Try our new research platform with insights from 80,000+ expert users

Delinea Secret Server vs One Identity Privileged Access Suite for Unix comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Delinea Secret Server
Ranking in Privileged Access Management (PAM)
2nd
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
53
Ranking in other categories
Enterprise Password Managers (5th)
One Identity Privileged Acc...
Ranking in Privileged Access Management (PAM)
33rd
Average Rating
7.6
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of August 2025, in the Privileged Access Management (PAM) category, the mindshare of Delinea Secret Server is 8.0%, down from 11.0% compared to the previous year. The mindshare of One Identity Privileged Access Suite for Unix is 0.5%, up from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Avinash Gopu. - PeerSpot reviewer
Effective for password rotation policies triggered by audit requirements, it helps maintain compliance standards and seamless integration with third-party tools
The "App to App" feature has been most impactful. It allows secure communication between applications without requiring direct user access, which is crucial for several applications. Additionally, working in the finance department, we are heavily focused on enhancing audit reporting and compliance. So, the GRC (Governance, Risk & Compliance) capabilities of Delinea Secret Server have also been crucial for us. We implemented a custom reporting system that can automatically send reports to auditors daily, weekly, or according to your organization's needs. We also upgraded the audit role within Secret Server, allowing auditors to access and analyze the reports directly. Additionally, Secret Server provides comprehensive logging capabilities. Auditors can see what data users access, their access levels, and their activities, including check-in and check-out times. Furthermore, Secret Server helped us manage privileged, elevated access, which we call "K2K." As the lead for this project, I could identify users with the highest access levels and implement specific policies to monitor their activity on servers.
Hicham Barnoussi - PeerSpot reviewer
A reliable solution with great password and session management
The setup process depends on the environment of the customer. It's not dependent on the solution. For customers with normal use cases and scenarios, it's a straightforward implementation, but for a customer with more than one environment, they may have BeyondTrust in one environment and Safeguard in another one. When they want to consolidate later, there may be complications. It depends on the devices and assets they would like to have under their PAM solution. The standard time for implementation is four weeks. I rate the setup an eight out of ten. There needs to be a dedicated resource for maintenance.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The user interface is quite good. It's very straightforward."
"Ease of use because of its monolithic software."
"The "App to App" feature has been most impactful. It allows secure communication between applications without requiring direct user access, which is crucial for several applications."
"It is able to manage storage and use of personal passwords."
"The solution's stability is flawless."
"Its most valuable feature is its main purpose - the password changing and the Heartbeat so the user has access to only their SVN and does not have access to any other. Thycotic's access privileged management tool allows you to grant access to users for a specific period of time and with specific attributes and privileges."
"It works for us."
"Number one is the password vault; it's very good. Number two, they have a feature for remote desktops that are created on a per session basis, which is very good for security."
"Privileged Access Suite's best feature is it's straightforward to use."
"The most valuable features are session and password management."
"The most valuable feature of this solution is that it is easy to use."
 

Cons

"We find the documentation hard to understand."
"We faced some upgrade issues, especially during the management and administration parts. I found it less straightforward than on many other platforms, even outside password managers."
"Whenever an update is applied to Secret Server, it requires downtime. Most of the time, the solution tends to fail, necessitating the need to pull data from backup servers."
"When Delinea upgrades the tool, it rejects our password, saying that it is not compliant and strong."
"We could definitely use some help with API tokenization. If we had a way to store tokens that would be fabulous."
"Whenever an update is applied to Secret Server, it requires downtime."
"Installation can sometimes be difficult, depending on the environment."
"The initial setup and deployment can be cumbersome."
"There is a new trend of not having any privileged users or accounts."
"Privileged Access Suite's interface could be better."
"Product management should be improved."
 

Pricing and Cost Advice

"We have an enterprise license as well as a user license and a support license."
"There are different plans and additional licensing costs that can be instituted for add-ons."
"It isn't terribly expensive."
"The solution is low-cost than other vendors."
"There is an annual license needed to use Delinea Secret Server."
"Pricing is comparable to competing products."
"It would be beneficial if it were reduced."
"Secret Server is expensive when compared to the cost to some alternatives."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Financial Services Firm
10%
Manufacturing Company
9%
Government
8%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about Delinea Secret Server?
The privileged access management module is the most reliable feature.
What needs improvement with Delinea Secret Server?
The integration with the ticketing system ServiceNow is complex. That can be enabled with an API-based out-of-the-box consumption. We have customized it, and the features cannot be used without cus...
Ask a question
Earn 20 points
 

Also Known As

Thycotic Secret Server, Delinea Password Reset Server
No data available
 

Overview

 

Sample Customers

Secure-24, University of San Diego, International Rescue Committee, San Francisco Ballet, Perkins Coie, University of San Diego, D.S.S. Limited, Turbo's Hoet, Eclipse Computing, Cathay Bank, Stellarise, J&R Consulting
University of East Anglia, nForce Secure, dunnhumby
Find out what your peers are saying about Delinea Secret Server vs. One Identity Privileged Access Suite for Unix and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.