

IBM Security Secret Server and StrongDM compete in access and identity protection. StrongDM takes the lead due to its comprehensive feature set aligning with modern operational demands.
Features: IBM Security Secret Server provides advanced secret storage, automated password management, and strong auditing. StrongDM focuses on infrastructure access control, seamless integration with existing software, and dynamic access policies.
Ease of Deployment and Customer Service: IBM Security Secret Server requires substantial setup and configuration time, supported by professional assistance and extensive resources. StrongDM offers cloud-based quick setup and intuitive operation with responsive customer service for easy troubleshooting and adoption.
Pricing and ROI: IBM Security Secret Server generally involves higher upfront setup costs, offering value through long-term security capabilities. StrongDM delivers quicker ROI due to easy integration and immediate operational efficiency impact. Its pricing strategy is favorable for business adaptation, enhancing cost-effectiveness over time.
| Product | Mindshare (%) |
|---|---|
| StrongDM | 2.5% |
| IBM Security Secret Server | 1.3% |
| Other | 96.2% |

| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 2 |
| Large Enterprise | 2 |
| Company Size | Count |
|---|---|
| Small Business | 2 |
| Midsize Enterprise | 2 |
| Large Enterprise | 3 |
IBM Security Secret Server provides centralized management of privileged credentials, secure access, session recording, and replay. Its pricing model is unique, being based on user count rather than system connections, making it a flexible choice for organizations.
IBM Security Secret Server enhances cybersecurity by integrating with frameworks and offering features like monitoring, high availability, and adaptable reporting. It simplifies password management, automates changes, and ensures compliance with security protocols. The platform is valued for its ease of deployment and user-friendly interface, although it can improve in areas such as the GUI and integration process. Complex high availability and disaster recovery setups are noted challenges, along with nonclustered indexing issues affecting performance. Users desire improvements in local support and migration processes.
What are the key features of IBM Security Secret Server?Organizations across various industries implement IBM Security Secret Server for managing privileged access and securing critical systems. It serves financial institutions by providing a secure jump server for accessing core banking platforms and databases. IT managers benefit from workflow approvals and automated password management, ensuring compliance and boosting security posture. The platform's session recording and auditing features are crucial for sectors needing detailed activity documentation.
StrongDM streamlines secure, password-less access, reducing attack surfaces with its zero trust approach. It integrates smoothly with existing systems supporting IP whitelisting and excels in managing runtime features while offering comprehensive audit logging and seamless resource access.
StrongDM provides organizations with enhanced security through features like password rotation and efficient management of access to resources such as EC2 instances, Kubernetes clusters, and databases. Its integration capabilities are complemented by cost-effectiveness compared to competitors like CyberArk. Companies utilize StrongDM for controlling access in dynamic environments, benefiting from audit logging for detailed movement tracking. While users appreciate its efficiency, they also seek improvements in update control and better accompanying documentation. Some express the need for a cloud-native option to address diverse demands, as the current setup can be challenging without comprehensive materials. Flexibility and more traditional PAM features are in demand.
What are StrongDM's key features?In industries managing sensitive data or requiring regulated access, StrongDM is crucial for securing cloud private networks and managing user access to databases and hosts. DevOps teams benefit from its ability to protect connectivity to backend servers, ensuring identity and access management remains robust and adaptable for companies dealing with frequent changes or expansions.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.