

Okta Platform and IBM Security Secret Server both compete in the identity and access management space, with Okta offering more comprehensive integration capabilities and IBM focusing on high-security credential management. Okta seems to have the upper hand in seamless integration and deployment flexibility, while IBM stands out in stringent credential management.
Features: Okta Platform features identity access management with Universal Directory and profile mapping, offering MFA and SSO for easy navigation across applications. It excels in workflow automation and integration, improving security and operational efficiency by reducing manual intervention. IBM Security Secret Server emphasizes password management and session monitoring, providing meticulous oversight for privileged accounts. It ensures stable management of credentials and is suitable for high-security environments.
Room for Improvement: Okta users highlight issues with downtime, certificate rotations, and group rule mappings. Improved push notifications and an enhanced UI are desired. IBM could benefit from easier support access and better system integration. Users request more straightforward solutions and infrastructure improvements for deployment and support.
Ease of Deployment and Customer Service: Okta offers a flexible deployment model favoring cloud and hybrid environments with generally positive technical deployment and customer support, though some mention slower response times. IBM Security Secret Server, primarily deployed on-premises, requires more complex setup but provides a stable environment. Support services are reliable but could be constrained by location.
Pricing and ROI: Okta Platform is considered cost-efficient for small to mid-sized businesses, with pricing aligned with user numbers and service tiers. Its ROI is valued due to increased efficiency and reduced risk. IBM Security Secret Server has mid-to-upper range pricing, fitting larger enterprises with extensive on-premises needs. Both platforms offer substantial ROI, but Okta's cost-effectiveness is noted for its broad identity management services.
| Product | Mindshare (%) |
|---|---|
| Okta Platform | 3.3% |
| IBM Security Secret Server | 1.2% |
| Other | 95.5% |

| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 2 |
| Large Enterprise | 2 |
| Company Size | Count |
|---|---|
| Small Business | 44 |
| Midsize Enterprise | 23 |
| Large Enterprise | 50 |
IBM Security Secret Server protects privileged accounts from hackers and insider threats, helps ensure compliance with evolving regulations, and allows authorized employees to seamlessly gain access to the tools and information they need to drive productivity. Easily detect, manage and audit privileged accounts, and control which applications are permitted to run on endpoints and servers to prevent malicious applications from penetrating the environment. IBM Security Secret Server is fast to deploy, easy to use and scalable for the enterprise.
Okta Platform provides comprehensive identity and access management, featuring Active Directory Sync, user management, and app auto-provisioning. It ensures security through single sign-on and adaptive multi-factor authentication.
Okta Platform offers advanced integration capabilities, allowing seamless connection with in-house and cloud applications. Security features are robust, incorporating multi-factor authentication and SSO to prevent unauthorized access. Users benefit from its ease of use and the ability to integrate and manage numerous applications effectively. While generally praised, users note areas for improvement, such as high costs and complex setups. Better integrations with on-premises systems and third-party tools are desired along with enhanced error logging and reporting features.
What are Okta's key features?Companies across industries implement Okta to secure user authentication and streamline onboarding processes. It supports access management for both on-premises and cloud applications, synchronizing directories and facilitating SaaS services. Organizations benefit from reduced credential management complexity and improved IT infrastructure compliance.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.