Information Security Officer at a tech services company with 11-50 employees
Real User
Top 20
2023-06-01T13:44:00Z
Jun 1, 2023
I use the tool for dynamic services, integration services, and reporting services. I have years of working experience with the tool. I am a DBA and a support administrator for SQL Server, and also all my projects that have reporting tools also work with an analytics service. One part of the solution was used for support and administration, and another part was used to develop projects.
Chief Information Security Officer at a financial services firm with 1,001-5,000 employees
Real User
Top 5
2023-01-17T10:49:54Z
Jan 17, 2023
We're mainly using IBM Security Secret Server to monitor user activities during and after office hours and what commands users are processing. We have other use cases for IBM Security Secret Server, but those are the most frequent use cases.
Cyber security consultant at a tech services company with 1,001-5,000 employees
Consultant
2022-11-08T18:50:00Z
Nov 8, 2022
IBM Security Secret Server is a PAM solution with five main functionalities that we use, including: * Save passwords and encrypt them so that no one can access any privileged account or server * Record all of our sessions for all of our servers that are critical for our company * Mix or white list some of the common applications * Make workflows to access any server and apply any approvals * Use as a jump server to access any applications or main servers.
Head of IT Security at a financial services firm with 5,001-10,000 employees
Real User
2022-09-01T15:02:40Z
Sep 1, 2022
I am an end-user. I primarily worked in two roles. I was the integrator; I installed the product and then went to the customer side to work with the product. IBM Security Secret Server is used for the entire IT department administrators, all of whom connect via the solution, the IBM Secret Server, in order to access the servers or the target systems, whether they are Windows servers, Linux servers, databases, the core banking system, and so on.
Senior Presales Specialist at a computer software company with 11-50 employees
Real User
2022-01-30T06:33:57Z
Jan 30, 2022
This is one of the products that we provide to our customers. Many of them work in the banking and industrial sector and We have a POC in place with one of our customers right now. The last use case that we worked on was for a customer in the banking sector. They wanted to create a workflow related to server access. The admin teams and IT managers wanted to have details about who was logging into the servers and what action done within session. They also used the advanced recording features to keep track of activities when vendors were logged in remotely. The workflow option also handles approval for system admins from multi-IT managers. For example, when a system administrator wants to log in from home using the VPN, a request is sent by email with reason why system admin login for to the IT managers, they can review the request, for example using a mobile device, and send an approval or denial for access. The Remote password changer which Automates password changing, ensure password complexity according to compliance and regulation, and rotate credentials. Discover Privileges - Identify all service, application, administrator, and root accounts and protect against backdoor account. Good auditing, reporting, and alerts.
Learn what your peers think about IBM Security Secret Server. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
IBM Security Secret Server protects privileged accounts from hackers and insider threats, helps ensure compliance with evolving regulations, and allows authorized employees to seamlessly gain access to the tools and information they need to drive productivity. Easily detect, manage and audit privileged accounts, and control which applications are permitted to run on endpoints and servers to prevent malicious applications from penetrating the environment. IBM Security Secret Server is fast to...
I use the tool for dynamic services, integration services, and reporting services. I have years of working experience with the tool. I am a DBA and a support administrator for SQL Server, and also all my projects that have reporting tools also work with an analytics service. One part of the solution was used for support and administration, and another part was used to develop projects.
We're mainly using IBM Security Secret Server to monitor user activities during and after office hours and what commands users are processing. We have other use cases for IBM Security Secret Server, but those are the most frequent use cases.
IBM Security Secret Server is a PAM solution with five main functionalities that we use, including: * Save passwords and encrypt them so that no one can access any privileged account or server * Record all of our sessions for all of our servers that are critical for our company * Mix or white list some of the common applications * Make workflows to access any server and apply any approvals * Use as a jump server to access any applications or main servers.
I am an end-user. I primarily worked in two roles. I was the integrator; I installed the product and then went to the customer side to work with the product. IBM Security Secret Server is used for the entire IT department administrators, all of whom connect via the solution, the IBM Secret Server, in order to access the servers or the target systems, whether they are Windows servers, Linux servers, databases, the core banking system, and so on.
This is one of the products that we provide to our customers. Many of them work in the banking and industrial sector and We have a POC in place with one of our customers right now. The last use case that we worked on was for a customer in the banking sector. They wanted to create a workflow related to server access. The admin teams and IT managers wanted to have details about who was logging into the servers and what action done within session. They also used the advanced recording features to keep track of activities when vendors were logged in remotely. The workflow option also handles approval for system admins from multi-IT managers. For example, when a system administrator wants to log in from home using the VPN, a request is sent by email with reason why system admin login for to the IT managers, they can review the request, for example using a mobile device, and send an approval or denial for access. The Remote password changer which Automates password changing, ensure password complexity according to compliance and regulation, and rotate credentials. Discover Privileges - Identify all service, application, administrator, and root accounts and protect against backdoor account. Good auditing, reporting, and alerts.