Being an administrator, I find it really easy and computer confident, and our experience with the product is really good.
Additionally, customizations are easy.
Being an administrator, I find it really easy and computer confident, and our experience with the product is really good.
Additionally, customizations are easy.
There are some things that I know are really important to include like A/B version features that are available in Windows. I would say that they should be included in the road map.
I have been doing the POC on Thycotic for a few months.
I would say that this solution is stable.
Thycotic Secret Server is easy to implement.
I would recommend Thycotic. On a scale of one to ten, I would rate this product an 8.
I primarily use the solution for PRAM management, privileged access management, and other similar tasks as well. We submit credentials and replicate and post them directly behind the scenes. There's also some session monitoring and issue recording, etc. that we handle.
The session monitoring and session recording aspects of the solution are valuable to us. The fact that, as a support, you can actually monitor sessions on the fly is really helpful. A lot of sessions are live. Therefore, if anything happens within the session, there is an alert, and the security can terminate the session.
The fact that you can go back to any other session according to user or sequence, is quite useful. You can get a nice audit of the recording sessions. It's quite deep and quite useful.
Users are able to whitelist commands. It's very helpful.
The solution provides security for certain tasks as well. There's also regression on items like passwords.
The user interface is quite good. It's very straightforward.
The reporting is very powerful.
The solution is very good at improving based on customer feedback. If, for example, a customer asks for updated functionality, the next version will likely fit the requirements or requests. They're very responsive in that sense.
There could be tweaks here and there. For example, instead of going to one main function to do this and another main function to do that, the solution could remap the user interface so that a person only has to go through one function. The way that function branches off should make a bit more sense.
I'd like to see more automation on parts of the solution that cover APIs and disk space. There should be more automation in terms of what's out-of-the-box. It would help some customers as not all of them are knowledgable and well-skilled. It would make it easier for the layman.
I've been using the solution for one year.
The solution is pretty stable.
The solution is highly scalable. The architectural deployment is quite flexible. You can deploy it on multiple sites, you can do your load balancing, you can do your SQL storing, etc. It gives you various architectural deployment and flexibility options. It's very powerful.
We've been in touch with technical support in the past and they've been very helpful. We've been satisfied with their level of support.
We didn't previously use a different solution. This is my first foray into PRAM management and enterprise solutions.
The initial setup is pretty straightforward. We didn't find it to be overly complex in any way.
I did look at a few other companies and compared a few different features before choosing this solution. I looked at FireEye, BeyondTrust, and CyberArk.
I have a lot of hands-on experience with the solution and I present it to customers and do all the POCs for them.
I'd recommend the solution and advise others to look at cloud options, as most companies are moving to the cloud anyway right now. It's flexible, so users can deploy it both on-prem or on the cloud. There are lots of great custom features and network monitoring capabilities.
You can also patch the privileged behavior and it will, on the fly, give you nice digital printouts with privileged behavior also. If your system admin or one of your admins suddenly acts strangely, even at 2 AM on a Sunday, it will flag that because that's not normal behavior. That's due to the fact it has a lot of powerful machine learning built into the solution as well.
The endpoint application control of the privileged manager is powerful because of the authorizations, etc. The privileged manager can ensure that you actually are able to manage everything very well - everything from user privileges to admin. You can even escalate items easily.
I'd rate it nine out of ten, just because there's always room for improvement. However, for my purposes, it's a fantastic solution.
The tool has many models. The tool also has a good cloud version. Also, the customers need not control any components on the solution side. The product's licensing model is also good since customers can choose a price that is most useful for them. The solution also supports password management for the users in your organization.
The tool should integrate additional features like OCR.
I have been working with the tool for two years.
The product is stable.
The product is scalable.
The tool's product support is nice.
The tool's setup is fast and simple. The product's deployment follows a step-by-step process.
I would rate the tool a nine out of ten. I would recommend using the solution. It has many features like password management. You need to also evaluate the vendor before finalizing the product.
Our primary use case is for password management.
Before this solution, people had their own passwords stored in different areas and when something was needed we could not find the right person that had the right password, which meant quite a lot in migrations scenarios. With this solution, everyone knew what tools to use and where to put the password and who gives access to that password and then we could have reports on who has access to different passwords so that we could do audits.
The ability to give some groups access to different kinds of databases with the storage of a password is the most valuable feature.
I don't know what kind of a cryptographic it uses to encrypt the password but it should be one of the stronger ones. Some of the cryptos have been accessed by hackers. The encryption algorithm that they use is weak and could be hacked.
The scalability is pretty good. It was always accessible.
It was pretty scalable.
I would rate it a nine out of ten. It provides most of the features we need. I like the way that you could easily administer who would get access to what kind of a database.
We use it for managing secrets and distributing them to our users.
It reduces the risk of secrets being stored in insecure locations, and enables us to share, control, and rotate the secrets. It has also helped to increase staff productivity. It has saved a few man-hours per employee per month.
In terms of security maturity for our organization, it definitely helps with the overall secrets-management aspect. Before, the secrets were not managed online or in a central place. Governance was hard. It has matured the security program in that way.
One of the things that we want is to be able to do some of the management of it using APIs.
Also, their release schedule is slower than I would like. A better release cadence, more frequent releases, would be better, even if they were smaller.
It's been pretty stable. It has never failed.
The scalability is okay, for what the solution does.
I have only used technical support once and it wasn't bad. It was slower than I wanted, but I don't think it was bad.
We used a version that was offline but we wanted something that is centrally managed. That was the reason for the switch, if I remember correctly. There is a need, in general, for organizations to have a solution like this and we chose this vendor.
I don't know how much it costs but, generally, there has been good return on what we wanted to do.
I don't remember specific ones off top of my head, but there were definitely other vendors on the shortlist.
The biggest challenge with this solution is the usability. You should have your end customers try out different things, find out which product they prefer, and pick that.
I would rate the product at seven out of ten. The usability is very bad which makes it difficult for end-users to use. They complain about putting secrets in it.
Password checkout and the ability to change a password after checkin are the most valuable features.
I would like to be able to create service accounts and set generated AD passwords from the web interface.
I have used it for 3+ years.
I have not encountered any deployment issues.
I have not encountered any stability issues.
I have not encountered any scalability issues. I was able to deploy over multiple domains.
Customer service is 10/10.
Technical Support:Technical support is 10/10.
We did not previously use a different solution.
The more features you add, the more complicated you can make it. Basic password storage deployment is straightforward.
It was an in-house implementation.
Before choosing this product, we did not evaluate other options.
We use Thycotic Secret Server for the lab environment. We have it as a vault for users and in a client project. We have set it as the users' mass login to the secret server so they have access to their SVN. It is for remote access, password changing, etc...
We use it on premise, mostly. I haven't used the cloud version, but we are discussing with the client about using the cloud deployment.
Its most valuables feature are its main purpose - the password changing and the Heartbeat so the user has access to only their SVN and does not have access to any other. Thycotic's access privileged management tool allows you to grant access to users for a specific period of time and with specific attributes and privileges.
In terms of what could be improved, the whole thing with distributed engines, et cetera, is a little bit tricky. Additionally, many clients wanted a more cloud version. I know there is a cloud version of Thycotic Secret Server, but a whole unified platform would be good, not like where you have to set up a connector with the distributed engine and then have the Thycotic Secret Server connect with all these. Making a simpler version of connecting different sites and synchronization of the groups that you already have. Then the secrets and folder templates would follow the current infrastructure pattern that the client has so you don't have to recreate new folders and secrets from scratch. In other words, more interoperability with other systems, for example if a user already has a Microsoft Azure subscription. So, the integration with Microsoft as well would be good.
We have been using Thycotic Secret Server for about a year and a half.
In terms of stability, I would say, yes and no. We had some issues regarding the size of the disk space, which was a Thycotic side issue. There were many log files that they couldn't delete. And then we have another issue with the service account. We have to use another service account for Thycotic, and there was a mix-up with the database. All these issues were from the Thycotic side.
We're logging the tickets and I think there will be a resolution in the future.
Scalability is okay.
We use it for lab environment uses. We have about 20 users, not too many.
It takes one person to deploy in our environment.
We do have plans to increase. We have a live contract and other client requests for Thycotic, including maybe the cloud deployment. I hope it is not as tricky as on premise. Maybe it's easier, I don't know.
The initial setup depends on the client. That's why Isaid earlier that there should be a simpler version where we connect all the different sites, et cetera. Because for client installation and deployment, you have to set up two different servers for high availability, for example, and connect another through your site connectors for the distributed engines, and the client didn't have any load balancers. So, there were many issues and the Thycotic was a little bit tricky at that moment. It wasn't just a simple solution where you set up a server and you have it up and running.
The other thing is, and I think it's important, there is not much documentation on the internet. Besides the partner portal it would be nice if there was a blog or something that we could use. So for most cases, we have to open a ticket, either us as partners or on the client's side.
Our license is yearly.
Thycotic Secret Server is a good solution for what it does. We are happy for that, but maybe they can improve some features. Let's say the keystrokes function doesn't work. We have reported that to Thycotic, but they still have many improvements to do.
On a scale of one to ten, I think Thycotic Secret Server is an eight - maybe.
We are a system integrator and this is one of the solutions that we implement for our clients.
It is used for privileged access management for networks, servers, applications, databases, and more.
The most valuable feature is session monitoring.
The Password Changer is a useful feature.
The reporting functionality is good.
They need to open a data center in Malaysia so that we can better provide cloud-based services to our customers.
I would like to see more training sessions made available online.
Having more detailed reporting would improve this solution.
We have been working with Thycotic Secret Server for less than one year.
We have had issues with stability in the past, although technical support has always been able to help us to fix them. This type of solution is used on a daily basis.
It is easy to scale. Our clients are generally medium-sized companies.
Technical support is good. There is always somebody available to assist us with issues.
Some of our clients have switched to Thycotic because of the cost.
The initial setup is relatively simple. It can be installed in one day, although for the configuration it may take a few days.
Normally, we do the installation of this solution for our clients. One to two people is sufficient for handling the deployment.
The price of this solution is good.
My advice to anybody who is considering this solution is to first understand their requirements and then define the scope before implementing it. The reason is that once deployed, there is a lot of integration into the existing environment.
This is a product that I would recommend.
I would rate this solution a seven out of ten.