Delinea Secret Server excels in password checkout and rotation, session monitoring, and access control. Its integrated network discovery, remote password management, and custom reporting enhance security compliance. Users appreciate its ease of use, robust encryption, role-based access, and zero-trust implementation. The tool's ability to manage privileged accounts, audit logs, and provide centralized secret management alongside automated workflows supports security and operational efficiency across organizations. The GUI is intuitive and provides value in securing sensitive data.
- "The benefits and positive impacts I have seen from Delinea Secret Server on my company include having centralized secret management, log monitoring, an audit log on the command execution on the system, and it has programmable API customization."
- "The biggest benefit of Delinea Secret Server would be the remote password change and discovery, which are a major help for the management of the accounts."
- "The initial setup of Delinea Secret Server is straightforward and easy for development purposes."
Delinea Secret Server requires enhancements in subfolder creation in Personal Folders, session recording control, API tokenization, encryption strength, documentation, cloud services, and user interface. Users note the need for more flexible API integrations and compatibility with non-standard applications. The request for containerization, Linux support, improved reporting, and streamlined setup is prevalent. Complexity in integration with platforms like ServiceNow, pricing concerns, and session management issues also highlight areas for improvement.
- "We had a problem with a web password filler, which is a template used for accessing a web URL using Secret Server, where we faced some session management issues since session management is not applicable for the web password filler."
- "The main concern is that Delinea Secret Server is not suitable for modern technology."
- "Whenever an update is applied to Secret Server, it requires downtime. Most of the time, the solution tends to fail, necessitating the need to pull data from backup servers."