We primarily use this solution to utilize local IDs and fix up specific endpoints. In addition, we use the solution to identify the people using our service accounts and how they use them.
IT Security Risk and Compliance Manager at inspiro
A great solution for identification, utilizing local IDs and tracking inventory
Pros and Cons
- "The most valuable feature is the author's discovery of assets."
- "There needs to be a notification when a password is near expiration."
What is our primary use case?
What is most valuable?
The most valuable feature is the author's discovery of assets because it helps keep track of inventory. Currently, our inventory is managed manually, so the author discovery feature is beneficial.
What needs improvement?
There needs to be a notification when a password is near expiration because we have experienced multiple lockouts due to expired passwords.
For how long have I used the solution?
We purchased the most recent version of Delinea Privileged Access Service recently and began using it in 2022. It is deployed on-premises.
Buyer's Guide
Delinea Privileged Access Service
November 2024
Learn what your peers think about Delinea Privileged Access Service. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
814,649 professionals have used our research since 2012.
What do I think about the stability of the solution?
It is a stable solution.
What do I think about the scalability of the solution?
We believe the solution is scalable to an extent. However, its scalability depends on the server size.
How are customer service and support?
We have had no problems with the support team. They get back to us within the agreed timeframe.
How was the initial setup?
We had challenges during setup because it was deployed on-premises, and our system needed to adjust to the compatibility. Additionally, we were not expecting the storage to take up a lot of space at the onset, but we have made the necessary adjustments.
What about the implementation team?
We implemented the tool through our vendor and in-house engineers.
What other advice do I have?
I rate this solution an eight out of ten. My advice to others who are looking to start using this tool is to select the cloud version.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Technical Engineer at Footprint Africa Business Solutions
Has good privileged account management, multifactor authentication and auditing features
Pros and Cons
- "The privileged account management feature is what I like most."
- "The initial setup is a bit complex."
What is our primary use case?
One of our customers uses this solution in conjuction with Idaptive. They use it on-premises and in the cloud for Privileged Access Management, Identity Management and especially for the powerful audit functionalities.
How has it helped my organization?
There is more control over shared administrative accounts. Accountability is a big part of compliance requirements and the attestation reports are very useful when preparing for external audits.
What is most valuable?
Being able to access servers, web applications, network devices, etc. securely from anywhere, with MFA. Workflows can be added for extra security. There are powerful auditing & reporting features available, and Privileged Account Management is made easy. And they have excellent support.
What needs improvement?
The product does provide alerting, but it might be useful if the process of setting up the alerts can be simplified.
However, they provide a feedback platform where users can request new features for future releases. We have requested a feature update and it will be included at some point.
For how long have I used the solution?
We have been using Centrify Zero Trust Privilege for two years now.
What do I think about the stability of the solution?
It's a very stable solution. You have to ensure High Availability through multiple connectors.
What do I think about the scalability of the solution?
During the initial setup, you have to do a lot of planning because it's your security product. But you can scale up to thousands of servers; thousands of users. This solution is ideal for small, medium and large businesses. And it is scalable. You can start with a few users, and the benefit is huge. This product is for companies of all sizes.
How are customer service and technical support?
The technical support is excellent.
Which solution did I use previously and why did I switch?
No.
How was the initial setup?
The initial setup is a bit complex, but once the infrastructure is there and all the components have been installed, it's easy and straightforward to maintain. All the components have logging capabilities so it's easy to identify issues. The duration of the deployment depends on the customer, since downtime might be required for reboots. Some firewall changes are required.
What about the implementation team?
Inhouse implementation, with Centrify support to assist
What was our ROI?
N/A
What's my experience with pricing, setup cost, and licensing?
Setup takes a while but - as with any new installation - planning is very important. After the initial setup has been completed, it is easy to scale out
Cost might be a deciding factor. However, it integrates with a multitude of other vendors and all of the capabilities have to be taken into account. It provides more than just Privileged Access Management.
Which other solutions did I evaluate?
CyberArk. However, since the products have different features, it depends on the use case. In our case, Centrify gave the customer more benefits, since they already had other solutions in place as well.
What other advice do I have?
Planning is very important. However, if you encounter any issues, support is excellent and always assist in a timely fashion.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Buyer's Guide
Download our free Delinea Privileged Access Service Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Popular Comparisons
CyberArk Privileged Access Manager
Azure Key Vault
SailPoint Identity Security Cloud
AWS Secrets Manager
HashiCorp Vault
Delinea Secret Server
One Identity Manager
BeyondTrust Endpoint Privilege Management
WALLIX Bastion
One Identity Safeguard
SAP Identity Management
ARCON Privileged Access Management
Buyer's Guide
Download our free Delinea Privileged Access Service Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the better PAM solution, ARCON PAM or Centrify Privileged Access Service?
- When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?
- Which is the best Privileged Account Management solution?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
- Is BeyondTrust Endpoint Privilege Management really expensive compared to other tools or software?
- What is the difference between PAM and PAS?
- What is the difference between IDAM , PIM and PAM?
- Which PAM tool do you prefer: CyberArk Privileged Access Manager, One Identity Safeguard, Delinea Secret Server, or BeyondTrust Privileged Remote A