"It is able to manage storage and use of personal passwords."
"Technical support is pretty good."
"I like that it is Windows-based. It is good that primarily, it is not an appliance. Some of the other applications in the space, such as a Quest Software CPAM or a Safeguard, are appliances, so you can't deploy the ends of them. With Thycotic, you can either install your Temporal Protection module physically in the VM host, or you can use BouncyCastle for high-security module capabilities."
"I have found the password management and the secret management features to be the most valuable. Our customers find its ease of integration and the use of power shells really attractive."
"There has been no downtime this year."
"I like that it's user-friendly."
"I have found most valuable the automatic scheduled password rotation and remote desktop monitoring. Additionally, the documentation is readily available and easy to find and the dashboard is straightforward."
"What I like best about this product is the interface."
"We have been able to make our help desk self-sufficient by giving them role-based access. We have been able to reduce service dependency by 40% to 50%."
"The most valuable features include the automated attestations or recertification... The time that people have to focus on their real jobs and not spend it doing recertifications is huge."
"The IT shop is a great tool that allows a simple interface for users to see their access, be able to request additional access, and view the workflow approval process to understand where their request is and what any hold-ups may be."
"Among the most valuable features of One Identity Manager are administration from Active Directory and Azure Active Directory, as well as administration from Exchange. These features enable us to have fully automated processes to create new accounts and new mailboxes. The most valuable option is the ability to design an automated route to give our customers permissions."
"The most valuable features are that it has a lot of capabilities, can integrate with a lot of systems, including automated onboarding like CyberArk, and allows you to integrate different entities."
"I formerly used only one service: the remote server. For example, I connected to the Active Directory user and the computer's console. But now, I need to do a remote connection to the domain controller. Maybe it only connects to that tool, the Active Directory users, and the computer management console, but not to the domain controller. Another thing Delinea could add is multi-factor authentication."
"Improvements are needed in session management, behavioral analytics, and the reporting segment."
"I'd prefer a better commercial model that includes partners and options for consulting around it. Where I've worked with my customers, we've only been able to use their professional services, and that has been a risk and constraint."
"Support could be better. I have heard about a lot of problems in the Bangladesh market. People are saying that there are support issues. So, Delinea should focus on support and services."
"One thing that I wish they would do is to have a Kubernetes or container-based deployment supported, but they're not quite there yet. Containerization or support for containerization would be fantastic."
"We always ask for partner enablement, which is more like a soft requirement rather than a product requirement. It would be great if they can provide us deeper knowledge of their products for integration."
"The API is no good."
"The technical support needs improvement. For example, if you have any problems on the server configuring the IIS, they would provide you very limited details and they would tell you the problem is on your end."
"One area that could be improved is the speed of performance - it's often a bit slower because of the size of its database."
"Right now, they run an on-prem solution. Our preferred solution for cloud is Azure. So, we have yet to determine how we want to take this forward, because at this time, we are only using Graph APIs to do some Azure-related actions."
"The web interface has room for improvement. It could be more performant and the design of the web interface is relatively complicated. It could be simplified."
"[Regarding] their upgrades, we're going to 8.12 right now and everything is running very smoothly but this is actually the first upgrade that has gone off well. Even the other "dots" have taken us six months or longer to get through QA testing."
"We fell into that trap of over-customization which made upgrading the product difficult."
Secret Server is a fully-featured Privileged Access Management (PAM) solution available both on premise and in the cloud. It empowers security and IT ops teams to secure and manage all types of privileged accounts and offers the fastest time to value of any PAM solution.
One Identity Manager helps you mitigate risk, secure data, meet uptime requirements and satisfy compliance by giving your users access to data and applications they need and nothing more. IAM can be driven by business needs, not IT capabilities. With Identity Manager, you can manage user identities, privileges and security across the enterprise, putting you in control of identity management and taking the burden off your IT staff.
Delinea Secret Server is ranked 2nd in Enterprise Password Managers with 15 reviews while One Identity Manager is ranked 2nd in Identity Management (IM) with 5 reviews. Delinea Secret Server is rated 8.0, while One Identity Manager is rated 8.0. The top reviewer of Delinea Secret Server writes "Excellent access management that can serve very large networks". On the other hand, the top reviewer of One Identity Manager writes "Enables us to automate SOX recertification, saving a significant amount of time". Delinea Secret Server is most compared with CyberArk Privileged Access Manager, HashiCorp Vault, Azure Key Vault, BeyondTrust Endpoint Privilege Management and Keeper, whereas One Identity Manager is most compared with SailPoint IdentityIQ, Cisco ISE (Identity Services Engine), Microsoft Identity Manager, Oracle Identity Governance and BeyondTrust Endpoint Privilege Management.
We monitor all Enterprise Password Managers reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.