Try our new research platform with insights from 80,000+ expert users
it_user1150704 - PeerSpot reviewer
Analytické a bezpečnostní nástroje IBM at ITS
Real User
Securely manages accounts and provides detailed reporting to facilitate compliance
Pros and Cons
  • "It offers the possibility of secure administration of hardware devices, as well as Linux systems administration from a Windows environment."
  • "I would like to see the shadowing of ongoing terminal sessions (Remote Desktop Mirroring)."

What is our primary use case?

This solution provides us with increased security when working with privileged accounts. It has well-arranged and detailed logging of privileged accounts. It offers the possibility of secure administration of hardware devices, as well as Linux systems administration from a Windows environment.

How has it helped my organization?

This solution has increased security when working with privileged accounts and automates changes to their passwords.

Detailed logging of privileged account activity.

What is most valuable?

The features that we have found the most valuable are:

  • Automatic password rotation to manage the security keys.
  • Alerting of abnormal use of credentials.
  • Dramatically improving our security posture.
  • Facilitating compliance with our safety standards.
  • Multiple layers of security and access management for IT admins, robust segregation of role-based duties, and military-grade AES 256 bit encryption.
  • Database clustering, load balancing, and unlimited admin mode.
  • Out-of-the-box & custom reports.

What needs improvement?

I would like to see the shadowing of ongoing terminal sessions (Remote Desktop Mirroring).

Recording of keyboards in the current Remote Desktop session would be a helpful feature.

Buyer's Guide
Delinea Secret Server
June 2025
Learn what your peers think about Delinea Secret Server. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.

For how long have I used the solution?

We have been using solution for about six months.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Manager70c3 - PeerSpot reviewer
Manager at a consultancy with 1,001-5,000 employees
Real User
Enables us to search for service accounts across the network
Pros and Cons
  • "The most valuable feature of this solution is the random changing of passwords."
  • "We could definitely use some help with API tokenization. If we had a way to store tokens that would be fabulous."

What is our primary use case?

It's a password vault.

How has it helped my organization?

We use it to search for service accounts across the network. It has significantly helped with staff productivity because it's a less manual process now.

Our security program is about two years old so we're relatively immature, but this was a tremendous step towards being able to securely store passwords.

What is most valuable?

The most valuable feature of this solution is the random changing of passwords.

What needs improvement?

We could definitely use some help with API tokenization. If we had a way to store tokens that would be fabulous.

What do I think about the stability of the solution?

The stability is pretty good, we like it.

What do I think about the scalability of the solution?

The scalability is pretty good.

How are customer service and technical support?

We haven't used technical support.

Which solution did I use previously and why did I switch?

We didn't use anything previously, we just knew we needed a vault. We went with Thycotic based on ease of use and we thought their feature set was a little more robust.

How was the initial setup?

I don't remember the initial setup being very complex.

What about the implementation team?

We used a consultant for the deployment, Alcom. Our experience with them was positive.

What's my experience with pricing, setup cost, and licensing?

It isn't terribly expensive.

Which other solutions did I evaluate?

CyberArk was on our shortlist.

What other advice do I have?

Just get it. It works well.

I would rate this solution at nine out of ten. It does everything we knew it would, but it would be nice if they added some additional features.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Delinea Secret Server
June 2025
Learn what your peers think about Delinea Secret Server. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
ProductSfdcf - PeerSpot reviewer
Product Security Engineer
Real User
Enables us to centrally manage and distribute secrets, but usability needs improvement
Pros and Cons
  • "Provides us with the ability to control access [to secrets] by groups."
  • "One of the things that we want is to be able to do some of the management of it using APIs."

What is our primary use case?

We use it for managing secrets and distributing them to our users.

How has it helped my organization?

It reduces the risk of secrets being stored in insecure locations, and enables us to share, control, and rotate the secrets. It has also helped to increase staff productivity. It has saved a few man-hours per employee per month.

In terms of security maturity for our organization, it definitely helps with the overall secrets-management aspect. Before, the secrets were not managed online or in a central place. Governance was hard. It has matured the security program in that way.

What is most valuable?

  • The overall secrets management 
  • The ability to control access by groups
  • Sharing secrets

What needs improvement?

One of the things that we want is to be able to do some of the management of it using APIs.

Also, their release schedule is slower than I would like. A better release cadence, more frequent releases, would be better, even if they were smaller. 

What do I think about the stability of the solution?

It's been pretty stable. It has never failed.

What do I think about the scalability of the solution?

The scalability is okay, for what the solution does.

How are customer service and technical support?

I have only used technical support once and it wasn't bad. It was slower than I wanted, but I don't think it was bad.

Which solution did I use previously and why did I switch?

We used a version that was offline but we wanted something that is centrally managed. That was the reason for the switch, if I remember correctly. There is a need, in general, for organizations to have a solution like this and we chose this vendor.

What was our ROI?

I don't know how much it costs but, generally, there has been good return on what we wanted to do.

Which other solutions did I evaluate?

I don't remember specific ones off top of my head, but there were definitely other vendors on the shortlist.

What other advice do I have?

The biggest challenge with this solution is the usability. You should have your end customers try out different things, find out which product they prefer, and pick that.

I would rate the product at seven out of ten. The usability is very bad which makes it difficult for end-users to use. They complain about putting secrets in it.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Student9846 - PeerSpot reviewer
IT Strategy Consultant with 201-500 employees
Real User
Password storage enables us to give some groups access to different kinds of databases
Pros and Cons
  • "The ability to give some groups access to different kind of databases with the storage of a password is the most valuable feature."
  • "I don't know what kind of a cryptographic it uses to encrypt the password but it should be one of the stronger ones. Some of the cryptos have been accessed by hackers."

What is our primary use case?

Our primary use case is for password management. 

How has it helped my organization?

Before this solution, people had their own passwords stored in different areas and when something was needed we could not find the right person that had the right password, which meant quite a lot in migrations scenarios. With this solution, everyone knew what tools to use and where to put the password and who gives access to that password and then we could have reports on who has access to different passwords so that we could do audits. 

What is most valuable?

The ability to give some groups access to different kinds of databases with the storage of a password is the most valuable feature. 

What needs improvement?

I don't know what kind of a cryptographic it uses to encrypt the password but it should be one of the stronger ones. Some of the cryptos have been accessed by hackers. The encryption algorithm that they use is weak and could be hacked.

What do I think about the stability of the solution?

The scalability is pretty good. It was always accessible. 

What do I think about the scalability of the solution?

It was pretty scalable.

What other advice do I have?

I would rate it a nine out of ten. It provides most of the features we need. I like the way that you could easily administer who would get access to what kind of a database.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user602874 - PeerSpot reviewer
SE & Manager Of Internal Systems at a tech services company with 51-200 employees
Consultant
Discovering passwords which are expired or changed and enforcing password policy compliance.

What is most valuable?

  • Heart beats – it tells me when passwords on file are no longer working. This could be an oversight, but could also be a sign of hacker activity.
  • Secret Expiry – reports on passwords that haven’t been changed and may be out of policy.
  • Remote Password Changing – along with Secret Expiry, this enables me to stay compliant with password change policies.
  • Network Discovery – scans networked machines for accounts, bringing machines in to password policy compliance, and uncovering unknown or backdoor accounts. It also enables the discovery of the total reach of an account, i.e. a service account for which you dare not change the password as you don’t fully know the implications of missing an instance of the account that could fail critical operations.

How has it helped my organization?

We previously had a very lax password policy, and passwords were stored in Excel spreadsheets. Passwords were often not documented, or the documented password was not updated if changed. We now have a much stricter, safer password policy. Secret Server has improved security, productivity and helped achieve a much higher state of compliance.

What needs improvement?

Session recording could offer more control and block certain actions or commands.

I have experience of other products that focus on session recording, so I’m aware of what advanced functionality can be achieved.
Specifically, I’m referring to:

* blacklisting and/or whitelisting certain commands
* OCR capabilities

Now I know these aren’t currently supported, but they may be available in future releases.

For how long have I used the solution?

We have used this solution for more than three years.

What do I think about the stability of the solution?

Very occasionally indexes won’t contain all the search results expected.

What do I think about the scalability of the solution?

We have not encountered any scalability issues as this is a highly scalable product.

How are customer service and technical support?

Technical support is good. Online and offline documentation is clear and well written. Support technicians are punctual and friendly.

Which solution did I use previously and why did I switch?

I have worked with customers of other solutions. They found it hard to separate accounts assigned to the same asset for different teams. For example, a server has SQL and database accounts. These credentials would all be visible to anyone with access to the server asset which isn’t a desirable situation. DBA has access to a local administrator account. Server admin has access to the payroll DB account!

How was the initial setup?

Based entirely on the Microsoft stack (IIS, MS-SQL), installation is quick and easy.

What's my experience with pricing, setup cost, and licensing?

Pricing is very flexible. Download the free trial version. You can downgrade to the free version (it’s free for life!) or pay for the exact feature set you require.

Which other solutions did I evaluate?

We evaluated LastPass Enterprise, RoboForm, Password Manager Pro, Kaspersky Password Manager and CyberArk.

What other advice do I have?

I’d recommend you engage a reseller to discuss your requirements, and download the free trial version.

Disclosure: My company has a business relationship with this vendor other than being a customer: I work as a security consultant for Satisnet Ltd, a Thycotic reseller. We chose to engage with Thycotic after a lot of research in the PAM space for a large corporate customer.
PeerSpot user
PeerSpot user
Systems Administrator at a tech services company with 501-1,000 employees
Consultant
It offers password checkout and the ability to change a password after checkin.

What is most valuable?

Password checkout and the ability to change a password after checkin are the most valuable features.

How has it helped my organization?

  • Removes the risk of passwords sitting in files on admins' desktops
  • Also provides a secure portal to share passwords with the team

What needs improvement?

I would like to be able to create service accounts and set generated AD passwords from the web interface.

For how long have I used the solution?

I have used it for 3+ years.

What was my experience with deployment of the solution?

I have not encountered any deployment issues.

What do I think about the stability of the solution?

I have not encountered any stability issues.

What do I think about the scalability of the solution?

I have not encountered any scalability issues. I was able to deploy over multiple domains.

How are customer service and technical support?

Customer Service:

Customer service is 10/10.

Technical Support:

Technical support is 10/10.

Which solution did I use previously and why did I switch?

We did not previously use a different solution.

How was the initial setup?

The more features you add, the more complicated you can make it. Basic password storage deployment is straightforward.

What about the implementation team?

It was an in-house implementation.

Which other solutions did I evaluate?

Before choosing this product, we did not evaluate other options.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Senior Information Security Engineer at a university with 1,001-5,000 employees
Real User
Has helped us eliminate many of the manual processes that we performed regarding password changing and rotation, as well as the data we stored in Microsoft Excel.

I have been a proud Thycotic Secret Server customer since 2008.  Back in those days, my organization used Secret Server as a secure vault to store all of our highly privileged accounts and their passwords.  I manage our Secret Server environment, and over the years we have heavily utilized this product across our entire University to harden our security posture and meet compliance requirements.  Secret Server has helped us eliminate many of the manual processes that we performed regarding password changing and rotation, as well as the data we stored in Microsoft Excel.  We love the fact that the product discovers privileged accounts across our infrastructure so that we can securely store and manage them appropriately, as well as rotate their passwords to meet our password policy requirements.  We are a large Active Directory shop and Secret Server integrates with Active Directory very easily.  The folder structure that you are able to build within Secret Server to setup permissions for other departments can mirror your internal Activity environment, providing a secure approach to password management.  The auditing capabilities that Secret Server offers has allowed me to quickly respond to possible malicious activity, which has saved me countless hours over the course of time.  The built-in reports are very useful and can be customized to meet your organization’s reporting needs.  The service account discovery and management feature of Secret Server has played a pivotal role in helping us secure other departments’ servers within our infrastructure.  Secret Server is easy to set up and use, and I have trained many departments on how to utilize Secret Server to help meet their needs.  Thycotic is continually providing upgrades with new features that can be seamlessly utilized immediately within an organization.  Their customer support is top notch, along with all of their other employees with whom I have interacted over the years.  I highly recommend this company and their product!

Improvements: Our Linux/Unix team was hoping that the new SSH Key Rotation feature in the 10.1 release would be included in our Enterprise licensing, but it's not. Thycotic's newer pricing model allows these features to be purchased a la carte style. Sometimes it gets challenging to justify additional expenditures to upper management, although their pricing is very competitive compared to other PAM solutions.  


Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user386394 - PeerSpot reviewer
Security Operations at a tech company with 5,001-10,000 employees
Real User
Installation and setup is straightforward. Custom reporting and scheduling is available.

What is most valuable?

  • Ease of installation
  • Folders
  • Secret attachments
  • Custom templates and password policies
  • Custom reporting and scheduling
  • Discovery service
  • Too many great features to list here

How has it helped my organization?

  • Better adoption of PAM

What needs improvement?

Referring to Secret Server v10, we want the ability to add subfolders to the "\Personal Folders" container. We had to rename it to "\Personal Secrets" to avoid confusion. Otherwise, you can create as many top-level folders and subfolders as you like. A minor annoyance for an otherwise awesome product.

For how long have I used the solution?

I have used it for 2+ years.

What was my experience with deployment of the solution?

No issues during deployment: Get your SQL cluster deployed, check your prerequisites, run the installer. Log in and start configuring. That was really it.

What do I think about the stability of the solution?

We have not encountered any stability issues; been rock solid since production deployment.

What do I think about the scalability of the solution?

We have not encountered any scalability issues. Performance issues with a few hundred users and thousands of secrets has been negligible; running on hardware.

How are customer service and technical support?

Customer Service:

Customer service is excellent. Customer relations and tech support have both been quick to respond and knowledgeable.

Technical Support:

I rate technical support 8/10. There's always room for improvement when it comes to tech support, but compared to other big name companies, Thycotic tech support stands out among the top.

Which solution did I use previously and why did I switch?

We had another product before switching. Secret Server crushed the old solution.

How was the initial setup?

Initial setup was very straightforward compared to the competition.

What about the implementation team?

We implemented it ourselves; it was pretty straightforward.

What's my experience with pricing, setup cost, and licensing?

Look at their edition/feature comparison chart and decide which version suits you best. Note that clustering requires the Enterprise Plus edition. You're also allowed to install a lab and QA environment with your license which will help with pre-prod testing.

Which other solutions did I evaluate?

Before choosing, we looked at other vendors such as LastPass, 1Password, CyberArk, PasswordManager, PasswordState, BeyondTrust, Quest, CA, etc. In the end, the cost, features, and ease of deployment simply beat the competition.

An enterprise-class PAM system will always have complexities to deal with. However, some competitive products literally require a professional services engineer to come onsite if you want it done properly. Secret Server was comparatively easy to setup and get running on our own.

What other advice do I have?

Thycotic Secret Server is an excellent product; we're very happy with it!

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Delinea Secret Server Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free Delinea Secret Server Report and get advice and tips from experienced pros sharing their opinions.