IBM Security Secret Server is now IBM Security Verify Privilege Vault!
Discover privileged, shared and service accounts
The first step in managing privileged accounts is finding accounts you don’t know exist. IBM Security Verify Privilege Vault’s Discovery quickly scans your network to find and take over unmanaged privileged, shared and service accounts.
24x7 access to IBM Support
IBM Support is enterprise-ready and available around the world to help keep your business running smoothly. Experience 24x7 access to help you achieve success with IBM Security Verify Privilege Vault.
Protect passwords with a secure, encrypted vault
Too often passwords are shared and stored in unsecure ways. Verify Privilege Vault stores privileged credentials in an encrypted, centralized vault, to ensure they are properly protected using advanced encryption standards.
Integrate with the IBM Security portfolio
Verify Privilege Vault integrates with many IBM Security solutions, including IBM Security Verify for single sign-on and multi-factor authentication and Identity Governance & Intelligence (IGI) for lifecycle management and governance.
Change passwords automatically when they expire
Privileged passwords should be changed regularly. Our built in password changing and expiration schedules ensure that critical passwords are changed automatically, without manual intervention.
Utilize IBM Security Expert Labs
IBM Security Expert Labs services are available for deployment and configuration for Verify Privilege Vault, partnering with your organization to enable you to get the greatest return from your IBM investment.
Monitor and record privileged sessions, log keystrokes
Maintain a full audit trail for your critical systems by recording remote sessions. We provide real-time session monitoring and control including proxying, session recording, and keystroke logging.
Utilize IBM Security PAM Professional Services
PAM technologies often require a comprehensive strategy to effectively reduce risk. IBM offers additional PAM services alongside IBM Secret Server to help protect your organization from privileged credential attacks.
Manage and interact with multiple remote sessions
Verify Privilege Vault's remote connection management capabilities provide a unified environment to manage and interact with multiple remote sessions for both Remote Desktop Protocol (RDP) and SSH.
Experience Unlimited Applications and SDK
PAM solutions built for DevOps replace risky practices. IBM Secret Server can make a direct connection to systems via API to tokenize hardcoded or externally stored credentials, removing reliance on less secure credential storage.
Monitor anomalous activity
Keep track of suspicious and irregular activity patterns with the Analytics module add-on.
Simple IIS and SQL stack for easy deployment
Appliance based PAM solutions are often not deployed. Verify Privilege Vault is built on a technology stack that is inherent to most Enterprises’ infrastructure and can be deployed in a quick timeframe, allowing for a faster ROI.
Shared credentials to privileged accounts, such as admin accounts, are often written down on post-it notes or shared spreadsheets. Yet these same credentials unlock organizations’ most critical assets.
With Verify Privilege Vault, organizations gain full control over which users have access to which privileged credentials, and how they can use those credentials.
With shared accounts, it can often be difficult to know exactly who is accessing your systems and data. If someone adds a backdoor account, makes an unauthorized change, or takes some other risky action, it can be difficult to trace who did what.
With Verify Privilege Vault, you can monitor and record privileged sessions so you know every keystroke a user takes for comprehensive audit and forensics.