Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs IBM Security Secret Server comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
IBM Security Secret Server
Ranking in Privileged Access Management (PAM)
28th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
7
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2026, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Privileged Access Manager is 11.6%, down from 20.0% compared to the previous year. The mindshare of IBM Security Secret Server is 1.2%, down from 1.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager11.6%
IBM Security Secret Server1.2%
Other87.2%
Privileged Access Management (PAM)
 

Featured Reviews

SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.
AsifIqbal - PeerSpot reviewer
Chief Information Security Officer at a financial services firm with 1,001-5,000 employees
Easy to set up and manage and has good scalability and stability, but its technical support team needs to be more aggressive in solving issues
What needs improvement in IBM Security Secret Server is support. The local partner provides good support, but IBM itself doesn't. Most of the time, the IBM support team does not aggressively resolve issues reported through chat or the IBM website. In the next version of IBM Security Secret Server, I want to see more lightweight recording, architecture, or infrastructure requirements. Currently, it's heavy, so I want it reduced to make adapting IBM Security Secret Server much more effortless.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Password rotation, session recording & isolation and on-demand privileges."
"CyberArk Privileged Access Manager has been helpful in managing over 125,000 privileged accounts in a single environment for our client, and we have multiple CyberArk environments for different clients with different numbers of accounts."
"Password Vault's policy configuration is very good - when you receive an attack, you can segment the structure of the project in order to isolate parts or users."
"Enterprise Password Vault, Privilege Session Manager, and Application Identity Management have been very useful for our client environment."
"It has helped from an auditing perspective identify who has access to privileged accounts."
"I would recommend implementing CyberArk Privileged Access Manager as it is the best so far."
"Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control."
"The most valuable feature of CyberArk Privileged Access Manager is privileged threat analytics."
"As a PAM solution, Secret Server performs all the use cases in our environment."
"What I like best about IBM Security Secret Server is its single-access console. It's also easy to manage and fulfills the requirements with the least resistance."
"Stability-wise, I think it is a very good solution."
"One of the most valuable features is scalability, and how it allows you to scale it without affecting the underlying core components."
"The live recording is a very useful feature."
 

Cons

"It's expensive and you're not getting anything new. It's just a control, but in terms of risk, you are covering a big impact on the company."
"Their post-sale support area requires a big improvement. Customers cannot automate tickets directly with CyberArk. They have to come through the distributor or bring in partners who have access to the support portal. Basically, the support for post-sales implementation is there, but the role of CyberArk is very minimal. Customers have to rely on partners, which sometimes creates issues. Some of the vendors help you during the implementation process, but the CyberArk support team does not do that. They have 24/7 support for our region, but they help only if there is an emergency or there is a problem with their system. If the password vault is down or the system is down, they provide immediate attention. For almost everything else, they take more time to respond. They give low priority to service-related or migration-related questions."
"For users to access a system via CyberArk Privileged Session Manager, a universal connector needs to be coded in a language called AutoIT and its support for web browsers is so-so. Other products like Centrify have browser plugins that can help automate the process when using their products."
"I would like to see is the policy export and import. When we expend, we do not want to just hand do a policy."
"If CyberArk wants people to pay for cloud services, they need to make the cloud services much more real-time."
"There is a bit of a learning curve, but it's a pretty complex solution."
"The license is expensive."
"It is web-based, but other competitors have apps. We need to get there. It is just smoother to have an app. You don't have all the bugs from having a browser, and people like them better, since you can get to them via mobile."
"The newer interface is more difficult to use than the previous one, and consequently, new users might need more training."
"It would be preferable if the full proxy was included in the IBM Security Secret Server."
"What needs improvement in IBM Security Secret Server is support. The local partner provides good support, but IBM itself doesn't. Most of the time, the IBM support team does not aggressively resolve issues reported through chat or the IBM website."
"The nonclustered index is working in an area with a problem that needs improvement."
"Secret Server should have the ability to discover privileged accounts in the servers, like the administrator or users, from SQL and Oracle without having to import a script."
 

Pricing and Cost Advice

"The solution is cost-effective for the features."
"I have heard from my leaders that CyberArk is costlier in terms of licensing. The support and maintenance are also costly. We use their premium support, but for the price we pay, we do not get the value."
"Generally, I don't get involved in the licensing or the purchasing side of it, but I do know that the licenses are expensive."
"The pricing for CyberArk is on the higher side compared to other Privileged Access Management products. Something should be done regarding enterprise licensing for long-standing customers."
"CyberArk is one of the best PAM solutions and one of the most expensive, but it works better than the others, so the pricing is fair."
"Overall, its pricing is really good. The main difference from all the other vendors is that they have one package that covers all the functionality and modules of the basic PAM, except the add-on modules like adware and server protection. It also doesn't include the licenses for domain controller protection or maybe an API call-related feature. For the basic privileged access management, the bundle pricing is really good, but when it comes to an agent-based solution for advanced cyber protection or application identity managers, it is expensive. Services are also very expensive if you hire the services team from CyberArk, but these guys are really good. For a couple of large banking projects, we had an experience with them. The banks wanted to have things quickly and efficiently, so we had to hire them. If we take four weeks, these guys can do everything on a weekend. They charge quite a big sum of money, but they know the system well."
"Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect."
"CyberArk is good at what they do, and the price reflects that. You have to pay the price for the same."
"The price could be better. I think it's a good price for the on-premises environment and the high availability for enterprises the solution provides."
"I believe that we paid 35,000 or 40,000 US dollars for it."
"My rating for the IBM Security Secret Server pricing is seven out of ten. It could be cheaper."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
881,036 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
Computer Software Company
12%
Performing Arts
12%
Insurance Company
10%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
By reviewers
Company SizeCount
Small Business4
Large Enterprise3
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
Ask a question
Earn 20 points
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
IBM Secret Server, Secret Server, IBM Security Privileged Identity Manager
 

Overview

 

Sample Customers

Rockwell Automation
Information Not Available
Find out what your peers are saying about CyberArk Privileged Access Manager vs. IBM Security Secret Server and other solutions. Updated: December 2025.
881,036 professionals have used our research since 2012.