Information Security Officer at a tech services company with 11-50 employees
Real User
Top 20
2023-06-01T13:44:00Z
Jun 1, 2023
If someone has an abundance of data, Secret Servers work on that because, in most cases, the people that work on Secret Servers think of one record versus one record and compare that part. When you start working with people, you verify that when you start thinking in both business and chunks of data while having no knowledge about it, you can opt for Secret Servers. Overall, I rate the solution a nine out of ten.
Chief Information Security Officer at a financial services firm with 1,001-5,000 employees
Real User
Top 10
2023-01-17T10:49:54Z
Jan 17, 2023
My company continues to use IBM products, one of which is the PAM solution, IBM Security Secret Server. I understand how IBM Security Secret Server works because I use it, but I'm not the administrator, and I'm not the one who gives access to privileged users of the solution. Forty-five people use the solution within the company. IBM Security Secret Server is a seven out of ten compared to other solutions. My company is a user of the IBM Security Secret Server.
Cyber security consultant at a tech services company with 1,001-5,000 employees
Consultant
Top 20
2022-11-08T18:50:00Z
Nov 8, 2022
I recommend to anyone that is looking to implement Security Secret Server into their organization that they understand the environment, including how many servers they have and the tools they are going to use to implement the solution. This will help them design the environment correctly. Overall, I would rate the solution a nine out of ten.
Head of IT Security at a financial services firm with 5,001-10,000 employees
Real User
2022-09-01T15:02:40Z
Sep 1, 2022
I would recommend it to others, but the most important thing I would recommend is that the vendor provide professional service. And this is something that applies to all PAM solutions. Purchasing PAM is simple, but it is extremely difficult to implement it in an efficient manner in order to get the most value out of it, which is why you should seek professional assistance from the vendor. I would rate IBM Security Secret Server a seven out of ten.
IBM Security Secret Server protects privileged accounts from hackers and insider threats, helps ensure compliance with evolving regulations, and allows authorized employees to seamlessly gain access to the tools and information they need to drive productivity. Easily detect, manage and audit privileged accounts, and control which applications are permitted to run on endpoints and servers to prevent malicious applications from penetrating the environment. IBM Security Secret Server is fast to...
If someone has an abundance of data, Secret Servers work on that because, in most cases, the people that work on Secret Servers think of one record versus one record and compare that part. When you start working with people, you verify that when you start thinking in both business and chunks of data while having no knowledge about it, you can opt for Secret Servers. Overall, I rate the solution a nine out of ten.
My company continues to use IBM products, one of which is the PAM solution, IBM Security Secret Server. I understand how IBM Security Secret Server works because I use it, but I'm not the administrator, and I'm not the one who gives access to privileged users of the solution. Forty-five people use the solution within the company. IBM Security Secret Server is a seven out of ten compared to other solutions. My company is a user of the IBM Security Secret Server.
I recommend to anyone that is looking to implement Security Secret Server into their organization that they understand the environment, including how many servers they have and the tools they are going to use to implement the solution. This will help them design the environment correctly. Overall, I would rate the solution a nine out of ten.
I would recommend it to others, but the most important thing I would recommend is that the vendor provide professional service. And this is something that applies to all PAM solutions. Purchasing PAM is simple, but it is extremely difficult to implement it in an efficient manner in order to get the most value out of it, which is why you should seek professional assistance from the vendor. I would rate IBM Security Secret Server a seven out of ten.
I would rate this solution a ten out of ten.