![]() | Bohumil Glac Analytické a bezpečnostní nástroje IBM at ITS |
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The most valuable feature is usability, as it is quite user-friendly."
"It offers the possibility of secure administration of hardware devices, as well as Linux systems administration from a Windows environment."
"Ease of use because of its monolithic software."
"The most valuable feature is session monitoring."
"The user interface is quite good. It's very straightforward."
"I find it really easy and computer confident, and the experience with the product is really good. Additionally, customizations are easy."
"The GUI interface is well-designed and user-friendly."
"What I like best about this product is the interface."
"I have found the password management and the secret management features to be the most valuable. Our customers find its ease of integration and the use of power shells really attractive."
"It would be good if the AWS Secrets Manager were more customizable."
"I would like to see the shadowing of ongoing terminal sessions (Remote Desktop Mirroring)."
"Documentation could be improved if they were to include more about connectors. There is not enough documentation."
"Having more detailed reporting would improve this solution."
"There could be tweaks here and there. For example, instead of going to one main function to do this and another main function to do that, the solution could remap the user interface so that a person only has to go through one function. The way that function branches off should make a bit more sense."
"There are some things that I know are really important to include like A/B version features which are available in Windows. I would say that they should be included in the road map."
"This product is excellent in every way except minor details in handling extremely large environments."
"I think that the main interface should integrate better with non-standard applications and clients, to connect with other systems."
"We always ask for partner enablement, which is more like a soft requirement rather than a product requirement. It would be great if they can provide us deeper knowledge of their products for integration."
"The price of this solution is good."
"Pricing is comparable to competing products."
"The pricing is standard in this business and we have no complaints about it."
"Its price is okay. We don't compete on pricing. We seldom use price to win over our competitors. We prefer it this way because if we can sustain the price, we make more margin as well. We don't want the price to go down to the bottom where despite the win, there's no margin at all."
"Secret Server is expensive when compared to the cost to some alternatives."
"There are different plans and additional licensing costs that can be instituted for add-ons."
AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.
Secret Server is a fully-featured Privileged Access Management (PAM) solution available both on premise and in the cloud. It empowers security and IT ops teams to secure and manage all types of privileged accounts and offers the fastest time to value of any PAM solution.
AWS Secrets Manager is ranked 10th in Enterprise Password Managers with 1 review while Thycotic Secret Server is ranked 2nd in Enterprise Password Managers with 9 reviews. AWS Secrets Manager is rated 8.0, while Thycotic Secret Server is rated 8.2. The top reviewer of AWS Secrets Manager writes "User-friendly and stable with good technical support ". On the other hand, the top reviewer of Thycotic Secret Server writes "Excellent access management that can serve very large networks". AWS Secrets Manager is most compared with Microsoft Azure Key Vault, HashiCorp Vault, CyberArk Enterprise Password Vault, LastPass Enterprise and Dashlane, whereas Thycotic Secret Server is most compared with CyberArk Privileged Access Security, HashiCorp Vault, Microsoft Azure Key Vault, IBM Security Secret Server and BeyondTrust Endpoint Privilege Management.
See our list of best Enterprise Password Managers vendors.
We monitor all Enterprise Password Managers reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.