The tool has many models. The tool also has a good cloud version. Also, the customers need not control any components on the solution side. The product's licensing model is also good since customers can choose a price that is most useful for them. The solution also supports password management for the users in your organization.
Number one is the password vault; it's very good. Number two, they have a feature for remote desktops that are created on a per session basis, which is very good for security.
Senior Product Manager and Technology Consultant at Barikat
Reseller
Top 10
2022-05-25T15:49:00Z
May 25, 2022
Delinea's network integration is the most useful. For example, I use a Check Point firewall connect to SmartConsole, so I need to do a lot of configuration in Delinea Secret Server. Native integration with Check Point is valuable. You can also go download whatever API you need from the cloud, whether you're using Check Point, Palo Alto, etc. Enriched discovery is another good feature. If you are dealing with several kinds of systems, you can see which system requires privileged access to my network.
Principal Solutions Architect at a computer software company with 51-200 employees
Real User
2021-10-12T19:59:29Z
Oct 12, 2021
The discovery engine is really robust and flexible. It had some session management features that are better compared to some other vendors. Overall the GUI is very good and straightforward to operate compared to other solutions. For example, CyberArk and Hitachi tend to be hard to navigate.
I like that it is Windows-based. It is good that primarily, it is not an appliance. Some of the other applications in the space, such as a Quest Software CPAM or a Safeguard, are appliances, so you can't deploy the ends of them. With Thycotic, you can either install your Temporal Protection module physically in the VM host, or you can use BouncyCastle for high-security module capabilities.
Senior Security Engineer at a insurance company with 10,001+ employees
Real User
2021-05-21T07:50:10Z
May 21, 2021
I have found most valuable the automatic scheduled password rotation and remote desktop monitoring. Additionally, the documentation is readily available and easy to find and the dashboard is straightforward.
VP - Enterprise Solutions at a comms service provider with 11-50 employees
Real User
2020-10-06T06:57:51Z
Oct 6, 2020
I have found the password management and the secret management features to be the most valuable. Our customers find its ease of integration and the use of power shells really attractive.
Secret Server is a fully-featured Privileged Access Management (PAM) solution available both on premise and in the cloud. It empowers security and IT ops teams to secure and manage all types of privileged accounts and offers the fastest time to value of any PAM solution.
The privileged access management module is the most reliable feature.
Its technical support is good.
The tool has many models. The tool also has a good cloud version. Also, the customers need not control any components on the solution side. The product's licensing model is also good since customers can choose a price that is most useful for them. The solution also supports password management for the users in your organization.
I like that you can change the password remotely.
The solution is scalable.
The solution is good.
Support is helpful.
The most valuable feature of Delinea Secret Server is secret password management.
The secret template, password rotation, and recording sessions are the most valuable.
Number one is the password vault; it's very good. Number two, they have a feature for remote desktops that are created on a per session basis, which is very good for security.
I like that it's user-friendly.
One valuable feature is that it will support a dedicated database. Delinea provides multiple features, like reporting and remote password changes.
Delinea's network integration is the most useful. For example, I use a Check Point firewall connect to SmartConsole, so I need to do a lot of configuration in Delinea Secret Server. Native integration with Check Point is valuable. You can also go download whatever API you need from the cloud, whether you're using Check Point, Palo Alto, etc. Enriched discovery is another good feature. If you are dealing with several kinds of systems, you can see which system requires privileged access to my network.
The privileged access management, which is the Safe Access Model is the most valuable feature.
I like the one-way hash, as well as the ability to store it in the cloud and access it from anywhere.
The discovery engine is really robust and flexible. It had some session management features that are better compared to some other vendors. Overall the GUI is very good and straightforward to operate compared to other solutions. For example, CyberArk and Hitachi tend to be hard to navigate.
The surveillance is most valuable.
I like that it is Windows-based. It is good that primarily, it is not an appliance. Some of the other applications in the space, such as a Quest Software CPAM or a Safeguard, are appliances, so you can't deploy the ends of them. With Thycotic, you can either install your Temporal Protection module physically in the VM host, or you can use BouncyCastle for high-security module capabilities.
I have found most valuable the automatic scheduled password rotation and remote desktop monitoring. Additionally, the documentation is readily available and easy to find and the dashboard is straightforward.
It is able to manage storage and use of personal passwords.
I have found the password management and the secret management features to be the most valuable. Our customers find its ease of integration and the use of power shells really attractive.
What I like best about this product is the interface.
The GUI interface is well-designed and user-friendly.
I find it really easy and computer confident, and the experience with the product is really good. Additionally, customizations are easy.
The user interface is quite good. It's very straightforward.
The most valuable feature is session monitoring.
Ease of use because of its monolithic software.
It offers the possibility of secure administration of hardware devices, as well as Linux systems administration from a Windows environment.
The ability to give some groups access to different kind of databases with the storage of a password is the most valuable feature.
The most valuable feature of this solution is the random changing of passwords.
Provides us with the ability to control access [to secrets] by groups.