Fudo PAM vs IBM Security Secret Server comparison

Cancel
You must select at least 2 products to compare!
Fudo Security Logo
1,091 views|638 comparisons
100% willing to recommend
IBM Logo
816 views|544 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Fudo PAM and IBM Security Secret Server based on real PeerSpot user reviews.

Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Fudo PAM vs. IBM Security Secret Server Report (Updated: March 2024).
768,578 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Session recording and password management are the two main aspects.""We are convinced that Fudo PAM is better than competing products like WALLIX.""The main benefit of the solution is that it's very easy to set up. It only takes a couple of hours to install everything.""Fudo PAM was the most flexible and intuitive interface out of all of the products in the PAM sector.""it's perfect to control and administer computers in our company."

More Fudo PAM Pros →

"As a PAM solution, Secret Server performs all the use cases in our environment.""What I like best about IBM Security Secret Server is its single-access console. It's also easy to manage and fulfills the requirements with the least resistance.""One of the most valuable features is scalability, and how it allows you to scale it without affecting the underlying core components.""Stability-wise, I think it is a very good solution.""The live recording is a very useful feature."

More IBM Security Secret Server Pros →

Cons
"I would like to see better server management. You have to know exactly what you're looking for to get the right server.""Fudo PAM’s scalability is not very strong.""The stability is not very good.""Professional training and certification would be great.""The configuration is difficult."

More Fudo PAM Cons →

"The newer interface is more difficult to use than the previous one, and consequently, new users might need more training.""What needs improvement in IBM Security Secret Server is support. The local partner provides good support, but IBM itself doesn't. Most of the time, the IBM support team does not aggressively resolve issues reported through chat or the IBM website.""It would be preferable if the full proxy was included in the IBM Security Secret Server.""The nonclustered index is working in an area with a problem that needs improvement.""Secret Server should have the ability to discover privileged accounts in the servers, like the administrator or users, from SQL and Oracle without having to import a script."

More IBM Security Secret Server Cons →

Pricing and Cost Advice
  • "The pricing is great. We've been given discounts that make it cheaper than using any other solution."
  • More Fudo PAM Pricing and Cost Advice →

  • "I believe that we paid 35,000 or 40,000 US dollars for it."
  • "My rating for the IBM Security Secret Server pricing is seven out of ten. It could be cheaper."
  • "The price could be better. I think it's a good price for the on-premises environment and the high availability for enterprises the solution provides."
  • More IBM Security Secret Server Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    768,578 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Session recording and password management are the two main aspects.
    Top Answer:There are some areas for improvement in the Fudo PAM cake that we want to improve in terms of scaling. Scaling is an optional feature because we closed some big projects with enterprise customers from… more »
    Top Answer:The main use case is for protecting privileged user access, such as securing remote access services. Another important use case is when we work with third-party users and need to provide password… more »
    Top Answer:Stability-wise, I think it is a very good solution.
    Top Answer:The nonclustered index is working in an area with a problem that needs improvement. In some cases, when they create some index in the tool, you may face some problems with the parallelism and some… more »
    Top Answer:I use the tool for dynamic services, integration services, and reporting services. I have years of working experience with the tool. I am a DBA and a support administrator for SQL Server, and also all… more »
    Ranking
    Views
    1,091
    Comparisons
    638
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Views
    816
    Comparisons
    544
    Reviews
    4
    Average Words per Review
    686
    Rating
    8.0
    Comparisons
    Also Known As
    Fudo Privileged Access Management
    IBM Secret Server, Secret Server, IBM Security Privileged Identity Manager
    Learn More
    Overview

    We are the leading vendor of innovative IT security solutions. We focus on privileged access management and privileged session monitoring, combined under the Fudo Security brand. The Fudo product line merges innovation and an intuitive user experience with strong security features. These are the hallmarks of the future designs of the company.

    IBM Security Secret Server protects privileged accounts from hackers and insider threats, helps ensure compliance with evolving regulations, and allows authorized employees to seamlessly gain access to the tools and information they need to drive productivity. Easily detect, manage and audit privileged accounts, and control which applications are permitted to run on endpoints and servers to prevent malicious applications from penetrating the environment. IBM Security Secret Server is fast to deploy, easy to use and scalable for the enterprise.

    Sample Customers
    KFC, BP, Santander, Burger King, ING, Starbucks, Yahoo, DHL
    Information Not Available
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm20%
    Computer Software Company15%
    Media Company8%
    Comms Service Provider7%
    VISITORS READING REVIEWS
    Computer Software Company16%
    Financial Services Firm9%
    Insurance Company7%
    Healthcare Company7%
    Company Size
    VISITORS READING REVIEWS
    Small Business31%
    Midsize Enterprise18%
    Large Enterprise51%
    REVIEWERS
    Small Business57%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business24%
    Midsize Enterprise12%
    Large Enterprise65%
    Buyer's Guide
    Fudo PAM vs. IBM Security Secret Server
    March 2024
    Find out what your peers are saying about Fudo PAM vs. IBM Security Secret Server and other solutions. Updated: March 2024.
    768,578 professionals have used our research since 2012.

    Fudo PAM is ranked 21st in Privileged Access Management (PAM) with 5 reviews while IBM Security Secret Server is ranked 13th in Privileged Access Management (PAM) with 7 reviews. Fudo PAM is rated 8.0, while IBM Security Secret Server is rated 8.2. The top reviewer of Fudo PAM writes "Easy to install but needs to provide better server management and organization". On the other hand, the top reviewer of IBM Security Secret Server writes "User-friendly, granular features, and is simple to implement, but the technical support could be improved". Fudo PAM is most compared with WALLIX Bastion, CyberArk Privileged Access Manager, Delinea Secret Server, One Identity Safeguard and ManageEngine PAM360, whereas IBM Security Secret Server is most compared with Delinea Secret Server, CyberArk Privileged Access Manager and Delinea Privileged Access Service. See our Fudo PAM vs. IBM Security Secret Server report.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.