Information Security Officer at a tech services company with 11-50 employees
Real User
Top 20
2023-06-01T13:44:00Z
Jun 1, 2023
The nonclustered index is working in an area with a problem that needs improvement. In some cases, when they create some index in the tool, you may face some problems with the parallelism and some problems with the CPU. Then, sometimes you need to remove some index.
Chief Information Security Officer at a financial services firm with 1,001-5,000 employees
Real User
Top 10
2023-01-17T10:49:54Z
Jan 17, 2023
What needs improvement in IBM Security Secret Server is support. The local partner provides good support, but IBM itself doesn't. Most of the time, the IBM support team does not aggressively resolve issues reported through chat or the IBM website. In the next version of IBM Security Secret Server, I want to see more lightweight recording, architecture, or infrastructure requirements. Currently, it's heavy, so I want it reduced to make adapting IBM Security Secret Server much more effortless.
Cyber security consultant at a tech services company with 1,001-5,000 employees
Consultant
Top 20
2022-11-08T18:50:00Z
Nov 8, 2022
There are improvements that IBM Security Secret Server could make with respect to shared storage. For example, if you have two servers with the same users and passwords, and a user changes their password in one server, it should automatically change in the other server. With IBM Security Secret Server, you need to write some scripts to handle this. It would be beneficial if the process was simplified and had a dependency where changes on both servers would automatically occur without having to write a script. I would like to see Secret Server have the ability to discover privileged accounts in the servers, like the administrator or users, from SQL and Oracle without having to import a script, making the solution more of an out-of-the-box solution.
Head of IT Security at a financial services firm with 5,001-10,000 employees
Real User
2022-09-01T15:02:40Z
Sep 1, 2022
It requires customization, whereas out-of-the-box integrations do not. It takes a lot of coding and customization to integrate with so many different systems. It is not a networking device, it does not support the full proxy features for all PAM, or Privilege Access Management, access for any target systems. Other vendors have a full proxy feature, so we can't access the target system unless we go through the PAM server on the network. Because the IBM Security Secret Server lacks that feature, it will be proxified by the application rather than the network layer. It would be preferable if the full proxy was included in the IBM Security Secret Server. It's also not a hard-end appliance like BeyondTrust or One Identity. Now, rather than just the application, you must obtain the hardware, install the operating system, and manage the operating system. The application is then installed. Other vendors, as I have mentioned, such as BeyondTrust and One Identity, simply retrace the entire package, a hardened appliance. You do not have access to the operating system, you do not bear the burden of maintaining the operating system, you do not maintain the operating system's license, you do not install the SQL Server, and you do not install the web server. You don't do anything. You install and configure the entire package.
Senior Presales Specialist at a computer software company with 11-50 employees
Real User
2022-01-30T06:33:57Z
Jan 30, 2022
I Think Vendor always working on that as every period of time not so long a new release version is available which is mean research and development team always working and alerted for any request or change. The newer interface is maybe confusing old customer that using previous one from their point of views, I think they will need little pass of time to be familiar with. But from my point of view, it more organized and allows arranging some lists in more than one mode".
IBM Security Secret Server protects privileged accounts from hackers and insider threats, helps ensure compliance with evolving regulations, and allows authorized employees to seamlessly gain access to the tools and information they need to drive productivity. Easily detect, manage and audit privileged accounts, and control which applications are permitted to run on endpoints and servers to prevent malicious applications from penetrating the environment. IBM Security Secret Server is fast to...
The nonclustered index is working in an area with a problem that needs improvement. In some cases, when they create some index in the tool, you may face some problems with the parallelism and some problems with the CPU. Then, sometimes you need to remove some index.
What needs improvement in IBM Security Secret Server is support. The local partner provides good support, but IBM itself doesn't. Most of the time, the IBM support team does not aggressively resolve issues reported through chat or the IBM website. In the next version of IBM Security Secret Server, I want to see more lightweight recording, architecture, or infrastructure requirements. Currently, it's heavy, so I want it reduced to make adapting IBM Security Secret Server much more effortless.
There are improvements that IBM Security Secret Server could make with respect to shared storage. For example, if you have two servers with the same users and passwords, and a user changes their password in one server, it should automatically change in the other server. With IBM Security Secret Server, you need to write some scripts to handle this. It would be beneficial if the process was simplified and had a dependency where changes on both servers would automatically occur without having to write a script. I would like to see Secret Server have the ability to discover privileged accounts in the servers, like the administrator or users, from SQL and Oracle without having to import a script, making the solution more of an out-of-the-box solution.
It requires customization, whereas out-of-the-box integrations do not. It takes a lot of coding and customization to integrate with so many different systems. It is not a networking device, it does not support the full proxy features for all PAM, or Privilege Access Management, access for any target systems. Other vendors have a full proxy feature, so we can't access the target system unless we go through the PAM server on the network. Because the IBM Security Secret Server lacks that feature, it will be proxified by the application rather than the network layer. It would be preferable if the full proxy was included in the IBM Security Secret Server. It's also not a hard-end appliance like BeyondTrust or One Identity. Now, rather than just the application, you must obtain the hardware, install the operating system, and manage the operating system. The application is then installed. Other vendors, as I have mentioned, such as BeyondTrust and One Identity, simply retrace the entire package, a hardened appliance. You do not have access to the operating system, you do not bear the burden of maintaining the operating system, you do not maintain the operating system's license, you do not install the SQL Server, and you do not install the web server. You don't do anything. You install and configure the entire package.
I Think Vendor always working on that as every period of time not so long a new release version is available which is mean research and development team always working and alerted for any request or change. The newer interface is maybe confusing old customer that using previous one from their point of views, I think they will need little pass of time to be familiar with. But from my point of view, it more organized and allows arranging some lists in more than one mode".