IBM Security Secret Server is now IBM Security Verify Privilege Vault!

Feature spotlights

Discover privileged, shared and service accounts

The first step in managing privileged accounts is finding accounts you don’t know exist. IBM Security Verify Privilege Vault’s Discovery quickly scans your network to find and take over unmanaged privileged, shared and service accounts.

24x7 access to IBM Support

IBM Support is enterprise-ready and available around the world to help keep your business running smoothly. Experience 24x7 access to help you achieve success with IBM Security Verify Privilege Vault.

Protect passwords with a secure, encrypted vault

Too often passwords are shared and stored in unsecure ways. Verify Privilege Vault stores privileged credentials in an encrypted, centralized vault, to ensure they are properly protected using advanced encryption standards.

Integrate with the IBM Security portfolio

Verify Privilege Vault integrates with many IBM Security solutions, including IBM Security Verify for single sign-on and multi-factor authentication and Identity Governance & Intelligence (IGI) for lifecycle management and governance.

Change passwords automatically when they expire

Privileged passwords should be changed regularly. Our built in password changing and expiration schedules ensure that critical passwords are changed automatically, without manual intervention.

Utilize IBM Security Expert Labs

IBM Security Expert Labs services are available for deployment and configuration for Verify Privilege Vault, partnering with your organization to enable you to get the greatest return from your IBM investment.

Monitor and record privileged sessions, log keystrokes

Maintain a full audit trail for your critical systems by recording remote sessions. We provide real-time session monitoring and control including proxying, session recording, and keystroke logging.

Utilize IBM Security PAM Professional Services

PAM technologies often require a comprehensive strategy to effectively reduce risk. IBM offers additional PAM services alongside IBM Secret Server to help protect your organization from privileged credential attacks.

Manage and interact with multiple remote sessions

Verify Privilege Vault's remote connection management capabilities provide a unified environment to manage and interact with multiple remote sessions for both Remote Desktop Protocol (RDP) and SSH.

Experience Unlimited Applications and SDK

PAM solutions built for DevOps replace risky practices. IBM Secret Server can make a direct connection to systems via API to tokenize hardcoded or externally stored credentials, removing reliance on less secure credential storage.

Monitor anomalous activity

Keep track of suspicious and irregular activity patterns with the Analytics module add-on.

Simple IIS and SQL stack for easy deployment

Appliance based PAM solutions are often not deployed. Verify Privilege Vault is built on a technology stack that is inherent to most Enterprises’ infrastructure and can be deployed in a quick timeframe, allowing for a faster ROI.

Talk to an expert and learn how Verify Privilege Vault can address your use case.

Talk to an expert and learn how Verify Privilege Vault can address your use case. Schedule a Consult

How customers use it

  • Discover Your Privileged Accounts


    Often, organizations don’t know what privileged accounts exist, or where they’re stored, so they can’t secure them against hackers or insider threats.


    With Verify Privilege Vault, organizations can use Discovery to automatically find privileged accounts and bring them into the vault, to ensure their privileged accounts are secure and compliant.

  • Secure & Manage Your Privileged Accounts


    Shared credentials to privileged accounts, such as admin accounts, are often written down on post-it notes or shared spreadsheets. Yet these same credentials unlock organizations’ most critical assets.


    With Verify Privilege Vault, organizations gain full control over which users have access to which privileged credentials, and how they can use those credentials.

  • Monitor Your Privileged Accounts


    With shared accounts, it can often be difficult to know exactly who is accessing your systems and data. If someone adds a backdoor account, makes an unauthorized change, or takes some other risky action, it can be difficult to trace who did what.


    With Verify Privilege Vault, you can monitor and record privileged sessions so you know every keystroke a user takes for comprehensive audit and forensics.

Technical details

System requirements

IBM Security Verify Privilege Vault 10.9

You may also be interested in

IBM Security Verify Privilege Manager

Endpoint privilege management and application control.

IBM Security Verify Governance

Full enterprise-level identity governance and administration.

IBM Security Verify for Workforce IAM

Provides identity-as-a-service for every user, including SSO, risk-based MFA and adaptive access, user lifecycle management, and identity analytics.

Next Steps

Try it now