

Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
| Product | Mindshare (%) |
|---|---|
| IBM Security Secret Server | 1.3% |
| Veza | 1.4% |
| Other | 97.3% |


| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 2 |
| Large Enterprise | 2 |
IBM Security Secret Server provides centralized management of privileged credentials, secure access, session recording, and replay. Its pricing model is unique, being based on user count rather than system connections, making it a flexible choice for organizations.
IBM Security Secret Server enhances cybersecurity by integrating with frameworks and offering features like monitoring, high availability, and adaptable reporting. It simplifies password management, automates changes, and ensures compliance with security protocols. The platform is valued for its ease of deployment and user-friendly interface, although it can improve in areas such as the GUI and integration process. Complex high availability and disaster recovery setups are noted challenges, along with nonclustered indexing issues affecting performance. Users desire improvements in local support and migration processes.
What are the key features of IBM Security Secret Server?Organizations across various industries implement IBM Security Secret Server for managing privileged access and securing critical systems. It serves financial institutions by providing a secure jump server for accessing core banking platforms and databases. IT managers benefit from workflow approvals and automated password management, ensuring compliance and boosting security posture. The platform's session recording and auditing features are crucial for sectors needing detailed activity documentation.
Veza Core Authorization Platform enhances data access visibility, centralizes control, and simplifies user permissions management. Its robust security through zero-trust principles, seamless integration, and automated compliance reporting boost organizational efficiency, productivity, and security, while streamlining workflows and minimizing vulnerabilities.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.