IBM Security Secret Server provides centralized management of privileged credentials, secure access, session recording, and replay. Its pricing model is unique, being based on user count rather than system connections, making it a flexible choice for organizations.


| Product | Mindshare (%) |
|---|---|
| IBM Security Secret Server | 1.3% |
| CyberArk Privileged Access Manager | 10.4% |
| Delinea Secret Server | 4.5% |
| Other | 83.8% |
| Type | Title | Date | |
|---|---|---|---|
| Category | Privileged Access Management (PAM) | May 9, 2026 | Download |
| Product | Reviews, tips, and advice from real users | May 9, 2026 | Download |
| Comparison | IBM Security Secret Server vs CyberArk Privileged Access Manager | May 9, 2026 | Download |
| Comparison | IBM Security Secret Server vs One Identity Safeguard | May 9, 2026 | Download |
| Comparison | IBM Security Secret Server vs Okta Platform | May 9, 2026 | Download |
| Title | Rating | Mindshare | Recommending | |
|---|---|---|---|---|
| CyberArk Privileged Access Manager | 4.3 | 10.4% | 95% | 230 interviewsAdd to research |
| Okta Platform | 4.3 | 3.3% | 96% | 109 interviewsAdd to research |
| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 1 |
| Large Enterprise | 2 |
| Company Size | Count |
|---|---|
| Small Business | 17 |
| Midsize Enterprise | 21 |
| Large Enterprise | 28 |
IBM Security Secret Server enhances cybersecurity by integrating with frameworks and offering features like monitoring, high availability, and adaptable reporting. It simplifies password management, automates changes, and ensures compliance with security protocols. The platform is valued for its ease of deployment and user-friendly interface, although it can improve in areas such as the GUI and integration process. Complex high availability and disaster recovery setups are noted challenges, along with nonclustered indexing issues affecting performance. Users desire improvements in local support and migration processes.
What are the key features of IBM Security Secret Server?Organizations across various industries implement IBM Security Secret Server for managing privileged access and securing critical systems. It serves financial institutions by providing a secure jump server for accessing core banking platforms and databases. IT managers benefit from workflow approvals and automated password management, ensuring compliance and boosting security posture. The platform's session recording and auditing features are crucial for sectors needing detailed activity documentation.
IBM Security Secret Server was previously known as IBM Secret Server, Secret Server, IBM Security Privileged Identity Manager.
| Author info | Rating | Review Summary |
|---|---|---|
| Chief Information Security Officer at a insurance company with 501-1,000 employees | 4.0 | I've used IBM Security Secret Server for over four years; it's effective for privileged user monitoring, password vaulting, and session recording. While it's scalable and integrates well, regional support and some integrations could be improved. |
| Chief Information Security Officer at a insurance company with 501-1,000 employees | 3.5 | I use IBM Security Secret Server primarily to monitor user activities and commands with a single-access console that is easy to manage. Although its support needs improvement, it integrates well with other IBM solutions, unlike BeyondTrust. |
| Head of IT Security at a financial services firm with 5,001-10,000 employees | 3.5 | I find IBM Security Secret Server user-friendly, scalable, and appreciate its user-based pricing. However, it requires customization, lacks full network proxy features, and IBM's technical support is poor. I rated it 7/10. |
| Cyber security consultant at a tech services company with 1,001-5,000 employees | 4.5 | I use IBM Security Secret Server for managing privileged accounts, session recording, and as a jump server. While effective, it needs better shared storage management and out-of-the-box privilege account discovery. It's easier to use than CyberArk due to its SQL database. |
| Senior Presales Specialist at a computer software company with 11-50 employees | 5.0 | I rate IBM Security Secret Server highly. Its live recording and approval workflows are excellent for server access management. It's stable, scalable, and easy to set up, despite the new interface potentially confusing older users. Overall, it's a very valuable solution. |
| IAM Consultant at a tech services company with 11-50 employees | 3.5 | I find IBM PIM excellent for centralized password management, greatly improving security. Setup was simple, and support is good. However, I note that HA/DR setup is complex, and cloud migration presents a painful challenge. |
| Security Consultant at a tech services company with 51-200 employees | 4.0 | This product offers valuable features like centralized administration and secure access, improving workflow and reducing time. While I haven't encountered stability issues, the GUI needs improvement, and customer service is decent. |
| Information Security Officer at a tech services company with 11-50 employees | 4.5 | I use IBM Security Secret Server for dynamic and integration services, finding high availability its most powerful feature. However, improvements are needed for the nonclustered index issue, which sometimes affects performance. Overall, it offers a decent return on investment. |