We performed a comparison between Delinea Secret Server and Microsoft Purview Privileged Access Management based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."Support is helpful."
"I like the one-way hash, as well as the ability to store it in the cloud and access it from anywhere."
"Its technical support is good."
"Its most valuable feature is its main purpose - the password changing and the Heartbeat so the user has access to only their SVN and does not have access to any other. Thycotic's access privileged management tool allows you to grant access to users for a specific period of time and with specific attributes and privileges."
"It is able to manage storage and use of personal passwords."
"The "App to App" feature has been most impactful. It allows secure communication between applications without requiring direct user access, which is crucial for several applications."
"The solution is good."
"The discovery engine is really robust and flexible. It had some session management features that are better compared to some other vendors. Overall the GUI is very good and straightforward to operate compared to other solutions. For example, CyberArk and Hitachi tend to be hard to navigate."
"The ability to provide just-in-time privileged access and set specific parameters for access duration is highly beneficial."
"In many PAM tools, when users request a password checkout, they need to provide justification. However, in my experience across four organizations, nobody actually reads the justifications. Users can simply type anything and get the password. This becomes a risk and compliance issue. There needs to be continuous improvement in this area, focusing on problem identification and mitigation strategies."
"Although the password policy was interesting, the default setting was inadequate."
"We faced some upgrade issues, especially during the management and administration parts. I found it less straightforward than on many other platforms, even outside password managers."
"One thing that I wish they would do is to have a Kubernetes or container-based deployment supported, but they're not quite there yet. Containerization or support for containerization would be fantastic."
"I would like to see the shadowing of ongoing terminal sessions (Remote Desktop Mirroring)."
"When working with larger enterprises Thycotic Secret Server becomes a little cumbersome to work with because they do not allow as much flexibility as some of the other competitors, such as CyberArk. Thycotic Secret Server could improve by being more flexible when it comes to customization, and increase the number of API integrations."
"There are some things that I know are really important to include like A/B version features which are available in Windows. I would say that they should be included in the road map."
"Its remote support feature needs improvement."
"There's room for improvement in Microsoft's documentation, as it often lacks clarity."
Delinea Secret Server is ranked 2nd in Privileged Access Management (PAM) with 47 reviews while Microsoft Purview Privileged Access Management is ranked 11th in Privileged Access Management (PAM) with 1 review. Delinea Secret Server is rated 8.2, while Microsoft Purview Privileged Access Management is rated 9.0. The top reviewer of Delinea Secret Server writes "Effective for password rotation policies triggered by audit requirements, it helps maintain compliance standards and seamless integration with third-party tools ". On the other hand, the top reviewer of Microsoft Purview Privileged Access Management writes "Enhanced security and simplified management offering a centralized solution with granular settings". Delinea Secret Server is most compared with CyberArk Privileged Access Manager, Azure Key Vault, HashiCorp Vault, IBM Security Secret Server and ManageEngine PAM360, whereas Microsoft Purview Privileged Access Management is most compared with CyberArk Privileged Access Manager and Delinea Privileged Access Service.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.