  • "Start with an operations team that is motivated to learn a lot in a short period of time. The longer you wait, the more expensive it will be to get the right level of expertise in this area."
  • "There are old processes that are really great for some people and look like pieces of artwork. However, the maintenance of them is really expensive."
  • "The solution is flexible, in general. You can define the parts of the solution that you want to use, and it won't affect the price."
  • "We have the premium support and are very satisfied. They are always answer our questions very quickly. For the moment, we are very satisfied, but I think it's because we are paying for the premium support."
  • "It helps us save on licenses for applications because we are following the account lifecycle, as well as account reactivation."
  • "We are paying for premium support, which is expensive. However, we do receive very good, fast support."
  • "It needs flexibility in the licensing or packaging, because you buy the entire package at once, and sometimes the customers are a bit overwhelmed with whatever they get. I would like if they could cut the licensing or packaging into somewhat smaller things."
  • "It has helped to reduce customer costs."
  • More One Identity Manager Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    769,479 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Stability-wise, I think it is a very good solution.
    Top Answer:The nonclustered index is working in an area with a problem that needs improvement. In some cases, when they create some index in the tool, you may face some problems with the parallelism and some… more »
    Top Answer:I use the tool for dynamic services, integration services, and reporting services. I have years of working experience with the tool. I am a DBA and a support administrator for SQL Server, and also all… more »
    Top Answer:One Identity Manager offers several features that I found advantageous compared to other tools.
    Top Answer:One Identity Manager has a reasonable price point. Given the features and functionality it provides, the cost is justified.
    Top Answer:One area where One Identity Manager could be improved is in database performance. When handling a large number of users, I believe that built-in indexing or other optimizations would be beneficial… more »
    Ranking
    Views
    785
    Comparisons
    528
    Reviews
    4
    Average Words per Review
    686
    Rating
    8.0
    3rd
    Views
    5,257
    Comparisons
    2,919
    Reviews
    31
    Average Words per Review
    973
    Rating
    8.2
    Comparisons
    Also Known As
    IBM Secret Server, Secret Server, IBM Security Privileged Identity Manager
    Quest One Identity Manager, Dell One Identity Manager
    Learn More
    Overview

    IBM Security Secret Server protects privileged accounts from hackers and insider threats, helps ensure compliance with evolving regulations, and allows authorized employees to seamlessly gain access to the tools and information they need to drive productivity. Easily detect, manage and audit privileged accounts, and control which applications are permitted to run on endpoints and servers to prevent malicious applications from penetrating the environment. IBM Security Secret Server is fast to deploy, easy to use and scalable for the enterprise.

    One Identity Manager is a value-added and trusted active directory management and user provisioning software solution. One Identity Manager administers and protects an organization’s data and users, minimizes threats, and ensures that compliance regulations are consistently satisfied.

    Users will have access to the data and applications they need when they need them. One Identity can be used on premises, in the cloud, and also with hybrid options. One Identity Manager is able to easily combine strict governance compliance regulations and rigorous security protocols to keep business enterprises secure and functional today and into the future. One Identity Manager is also a robust, scalable identity governance and administration (IGA) solution. The solution is designed to meet the changing needs of a growing dynamic business enterprise, and not be limited or left vulnerable by IT department constricts.

    One Identity consistently provides robust security solutions that facilitate a strong secure enterprise where the users, applications, and critical data are safe and secure. The unified identity security platform provides identity governance and administration (IGA), privileged access management (PAM), active directory management and security (ADMS), and identity and access management (IAM) processes to ensure an aggressive stance on security for today’s dynamic enterprise organizations.

    One Identity is used by more than 11,000 organizations worldwide managing over five hundred million plus identities.

    One Identity Manager Features

    • Self-service options: Organizations save time and are able to get tasks completed easily. Users can request permissions or access and receive predetermined approval based on role assignments.

    • Password management: Organizations can easily reset user passwords based on established organizational protocols. Password policies can be determined according to user roles and assignments.

    • Governance: One Identity Manager offers complete visibility regarding data access, such as who has access, when the access was given, and the reasons why access was given. The solution delivers clear reporting to comply with any regulatory requirements.

    • SAP certified: Users are able to amplify existing SAP security protocols and seamlessly connect accounts under governance. One Identity Manager is a complete identity access solution.

    • Reporting: One Identity Manager delivers reliable reporting regarding user access and privileged access to an organization's network. The reporting can satisfy all government and regulatory compliance standards.

    • Connectors: One Identity Manager’s significant amount of available connectors enable organizations to easily extend identity governance to the cloud and will ensure cloud application time is minimized significantly.

    Reviews from Real Users

    The initial setup process for an employee is straightforward. We set up processes for user accounts and we can add other processes to them. Our goal is to automate all user-permission and user-administration processes with One Identity and we are doing that more and more.” - Marc H., IT Architect at a tech services company

    “The most valuable features are that it has a lot of capabilities, can integrate with a lot of systems, including automated onboarding like CyberArk, and allows you to integrate different entities.” - Security Consultant at a financial services firm

    Sample Customers
    Information Not Available
    Texas A&M, Sky Media, BHF Bank, Swiss Post, Union Investment, Wayne State University. More at OneIdentity.com/casestudies
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company17%
    Financial Services Firm9%
    Insurance Company7%
    Healthcare Company7%
    REVIEWERS
    Financial Services Firm37%
    Manufacturing Company10%
    Healthcare Company10%
    Construction Company7%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Financial Services Firm13%
    Government8%
    Manufacturing Company7%
    Company Size
    REVIEWERS
    Small Business57%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business24%
    Midsize Enterprise12%
    Large Enterprise65%
    REVIEWERS
    Small Business29%
    Midsize Enterprise6%
    Large Enterprise65%
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise14%
    Large Enterprise64%
    Buyer's Guide
    Privileged Access Management (PAM)
    April 2024
    Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: April 2024.
    769,479 professionals have used our research since 2012.

    IBM Security Secret Server is ranked 13th in Privileged Access Management (PAM) with 7 reviews while One Identity Manager is ranked 3rd in Identity Management (IM) with 75 reviews. IBM Security Secret Server is rated 8.2, while One Identity Manager is rated 8.0. The top reviewer of IBM Security Secret Server writes "User-friendly, granular features, and is simple to implement, but the technical support could be improved". On the other hand, the top reviewer of One Identity Manager writes "The JML is customizable but the support team isn't strong". IBM Security Secret Server is most compared with Delinea Secret Server, CyberArk Privileged Access Manager and Delinea Privileged Access Service, whereas One Identity Manager is most compared with SailPoint IdentityIQ, Oracle Identity Governance, EVOLVEUM midPoint, Cisco ISE (Identity Services Engine) and ForgeRock.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.