Symantec Privileged Access Manager and IBM Security Secret Server compete in the privileged access management category. IBM seems to have the upper hand due to its comprehensive features, although Symantec is preferred for pricing and customer support.
Features: Symantec Privileged Access Manager is known for its integration capabilities, effective session monitoring, and competitive pricing. IBM Security Secret Server offers robust password management, extensive audit reporting, and comprehensive feature depth.
Room for Improvement: Symantec needs better scalability options, a more intuitive user interface, and enhanced session reporting. IBM requires more intuitive navigation, streamlined workflow processes, and an enhanced user experience.
Ease of Deployment and Customer Service: Symantec Privileged Access Manager is noted for a straightforward deployment process and strong customer service. IBM Security Secret Server demands more initial setup resources but compensates with reliable support and broader deployment models.
Pricing and ROI: Symantec Privileged Access Manager is competitively priced with a satisfactory return on investment over time, ideal for budget-conscious enterprises. IBM Security Secret Server, with higher initial setup costs, justifies its ROI through expanded capabilities, offering value for organizations prioritizing advanced features over cost.
IBM Security Secret Server protects privileged accounts from hackers and insider threats, helps ensure compliance with evolving regulations, and allows authorized employees to seamlessly gain access to the tools and information they need to drive productivity. Easily detect, manage and audit privileged accounts, and control which applications are permitted to run on endpoints and servers to prevent malicious applications from penetrating the environment. IBM Security Secret Server is fast to deploy, easy to use and scalable for the enterprise.
CA Privileged Access Manager is a simple-to-deploy, automated, proven solution for privileged access management in physical, virtual and cloud environments. It enhances security by protecting sensitive administrative credentials such as root and administrator passwords, controlling privileged user access, proactively enforcing policies and monitoring and recording privileged user activity across all IT resources. It includes CA PAM Server Control (previously CA Privileged Identity Manager) for fine-grained protection of critical servers
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.