Delinea Secret Server Valuable Features

Avinash Gopu. - PeerSpot reviewer
Associate VP & Cyber Security Specialist at US Bank

The "App to App" feature has been most impactful. It allows secure communication between applications without requiring direct user access, which is crucial for several applications. 

Additionally, working in the finance department, we are heavily focused on enhancing audit reporting and compliance. So, the GRC (Governance, Risk & Compliance) capabilities of Delinea Secret Server have also been crucial for us.

We implemented a custom reporting system that can automatically send reports to auditors daily, weekly, or according to your organization's needs. We also upgraded the audit role within Secret Server, allowing auditors to access and analyze the reports directly. 

Additionally, Secret Server provides comprehensive logging capabilities. Auditors can see what data users access, their access levels, and their activities, including check-in and check-out times.

Furthermore, Secret Server helped us manage privileged, elevated access, which we call "K2K." As the lead for this project, I could identify users with the highest access levels and implement specific policies to monitor their activity on servers.

View full review »
Siva Jp - PeerSpot reviewer
Principle Architecture at LTIMINDTREE

The privileged access management module is the most reliable feature, along with the password manager.

View full review »
NajibulIslam - PeerSpot reviewer
Technical Account Manager (Information Security) at Trustaira

The most valuable feature is the subscription on offer.

We like the policies that can be put in place. The password duration backup part and even the pipeline are useful. 

The solution offers useful APIs as well. 

We find the initial setup to be simple. 

It's scalable. 

The stability is great. 

The pricing is good.

Support is helpful.

Account discovery and asset discovery is easier in Delinea than in other solutions.

View full review »
Buyer's Guide
Delinea Secret Server
April 2024
Learn what your peers think about Delinea Secret Server. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,847 professionals have used our research since 2012.
Meo Ist - PeerSpot reviewer
Senior Product Manager and Technology Consultant at Barikat

Delinea's network integration is the most useful. For example, I use a Check Point firewall connect to SmartConsole, so I need to do a lot of configuration in Delinea Secret Server. Native integration with Check Point is valuable. You can also go download whatever API you need from the cloud, whether you're using Check Point, Palo Alto, etc.  Enriched discovery is another good feature. If you are dealing with several kinds of systems, you can see which system requires privileged access to my network.

View full review »
Kaspars Vasilevskis - PeerSpot reviewer
Security Delivery Associate Manager at Accenture

The valuable features are remote password changing, session recording, and integrations with other tools. Delinea Secret Server is fine and easy to use, especially compared to other solutions.

View full review »
SI
Head of Platform Engineering at Ascend Group Co., Ltd.

I like that you can change the password remotely.

View full review »
PO
Relationship Manager at Snapnet Ltd
It provides holistic Secret management for PAM solutions. We can have control over our network secrets and be sure that access to your critical servers isn't gained haphazardly by anyone on your network. It also helps with compliance with security standards for privileged devices. It offers a safer, more secure environment for reporting and implementation of secrets. When it comes to managing critical servers and sandboxes, like Ascentia access, you can easily manage them and put proper identity governance across all of them. This applies to both internal and external users, including third-party vendors. View full review »
Md MustafizurRahman - PeerSpot reviewer
Assistant Manager, Cyber Security at BracNet Limited

I like that it's user-friendly.

View full review »
Chijioke Ugwu - PeerSpot reviewer
Presales Executive at Bludive technologies

One of the features I find most valuable is workflow, which allows you to configure the solution to have multiple approvals. For example, if one person approves something, it can be set up so that others must confirm it as well.

View full review »
MN
Manager at a consultancy with 10,001+ employees

The privileged access management, which is the Safe Access Model, is the most valuable feature.

View full review »
DR
Principal Solutions Architect at a computer software company with 51-200 employees

The discovery engine is really robust and flexible. It had some session management features that are better compared to some other vendors. Overall the GUI is very good and straightforward to operate compared to other solutions. For example, CyberArk and Hitachi tend to be hard to navigate.

View full review »
Rick-Nelson - PeerSpot reviewer
Lead IT Security Engineer,IAM at a insurance company with 1,001-5,000 employees

The tool's most valuable feature is robust audit logging. 

View full review »
HG
Senior System Analyst at a government with 1,001-5,000 employees

The most valuable feature is the user experience. The platform offers a native user experience, which means that users don't have to change their behavior or install any additional software or agents.

Moreover, Delinea manages the secrets, not the assets.

View full review »
Jared Ochieng - PeerSpot reviewer
Information Technology Security Specialist at infoark

Number one is the password vault; it's very good. It helps our clients avoid having a lot of passwords out there.

Number two, they have a feature for remote desktops that are created on a per session basis, which is very good for security. They also integrate with service providers. Let's say I'm having Microsoft take a look at the active directory or something that went wrong. I can give them one-time access, and once they're done, the session ends and they don't have access to it anymore. These features are very helpful for my customers.

View full review »
it_user386394 - PeerSpot reviewer
Security Operations at a tech company with 5,001-10,000 employees
  • Ease of installation
  • Folders
  • Secret attachments
  • Custom templates and password policies
  • Custom reporting and scheduling
  • Discovery service
  • Too many great features to list here
View full review »
RR
Senior Security Engineer at a insurance company with 10,001+ employees

I have found most valuable the automatic scheduled password rotation and remote desktop monitoring. Additionally, the documentation is readily available and easy to find and the dashboard is straightforward.

View full review »
ZG
Chief Executive Officer at Zigabyte

I like that it is Windows-based. It is good that primarily, it is not an appliance. Some of the other applications in the space, such as a Quest Software CPAM or a Safeguard, are appliances, so you can't deploy the ends of them. With Thycotic, you can either install your Temporal Protection module physically in the VM host, or you can use BouncyCastle for high-security module capabilities.

View full review »
FP
Director / Engineer at Provincia

The most valuable aspects were its ease of use because the software is monolithic, so you only have to install the web services and then there's a database, so it's very easy to use and to configure. There are no further modules so installation is simple as is configuration. There are a lot of features out of the box. That was an interesting aspect.

View full review »
SM
Team Lead, System Infrastructure at GAL

The solution's most valuable feature is video recording. It is crucial for evidence and compliance purposes.

View full review »
PR
Technology Infrastructure Senior Analyst at a educational organization with 501-1,000 employees

I like the one-way hash, as well as the ability to store it in the cloud and access it from anywhere.

I like the fact that you don't have to have separate databases for each department in your organization. 

They have one central location, that they all go to it. 

They all go to the same central location. If they leave, we can disable their account, reset their password, and integrate it with our Active Directory.

At this early stage, and based on my demo experience over the last two weeks, it appears to have more features than we require, but we can grow into it.

It's a great product. It seems that you could do your privileged access and things like that where you do the IEM. You could also make it so that those individuals have access for a set period of time to do their administration. These are the types of features we haven't really used, but I can see them being very useful. I can also see where they're going with this product, which is an all-in-one solution. 

It appears to be well-developed.

View full review »
it_user602874 - PeerSpot reviewer
SE & Manager Of Internal Systems at a tech services company with 51-200 employees
  • Heart beats – it tells me when passwords on file are no longer working. This could be an oversight, but could also be a sign of hacker activity.
  • Secret Expiry – reports on passwords that haven’t been changed and may be out of policy.
  • Remote Password Changing – along with Secret Expiry, this enables me to stay compliant with password change policies.
  • Network Discovery – scans networked machines for accounts, bringing machines in to password policy compliance, and uncovering unknown or backdoor accounts. It also enables the discovery of the total reach of an account, i.e. a service account for which you dare not change the password as you don’t fully know the implications of missing an instance of the account that could fail critical operations.
View full review »
Tor Nordhagen - PeerSpot reviewer
Executive Director at Semaphore

One of the best things about Thycotic is that it is very easy-to-use. It is logical, it has well-designed screens and a nice GUI interface. It has good performance and is generally a pleasure to operate.  

View full review »
Fernando Gonzalez Perez - PeerSpot reviewer
Identity and Access Management Specialist at Keywords Studios PLC

The team password vault is valuable.

View full review »
SI
Head of Platform Engineering at Ascend Group Co., Ltd.

The secret template, password rotation, and recording sessions are the most valuable.

View full review »
PV
Security consultant at a financial services firm with 10,001+ employees

One valuable feature is that it will support a dedicated database. Delinea provides multiple features, like reporting and remote password changes.

View full review »
RB
Senior Quality Analyst at a computer software company with 5,001-10,000 employees

The most valuable feature of Delinea Secret Server is secret password management.

View full review »
DR
Principal Solutions Architect at a computer software company with 51-200 employees

The zero-trust PIN is a great feature of the solution.

Technical support is pretty good. 

The ability to automate is a good selling feature.

View full review »
YP
Threat Protection Architect at a consumer goods company with 10,001+ employees

What I like best about this product is the interface.

View full review »
AD
Manager at a consultancy with 1,001-5,000 employees

The most valuable feature of this solution is the random changing of passwords.

View full review »
TD
BDM at Oberig-it

The tool has many models. The tool also has a good cloud version. Also, the customers need not control any components on the solution side. The product's licensing model is also good since customers can choose a price that is most useful for them. The solution also supports password management for the users in your organization.  

View full review »
DR
Principal Solutions Architect at a computer software company with 51-200 employees

I really like the zero trust piece. 

View full review »
ML
VP - Enterprise Solutions at a comms service provider with 11-50 employees

I have found the password management and the secret management features to be the most valuable. Our customers find its ease of integration and the use of power shells really attractive.

View full review »
JK
DevOps Lead at a computer software company with 1,001-5,000 employees

The ability to manage personal passwords is what it was built for and that is what makes it most valuable.  

View full review »
PN
Manager at a consultancy with 10,001+ employees

Being an administrator, I find it really easy and computer confident, and our experience with the product is really good.

Additionally, customizations are easy.

View full review »
TS
Pre Sales/Technical Engineer at a tech services company with 11-50 employees

The session monitoring and session recording aspects of the solution are valuable to us. The fact that, as a support, you can actually monitor sessions on the fly is really helpful. A lot of sessions are live. Therefore, if anything happens within the session, there is an alert, and the security can terminate the session. 

The fact that you can go back to any other session according to user or sequence, is quite useful. You can get a nice audit of the recording sessions. It's quite deep and quite useful.

Users are able to whitelist commands. It's very helpful.

The solution provides security for certain tasks as well. There's also regression on items like passwords.

The user interface is quite good. It's very straightforward.

The reporting is very powerful.

View full review »
NF
IT Strategy Consultant with 201-500 employees

The ability to give some groups access to different kinds of databases with the storage of a password is the most valuable feature. 

View full review »
SS
Product Security Engineer
  • The overall secrets management 
  • The ability to control access by groups
  • Sharing secrets
View full review »
it_user577974 - PeerSpot reviewer
Systems Administrator at a tech services company with 501-1,000 employees

Password checkout and the ability to change a password after checkin are the most valuable features.

View full review »
AA
IT Governance, Risk & Compliance at a tech services company with 51-200 employees

Its most valuables feature are its main purpose - the password changing and the Heartbeat so the user has access to only their SVN and does not have access to any other. Thycotic's access privileged management tool allows you to grant access to users for a specific period of time and with specific attributes and privileges.

View full review »
CS
Assistant Technical Manager at a tech services company with 11-50 employees

The most valuable feature is session monitoring.

The Password Changer is a useful feature.

The reporting functionality is good.

View full review »
VG
System Analyst at a computer software company with 5,001-10,000 employees

The most valuable feature of this solution is that it provides us with a secure way of managing passwords. 

I also like the integration with the Active Directory of the Windows platform. It is really good.

Thycotic has a roadmap for moving to the cloud. The cloud version is also really good.

View full review »
JZ
Director at a tech services company with 1-10 employees

The surveillance is most valuable.

View full review »
it_user1150704 - PeerSpot reviewer
Analytické a bezpečnostní nástroje IBM at ITS

The features that we have found the most valuable are:

  • Automatic password rotation to manage the security keys.
  • Alerting of abnormal use of credentials.
  • Dramatically improving our security posture.
  • Facilitating compliance with our safety standards.
  • Multiple layers of security and access management for IT admins, robust segregation of role-based duties, and military-grade AES 256 bit encryption.
  • Database clustering, load balancing, and unlimited admin mode.
  • Out-of-the-box & custom reports.
View full review »
Buyer's Guide
Delinea Secret Server
April 2024
Learn what your peers think about Delinea Secret Server. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,847 professionals have used our research since 2012.