![]() | ChrisMorrison Technical Engineer at a tech services company |
![]() | Bohumil Glac Analytické a bezpečnostní nástroje IBM at ITS |
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The privileged account management feature is what I like most."
"This is a cloud-based application, which makes it very easy to deploy."
"It offers the possibility of secure administration of hardware devices, as well as Linux systems administration from a Windows environment."
"Ease of use because of its monolithic software."
"The most valuable feature is session monitoring."
"The user interface is quite good. It's very straightforward."
"I find it really easy and computer confident, and the experience with the product is really good. Additionally, customizations are easy."
"The GUI interface is well-designed and user-friendly."
"What I like best about this product is the interface."
"I have found the password management and the secret management features to be the most valuable. Our customers find its ease of integration and the use of power shells really attractive."
"The initial setup is a bit complex."
"This solution needs better integration with third-party solutions because their ability to support other tools is very weak."
"I would like to see the shadowing of ongoing terminal sessions (Remote Desktop Mirroring)."
"Documentation could be improved if they were to include more about connectors. There is not enough documentation."
"Having more detailed reporting would improve this solution."
"There could be tweaks here and there. For example, instead of going to one main function to do this and another main function to do that, the solution could remap the user interface so that a person only has to go through one function. The way that function branches off should make a bit more sense."
"There are some things that I know are really important to include like A/B version features which are available in Windows. I would say that they should be included in the road map."
"This product is excellent in every way except minor details in handling extremely large environments."
"I think that the main interface should integrate better with non-standard applications and clients, to connect with other systems."
"We always ask for partner enablement, which is more like a soft requirement rather than a product requirement. It would be great if they can provide us deeper knowledge of their products for integration."
"It is sad that people with a limited budget won't be able to afford it."
"The price model is based on the number of devices and opposed to the number of users, and it is not very flexible."
More Centrify Privileged Access Service Pricing and Cost Advice »
"The price of this solution is good."
"Pricing is comparable to competing products."
"The pricing is standard in this business and we have no complaints about it."
"Its price is okay. We don't compete on pricing. We seldom use price to win over our competitors. We prefer it this way because if we can sustain the price, we make more margin as well. We don't want the price to go down to the bottom where despite the win, there's no margin at all."
"Secret Server is expensive when compared to the cost to some alternatives."
"There are different plans and additional licensing costs that can be instituted for add-ons."
Centrify Privilege Service provides all of your IT administration teams with secure, granular access to infrastructure regardless of location, and without the hassles of a VPN.
Secure browser-based access Authorized IT users launch management sessions for resources directly from the Privilege Service portal. Sessions use SSH and RDP protocols, and are always protected end-to-end.
Access across organizational boundaries Privilege Service enables you to authenticate your IT users through Active Directory, LDAP Centrify Cloud Directory, or Google G Suite
Directory. You can use one or any combination of these identity stores to grant granular access to employees, business partners and outside vendors.
Grant access to specific resources Unlike a VPN, Privilege Service enables you to grant access to
resources on a on a per-resource basis. This means that you can easily give your internal IT admins access to as much of your infrastructure as necessary, while limiting access by an outsourced
team to only the servers and network hardware their business role or IT function requires.
Access from any location Your IT admins can log in and securely access resources from any location that can reach the Privilege Service. For user logins outside the corporate network, you can require Centrify’s built-in multi-factor authentication for security stronger than a user name and password.
Secret Server is a fully-featured Privileged Access Management (PAM) solution available both on premise and in the cloud. It empowers security and IT ops teams to secure and manage all types of privileged accounts and offers the fastest time to value of any PAM solution.
Centrify Privileged Access Service is ranked 13th in Enterprise Password Managers with 2 reviews while Thycotic Secret Server is ranked 2nd in Enterprise Password Managers with 9 reviews. Centrify Privileged Access Service is rated 6.0, while Thycotic Secret Server is rated 8.2. The top reviewer of Centrify Privileged Access Service writes "Has good privileged account management, multifactor authentication and auditing features". On the other hand, the top reviewer of Thycotic Secret Server writes "Excellent access management that can serve very large networks". Centrify Privileged Access Service is most compared with CyberArk PAS, HashiCorp Vault, BeyondTrust Endpoint Privilege Management, CyberArk Enterprise Password Vault and ARCON Privileged Access Management, whereas Thycotic Secret Server is most compared with CyberArk PAS, HashiCorp Vault, Microsoft Azure Key Vault, IBM Security Secret Server and One Identity Manager. See our Centrify Privileged Access Service vs. Thycotic Secret Server report.
See our list of best Enterprise Password Managers vendors and best Privileged Access Management vendors.
We monitor all Enterprise Password Managers reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.