It requires customization, whereas out-of-the-box integrations do not. It takes a lot of coding and customization to integrate with so many different systems. It is not a networking device, it does not support the full proxy features for all PAM, or Privilege Access Management, access for any target systems. Other vendors have a full proxy feature, so we can't access the target system unless we go through the PAM server on the network. Because the IBM Security Secret Server lacks that feature, it will be proxified by the application rather than the network layer. It would be preferable if the full proxy was included in the IBM Security Secret Server. It's also not a hard-end appliance like BeyondTrust or One Identity. Now, rather than just the application, you must obtain the hardware, install the operating system, and manage the operating system. The application is then installed. Other vendors, as I have mentioned, such as BeyondTrust and One Identity, simply retrace the entire package, a hardened appliance. You do not have access to the operating system, you do not bear the burden of maintaining the operating system, you do not maintain the operating system's license, you do not install the SQL Server, and you do not install the web server. You don't do anything. You install and configure the entire package.