Try our new research platform with insights from 80,000+ expert users

IBM Security Secret Server vs One Identity Privileged Access Suite for Unix comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

IBM Security Secret Server
Ranking in Privileged Access Management (PAM)
18th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
7
Ranking in other categories
No ranking in other categories
One Identity Privileged Acc...
Ranking in Privileged Access Management (PAM)
33rd
Average Rating
7.6
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2025, in the Privileged Access Management (PAM) category, the mindshare of IBM Security Secret Server is 1.1%, down from 1.6% compared to the previous year. The mindshare of One Identity Privileged Access Suite for Unix is 0.4%, down from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

AsifIqbal - PeerSpot reviewer
Easy to set up and manage and has good scalability and stability, but its technical support team needs to be more aggressive in solving issues
What needs improvement in IBM Security Secret Server is support. The local partner provides good support, but IBM itself doesn't. Most of the time, the IBM support team does not aggressively resolve issues reported through chat or the IBM website. In the next version of IBM Security Secret Server, I want to see more lightweight recording, architecture, or infrastructure requirements. Currently, it's heavy, so I want it reduced to make adapting IBM Security Secret Server much more effortless.
Hicham Barnoussi - PeerSpot reviewer
A reliable solution with great password and session management
The setup process depends on the environment of the customer. It's not dependent on the solution. For customers with normal use cases and scenarios, it's a straightforward implementation, but for a customer with more than one environment, they may have BeyondTrust in one environment and Safeguard in another one. When they want to consolidate later, there may be complications. It depends on the devices and assets they would like to have under their PAM solution. The standard time for implementation is four weeks. I rate the setup an eight out of ten. There needs to be a dedicated resource for maintenance.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"One of the most valuable features is scalability, and how it allows you to scale it without affecting the underlying core components."
"As a PAM solution, Secret Server performs all the use cases in our environment."
"What I like best about IBM Security Secret Server is its single-access console. It's also easy to manage and fulfills the requirements with the least resistance."
"Stability-wise, I think it is a very good solution."
"The live recording is a very useful feature."
"Privileged Access Suite's best feature is it's straightforward to use."
"The most valuable features are session and password management."
"The most valuable feature of this solution is that it is easy to use."
 

Cons

"The newer interface is more difficult to use than the previous one, and consequently, new users might need more training."
"It would be preferable if the full proxy was included in the IBM Security Secret Server."
"The nonclustered index is working in an area with a problem that needs improvement."
"Secret Server should have the ability to discover privileged accounts in the servers, like the administrator or users, from SQL and Oracle without having to import a script."
"What needs improvement in IBM Security Secret Server is support. The local partner provides good support, but IBM itself doesn't. Most of the time, the IBM support team does not aggressively resolve issues reported through chat or the IBM website."
"Product management should be improved."
"Privileged Access Suite's interface could be better."
"There is a new trend of not having any privileged users or accounts."
 

Pricing and Cost Advice

"The price could be better. I think it's a good price for the on-premises environment and the high availability for enterprises the solution provides."
"I believe that we paid 35,000 or 40,000 US dollars for it."
"My rating for the IBM Security Secret Server pricing is seven out of ten. It could be cheaper."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
849,600 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
21%
Manufacturing Company
9%
Financial Services Firm
9%
Healthcare Company
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about IBM Security Secret Server?
Stability-wise, I think it is a very good solution.
What needs improvement with IBM Security Secret Server?
The nonclustered index is working in an area with a problem that needs improvement. In some cases, when they create some index in the tool, you may face some problems with the parallelism and some ...
What is your primary use case for IBM Security Secret Server?
I use the tool for dynamic services, integration services, and reporting services. I have years of working experience with the tool. I am a DBA and a support administrator for SQL Server, and also ...
Ask a question
Earn 20 points
 

Also Known As

IBM Secret Server, Secret Server, IBM Security Privileged Identity Manager
No data available
 

Overview

 

Sample Customers

Information Not Available
University of East Anglia, nForce Secure, dunnhumby
Find out what your peers are saying about IBM Security Secret Server vs. One Identity Privileged Access Suite for Unix and other solutions. Updated: April 2025.
849,600 professionals have used our research since 2012.