We performed a comparison between Centrify Endpoint Services [EOL] and Delinea Secret Server based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, SentinelOne, CrowdStrike and others in Endpoint Protection Platform (EPP)."NGAV and EDR features are outstanding."
"The price is low and quite competitive with others."
"This is stable and scalable."
"Fortinet has helped free up around 20 percent of our staff's time to help us out."
"Forensics is a valuable feature of Fortinet FortiEDR."
"The most valuable feature is the analysis, because of the beta structure."
"I like FortiClient EMS. FortiEDR has a lot of great features like lockdown mode, remote wipes, and encryption. I can set malware outbreak policies and controls for detecting abnormalities. You can also simulate phishing attacks."
"We have FortiEDR installed on all our systems. This protects them from any threats."
"The most valuable feature in Centrify is the ability to authenticate in a Linux environment, because this is what my customers were looking for. They are coming from a Linux environment, so they appreciate the identity and access management for allowing Linux workloads to authenticate securely."
"We implemented the product for our privileged identities. We have configured them in check-in/check-out rotation. Delinea Secret Server rotates the password each time a privileged identity is checked in, making the password valid only for some time."
"One valuable feature is that it will support a dedicated database. Delinea provides multiple features, like reporting and remote password changes."
"The most valuable feature of Delinea Secret Server is secret password management."
"It offers the possibility of secure administration of hardware devices, as well as Linux systems administration from a Windows environment."
"The product provides a native user experience without requiring users to install additional software or agents."
"The GUI interface is well-designed and user-friendly."
"The "App to App" feature has been most impactful. It allows secure communication between applications without requiring direct user access, which is crucial for several applications."
"Its most valuable feature is its main purpose - the password changing and the Heartbeat so the user has access to only their SVN and does not have access to any other. Thycotic's access privileged management tool allows you to grant access to users for a specific period of time and with specific attributes and privileges."
"The dashboard isn't easy to access and manage."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"Cannot be used on mobile devices with a secure connection."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"We've had a lot of false positives; things incorrectly flagged that require manual configuration to allow. Even worse, after we allow a legitimate program, it sometimes gets flagged again after an update. This has caused a lot of extra work for my team."
"We find the solution to be a bit expensive."
"The only minor concern is occasional interference with desired programs."
"They can include the automation for the realtime updates. We have a network infrastructure with remote sites. Whenever they send updates, they are not automated. We have to go into the console and push those updates. I wish it was more automated. The update file is currently around 31 MB. It could be smaller."
"What can be improved in Centrify is the integration between the on-premise environment, specifically for Linux environments with the cloud infrastructure, such as Microsoft as it was during my time as a solution architect."
"Its remote support feature needs improvement."
"When working with larger enterprises Thycotic Secret Server becomes a little cumbersome to work with because they do not allow as much flexibility as some of the other competitors, such as CyberArk. Thycotic Secret Server could improve by being more flexible when it comes to customization, and increase the number of API integrations."
"They could improve the container platform and SPO."
"This product is excellent in every way except minor details in handling extremely large environments."
"The solution could be more user-friendly."
"I think that the main interface should integrate better with non-standard applications and clients, to connect with other systems."
"The UI needs improvement because the interface is a little clumsy."
"Support could be better. I have heard about a lot of problems in the Bangladesh market. People are saying that there are support issues. So, Delinea should focus on support and services."
Earn 20 points
Centrify Endpoint Services [EOL] doesn't meet the minimum requirements to be ranked in Endpoint Protection Platform (EPP) while Delinea Secret Server is ranked 6th in Enterprise Password Managers with 47 reviews. Centrify Endpoint Services [EOL] is rated 7.0, while Delinea Secret Server is rated 8.2. The top reviewer of Centrify Endpoint Services [EOL] writes "Has system multi-factor authentication abilities but is lacking connection between on-premise and cloud-based solutions". On the other hand, the top reviewer of Delinea Secret Server writes "Effective for password rotation policies triggered by audit requirements, it helps maintain compliance standards and seamless integration with third-party tools ". Centrify Endpoint Services [EOL] is most compared with , whereas Delinea Secret Server is most compared with CyberArk Privileged Access Manager, Azure Key Vault, HashiCorp Vault, IBM Security Secret Server and ManageEngine PAM360.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.