Try our new research platform with insights from 80,000+ expert users
reviewer1183728 - PeerSpot reviewer
Manager at a consultancy with 10,001+ employees
Real User
Customizations are easy and it is computer confident
Pros and Cons
  • "I find it really easy and computer confident, and the experience with the product is really good. Additionally, customizations are easy."
  • "There are some things that I know are really important to include like A/B version features which are available in Windows. I would say that they should be included in the road map."

What is most valuable?

Being an administrator, I find it really easy and computer confident, and our experience with the product is really good.

Additionally, customizations are easy.

What needs improvement?

There are some things that I know are really important to include like A/B version features that are available in Windows. I would say that they should be included in the road map.

For how long have I used the solution?

I have been doing the POC on Thycotic for a few months.

What do I think about the stability of the solution?

I would say that this solution is stable.

Buyer's Guide
Delinea Secret Server
September 2025
Learn what your peers think about Delinea Secret Server. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,676 professionals have used our research since 2012.

How was the initial setup?

Thycotic Secret Server is easy to implement.

What other advice do I have?

I would recommend Thycotic. On a scale of one to ten, I would rate this product an 8.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. partner
PeerSpot user
it_user1284300 - PeerSpot reviewer
Pre Sales/Technical Engineer at a tech services company with 11-50 employees
Real User
Good user interface and session monitoring and easy to set up
Pros and Cons
  • "The user interface is quite good. It's very straightforward."
  • "There could be tweaks here and there. For example, instead of going to one main function to do this and another main function to do that, the solution could remap the user interface so that a person only has to go through one function. The way that function branches off should make a bit more sense."

What is our primary use case?

I primarily use the solution for PRAM management, privileged access management, and other similar tasks as well. We submit credentials and replicate and post them directly behind the scenes. There's also some session monitoring and issue recording, etc. that we handle.

What is most valuable?

The session monitoring and session recording aspects of the solution are valuable to us. The fact that, as a support, you can actually monitor sessions on the fly is really helpful. A lot of sessions are live. Therefore, if anything happens within the session, there is an alert, and the security can terminate the session. 

The fact that you can go back to any other session according to user or sequence, is quite useful. You can get a nice audit of the recording sessions. It's quite deep and quite useful.

Users are able to whitelist commands. It's very helpful.

The solution provides security for certain tasks as well. There's also regression on items like passwords.

The user interface is quite good. It's very straightforward.

The reporting is very powerful.

What needs improvement?

The solution is very good at improving based on customer feedback. If, for example, a customer asks for updated functionality, the next version will likely fit the requirements or requests. They're very responsive in that sense.

There could be tweaks here and there. For example, instead of going to one main function to do this and another main function to do that, the solution could remap the user interface so that a person only has to go through one function. The way that function branches off should make a bit more sense.

I'd like to see more automation on parts of the solution that cover APIs and disk space. There should be more automation in terms of what's out-of-the-box. It would help some customers as not all of them are knowledgable and well-skilled. It would make it easier for the layman.

For how long have I used the solution?

I've been using the solution for one year.

What do I think about the stability of the solution?

The solution is pretty stable.

What do I think about the scalability of the solution?

The solution is highly scalable. The architectural deployment is quite flexible. You can deploy it on multiple sites, you can do your load balancing, you can do your SQL storing, etc. It gives you various architectural deployment and flexibility options. It's very powerful.

How are customer service and technical support?

We've been in touch with technical support in the past and they've been very helpful. We've been satisfied with their level of support.

Which solution did I use previously and why did I switch?

We didn't previously use a different solution. This is my first foray into PRAM management and enterprise solutions.

How was the initial setup?

The initial setup is pretty straightforward. We didn't find it to be overly complex in any way.

Which other solutions did I evaluate?

I did look at a few other companies and compared a few different features before choosing this solution. I looked at FireEye, BeyondTrust, and CyberArk.

What other advice do I have?

I have a lot of hands-on experience with the solution and I present it to customers and do all the POCs for them.

I'd recommend the solution and advise others to look at cloud options, as most companies are moving to the cloud anyway right now. It's flexible, so users can deploy it both on-prem or on the cloud. There are lots of great custom features and network monitoring capabilities.

You can also patch the privileged behavior and it will, on the fly, give you nice digital printouts with privileged behavior also. If your system admin or one of your admins suddenly acts strangely, even at 2 AM on a Sunday, it will flag that because that's not normal behavior. That's due to the fact it has a lot of powerful machine learning built into the solution as well.

The endpoint application control of the privileged manager is powerful because of the authorizations, etc. The privileged manager can ensure that you actually are able to manage everything very well - everything from user privileges to admin. You can even escalate items easily.

I'd rate it nine out of ten, just because there's always room for improvement. However, for my purposes, it's a fantastic solution.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Delinea Secret Server
September 2025
Learn what your peers think about Delinea Secret Server. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,676 professionals have used our research since 2012.
reviewer1236738 - PeerSpot reviewer
Assistant Technical Manager at a tech services company with 11-50 employees
Reseller
Good session monitoring and reporting capability, but more online training sessions should be available
Pros and Cons
  • "The most valuable feature is session monitoring."
  • "Having more detailed reporting would improve this solution."

What is our primary use case?

We are a system integrator and this is one of the solutions that we implement for our clients.

It is used for privileged access management for networks, servers, applications, databases, and more.

What is most valuable?

The most valuable feature is session monitoring.

The Password Changer is a useful feature.

The reporting functionality is good.

What needs improvement?

They need to open a data center in Malaysia so that we can better provide cloud-based services to our customers.

I would like to see more training sessions made available online.

Having more detailed reporting would improve this solution.

For how long have I used the solution?

We have been working with Thycotic Secret Server for less than one year.

What do I think about the stability of the solution?

We have had issues with stability in the past, although technical support has always been able to help us to fix them. This type of solution is used on a daily basis.

What do I think about the scalability of the solution?

It is easy to scale. Our clients are generally medium-sized companies.

How are customer service and technical support?

Technical support is good. There is always somebody available to assist us with issues.

Which solution did I use previously and why did I switch?

Some of our clients have switched to Thycotic because of the cost.

How was the initial setup?

The initial setup is relatively simple. It can be installed in one day, although for the configuration it may take a few days.

What about the implementation team?

Normally, we do the installation of this solution for our clients. One to two people is sufficient for handling the deployment.

What's my experience with pricing, setup cost, and licensing?

The price of this solution is good.

What other advice do I have?

My advice to anybody who is considering this solution is to first understand their requirements and then define the scope before implementing it. The reason is that once deployed, there is a lot of integration into the existing environment.

This is a product that I would recommend.

I would rate this solution a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Distributor
PeerSpot user
Director / Engineer at Provincia
Real User
Monolithic software that is easy to use but the documentation is insufficient
Pros and Cons
  • "Ease of use because of its monolithic software."
  • "Documentation could be improved if they were to include more about connectors. There is not enough documentation."

What is our primary use case?

I'm a director/engineer and we partnered with the company. Our primary use case was for a project that we followed from an administrator point of view, not the end-user point of view. My responsibility was to manage the migration-related to the project, installing and configuring the infrastructure, creating policies and so on. Technically speaking, it was at a high level. All of my clients are enterprise companies.

What is most valuable?

The most valuable aspects were its ease of use because the software is monolithic, so you only have to install the web services and then there's a database, so it's very easy to use and to configure. There are no further modules so installation is simple as is configuration. There are a lot of features out of the box. That was an interesting aspect.

What needs improvement?

I think the services could be improved by making it more 'friendly.' Documentation could be improved if they were to include more about connectors. Technically speaking, and in comparison to other software such as CyberArk, the documentation was not enough. CyberArk has extensive documentation and I believe Thycotic doesn't have enough.

The same applies for additional features - improved documentation in the next release would be helpful.

For how long have I used the solution?

I've used the product for five months. 

What do I think about the stability of the solution?

It's a very stable solution.

What do I think about the scalability of the solution?

It's very easy to scale the solution because it's a web server. If you want to install more than one server then you just have to add the additional server to the database. So it's very, very easy.

How are customer service and technical support?

Technical support is fine but as I said, it could be a little more friendly.

Which solution did I use previously and why did I switch?

There is a lot of risk management software around. I decided to switch to Thycotic, first of all, because we were starting a new project and it was a challenge for me and a new software I wanted to try. That was the main reason for the move. 

How was the initial setup?

Being a web server, the initial setup is very straightforward and easy to understand. It's one of the differences between Thycotic and CyberArk. CyberArk requires some study, it's a modular solution. 

What's my experience with pricing, setup cost, and licensing?

I'm a technicial person so I don't know about setup costs. 

What other advice do I have?

In general, I would recommend the product. It's very good and is cheaper than CyberArk. It's something that a team leader or project manager would take into consideration because even the cost of the license is something to keep in mind when planning a project. It really depends on the company's requirements. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. partner
PeerSpot user
it_user1150704 - PeerSpot reviewer
Analytické a bezpečnostní nástroje IBM at ITS
Real User
Securely manages accounts and provides detailed reporting to facilitate compliance
Pros and Cons
  • "It offers the possibility of secure administration of hardware devices, as well as Linux systems administration from a Windows environment."
  • "I would like to see the shadowing of ongoing terminal sessions (Remote Desktop Mirroring)."

What is our primary use case?

This solution provides us with increased security when working with privileged accounts. It has well-arranged and detailed logging of privileged accounts. It offers the possibility of secure administration of hardware devices, as well as Linux systems administration from a Windows environment.

How has it helped my organization?

This solution has increased security when working with privileged accounts and automates changes to their passwords.

Detailed logging of privileged account activity.

What is most valuable?

The features that we have found the most valuable are:

  • Automatic password rotation to manage the security keys.
  • Alerting of abnormal use of credentials.
  • Dramatically improving our security posture.
  • Facilitating compliance with our safety standards.
  • Multiple layers of security and access management for IT admins, robust segregation of role-based duties, and military-grade AES 256 bit encryption.
  • Database clustering, load balancing, and unlimited admin mode.
  • Out-of-the-box & custom reports.

What needs improvement?

I would like to see the shadowing of ongoing terminal sessions (Remote Desktop Mirroring).

Recording of keyboards in the current Remote Desktop session would be a helpful feature.

For how long have I used the solution?

We have been using solution for about six months.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Manager70c3 - PeerSpot reviewer
Manager at a consultancy with 1,001-5,000 employees
Real User
Enables us to search for service accounts across the network
Pros and Cons
  • "The most valuable feature of this solution is the random changing of passwords."
  • "We could definitely use some help with API tokenization. If we had a way to store tokens that would be fabulous."

What is our primary use case?

It's a password vault.

How has it helped my organization?

We use it to search for service accounts across the network. It has significantly helped with staff productivity because it's a less manual process now.

Our security program is about two years old so we're relatively immature, but this was a tremendous step towards being able to securely store passwords.

What is most valuable?

The most valuable feature of this solution is the random changing of passwords.

What needs improvement?

We could definitely use some help with API tokenization. If we had a way to store tokens that would be fabulous.

What do I think about the stability of the solution?

The stability is pretty good, we like it.

What do I think about the scalability of the solution?

The scalability is pretty good.

How are customer service and technical support?

We haven't used technical support.

Which solution did I use previously and why did I switch?

We didn't use anything previously, we just knew we needed a vault. We went with Thycotic based on ease of use and we thought their feature set was a little more robust.

How was the initial setup?

I don't remember the initial setup being very complex.

What about the implementation team?

We used a consultant for the deployment, Alcom. Our experience with them was positive.

What's my experience with pricing, setup cost, and licensing?

It isn't terribly expensive.

Which other solutions did I evaluate?

CyberArk was on our shortlist.

What other advice do I have?

Just get it. It works well.

I would rate this solution at nine out of ten. It does everything we knew it would, but it would be nice if they added some additional features.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
ProductSfdcf - PeerSpot reviewer
Product Security Engineer
Real User
Enables us to centrally manage and distribute secrets, but usability needs improvement
Pros and Cons
  • "Provides us with the ability to control access [to secrets] by groups."
  • "One of the things that we want is to be able to do some of the management of it using APIs."

What is our primary use case?

We use it for managing secrets and distributing them to our users.

How has it helped my organization?

It reduces the risk of secrets being stored in insecure locations, and enables us to share, control, and rotate the secrets. It has also helped to increase staff productivity. It has saved a few man-hours per employee per month.

In terms of security maturity for our organization, it definitely helps with the overall secrets-management aspect. Before, the secrets were not managed online or in a central place. Governance was hard. It has matured the security program in that way.

What is most valuable?

  • The overall secrets management 
  • The ability to control access by groups
  • Sharing secrets

What needs improvement?

One of the things that we want is to be able to do some of the management of it using APIs.

Also, their release schedule is slower than I would like. A better release cadence, more frequent releases, would be better, even if they were smaller. 

What do I think about the stability of the solution?

It's been pretty stable. It has never failed.

What do I think about the scalability of the solution?

The scalability is okay, for what the solution does.

How are customer service and technical support?

I have only used technical support once and it wasn't bad. It was slower than I wanted, but I don't think it was bad.

Which solution did I use previously and why did I switch?

We used a version that was offline but we wanted something that is centrally managed. That was the reason for the switch, if I remember correctly. There is a need, in general, for organizations to have a solution like this and we chose this vendor.

What was our ROI?

I don't know how much it costs but, generally, there has been good return on what we wanted to do.

Which other solutions did I evaluate?

I don't remember specific ones off top of my head, but there were definitely other vendors on the shortlist.

What other advice do I have?

The biggest challenge with this solution is the usability. You should have your end customers try out different things, find out which product they prefer, and pick that.

I would rate the product at seven out of ten. The usability is very bad which makes it difficult for end-users to use. They complain about putting secrets in it.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Student9846 - PeerSpot reviewer
IT Strategy Consultant at a government with 201-500 employees
Real User
Password storage enables us to give some groups access to different kinds of databases
Pros and Cons
  • "The ability to give some groups access to different kind of databases with the storage of a password is the most valuable feature."
  • "I don't know what kind of a cryptographic it uses to encrypt the password but it should be one of the stronger ones. Some of the cryptos have been accessed by hackers."

What is our primary use case?

Our primary use case is for password management. 

How has it helped my organization?

Before this solution, people had their own passwords stored in different areas and when something was needed we could not find the right person that had the right password, which meant quite a lot in migrations scenarios. With this solution, everyone knew what tools to use and where to put the password and who gives access to that password and then we could have reports on who has access to different passwords so that we could do audits. 

What is most valuable?

The ability to give some groups access to different kinds of databases with the storage of a password is the most valuable feature. 

What needs improvement?

I don't know what kind of a cryptographic it uses to encrypt the password but it should be one of the stronger ones. Some of the cryptos have been accessed by hackers. The encryption algorithm that they use is weak and could be hacked.

What do I think about the stability of the solution?

The scalability is pretty good. It was always accessible. 

What do I think about the scalability of the solution?

It was pretty scalable.

What other advice do I have?

I would rate it a nine out of ten. It provides most of the features we need. I like the way that you could easily administer who would get access to what kind of a database.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Delinea Secret Server Report and get advice and tips from experienced pros sharing their opinions.
Updated: September 2025
Buyer's Guide
Download our free Delinea Secret Server Report and get advice and tips from experienced pros sharing their opinions.