Delinea Secret Server Primary Use Case

Avinash Gopu. - PeerSpot reviewer
Associate VP & Cyber Security Specialist at US Bank

We've used it for auto-discovery, and password management on mainframes, networks, applications, and firewalls. We've also used it for password rotation.

We use it for credential management, including rotation for both human and non-human accounts, as well as session monitoring.

View full review »
Siva Jp - PeerSpot reviewer
Principle Architecture at LTIMINDTREE

I need to look at using their tool's true multi-tenancy capability to cater to multiple customers within a single platform architecture without compromising security. Information security is key, and an MSP model's objective is to have a privileged access management solution.

Secret Server is called a secret server for a reason. You can create multiple secret servers underneath the parent for every secret server. Every "parent" will be considered as one customer, secret server #1, secret server #2, etc. Under every secret server, you can create multiple secret servers. Those secrets will belong to customers A, B, and C, respectively. If I want to access a customer's Windows environment under a secret server, I will create a secret group called "Windows." This group will be onboarded with customer A's Windows environments within their secret server. We have a logically separated environment as an MSP model.

View full review »
NajibulIslam - PeerSpot reviewer
Technical Account Manager (Information Security) at Trustaira

We primarily use the solution for privileged access management. 

Delinea Secret Server is like a vault for the users to store their device passwords and is also used for auditing sessions monitoring password production, et cetera.

View full review »
Buyer's Guide
Delinea Secret Server
April 2024
Learn what your peers think about Delinea Secret Server. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
769,065 professionals have used our research since 2012.
Meo Ist - PeerSpot reviewer
Senior Product Manager and Technology Consultant at Barikat

The primary use case for Delinea Secret Server is to sort the privileged passwords. It can also change passwords after a set period or revoke passwords when someone leaves the company. Delinea needs to be on-premises because Turkish regulations do not allow cloud-based security solutions for some sectors. 

View full review »
Kaspars Vasilevskis - PeerSpot reviewer
Security Delivery Associate Manager at Accenture

We use the solution to control privileged accounts in our organization. We use it to discover and track privileged account usage and to ensure accountability. For example, we can use Delinea Secret Server to see who registers accounts and when.

View full review »
SI
Head of Platform Engineering at Ascend Group Co., Ltd.

We use Delinea Secret Server for pharmacy equipment management. We use a secret vault. We use it as a temporary hold, and we use it for password rotation.

View full review »
IS
Program Manager at a recruiting/HR firm with 5,001-10,000 employees

We recently had to reset every company password globally, which I am in the process of undertaking at the moment. 

It seems to be working well for us. While we did encounter several glitches, I believe this owed itself to the solution not having been fully deployed, even though they owned it for some time. We have since deployed it fully and are learning as we go, especially as concerns the various international laws, such as the GDPR. Yet, it works well for us. 

View full review »
Md MustafizurRahman - PeerSpot reviewer
Assistant Manager, Cyber Security at BracNet Limited

I use Delinea Secret Server for demonstration purposes while talking to clients, for internet access management, and user monitoring.

View full review »
Chijioke Ugwu - PeerSpot reviewer
Presales Executive at Bludive technologies

I use it for laboratory practice before implementing it for end-users. Specifically, I use the Linux server to discover related accounts in our domain, pull them into the solution, manage their passwords, carry out session monitoring, and practice workflow, which allows for leading access to better-trained individuals when needed. I also make presentations to clients concerning this type of solution.

View full review »
MN
Manager at a consultancy with 10,001+ employees

We provide Thycotic Secret Server as well as use it.

Thycotic Secret Server is used for data security.

View full review »
DR
Principal Solutions Architect at a computer software company with 51-200 employees

We have used Thycotic Secret Server for some secret management and integrated it with some applications. We mainly used it for Privileged Account Discovery and the management of them.

View full review »
Rick-Nelson - PeerSpot reviewer
Lead IT Security Engineer,IAM at a insurance company with 1,001-5,000 employees

We use Delinea Secret Server as a PAM solution. It helps us to check, rotate, and store passwords. 

View full review »
HG
Senior System Analyst at a government with 1,001-5,000 employees

We are selling this solution. Different customers have different use cases for it, which vary from our own. We do not use it for our organization; rather, we deploy and configure it for our customers to whom we sell it.

View full review »
Jared Ochieng - PeerSpot reviewer
Information Technology Security Specialist at infoark

Our clients use this solution to manage privileged accounts, meaning their administrative accounts. Whether it's active directories, co-banking solutions, or databases, the solution will take over all the privileged accounts on the network or in the infrastructure. 

View full review »
RR
Senior Security Engineer at a insurance company with 10,001+ employees

We use the solution to store all of our secrets. For example, passwords, usernames, and other credentials. These credentials can be from many places, such as service accounts, bank accounts, and key pairs. It also has the functionality if, for example, a contractor requests to log into a specific server, they would use the Secret Server to log in to the server session that is monitored and he or she would be logging in without the actual real credentials. It is also on a rotating password system.

View full review »
ZG
Chief Executive Officer at Zigabyte

We are a Thycotic partner. We use Thycotic extensively, and we also do a lot of implementations for them. Generally, it is for privilege access management and session recording capabilities. 

A few clients have used it as a proxy capability, and the functionality there is that the privileged accounts have access from their workstations to the servers. In order to get access, they have to be basically proxied through Thycotic for an SSH or RDP connection, and then you have a control capability for auditing and session recording.

We have used pretty much every version since 2018, including the latest version. We have deployed it to AWS and on-prem.

View full review »
FP
Director / Engineer at Provincia

I'm a director/engineer and we partnered with the company. Our primary use case was for a project that we followed from an administrator point of view, not the end-user point of view. My responsibility was to manage the migration-related to the project, installing and configuring the infrastructure, creating policies and so on. Technically speaking, it was at a high level. All of my clients are enterprise companies.

View full review »
SM
Team Lead, System Infrastructure at GAL

We use the solution for automatic password rotation and managing system admin and database access.

View full review »
PR
Technology Infrastructure Senior Analyst at a educational organization with 501-1,000 employees

We intend to replace our pairing password management solution with something more enterprise-friendly.

We are currently conducting a demonstration with Thycotic Secret Server.

I've only used this solution a few times as a demo and haven't explored everything it has to offer, but I have experience integrating it with our Active Directory and setting up the server.

View full review »
Tor Nordhagen - PeerSpot reviewer
Executive Director at Semaphore

The primary use case is managing access for user groups and individuals in a very large environment.  

View full review »
RB
Senior Quality Analyst at a computer software company with 5,001-10,000 employees

We use Delinea Secret Server for password rotations for end-point access.

View full review »
DR
Principal Solutions Architect at a computer software company with 51-200 employees

One of our clients primarily uses it for automation capabilities. 

View full review »
YP
Threat Protection Architect at a consumer goods company with 10,001+ employees

We primarily use this product for password cycling.

View full review »
ER
Infrastructure Engineer at a insurance company with 1,001-5,000 employees

It works for us, and the administration part, while functional, seems less straightforward, especially during upgrades. That's what I've noticed.  

View full review »
AD
Manager at a consultancy with 1,001-5,000 employees

It's a password vault.

View full review »
DR
Principal Solutions Architect at a computer software company with 51-200 employees

We use the most updated version. 

One of our customers wanted automation in respect of the solution. 

View full review »
JK
DevOps Lead at a computer software company with 1,001-5,000 employees

The most common use case will be just for keeping personal passwords. There are other things that we use if for, but that is the most common use case.  

View full review »
TS
Pre Sales/Technical Engineer at a tech services company with 11-50 employees

I primarily use the solution for PRAM management, privileged access management, and other similar tasks as well. We submit credentials and replicate and post them directly behind the scenes. There's also some session monitoring and issue recording, etc. that we handle.

View full review »
NF
IT Strategy Consultant with 201-500 employees

Our primary use case is for password management. 

View full review »
SS
Product Security Engineer

We use it for managing secrets and distributing them to our users.

View full review »
AA
IT Governance, Risk & Compliance at a tech services company with 51-200 employees

We use Thycotic Secret Server for the lab environment. We have it as a vault for users and in a client project. We have set it as the users' mass login to the secret server so they have access to their SVN. It is for remote access, password changing, etc...

We use it on premise, mostly. I haven't used the cloud version, but we are discussing with the client about using the cloud deployment.

View full review »
CS
Assistant Technical Manager at a tech services company with 11-50 employees

We are a system integrator and this is one of the solutions that we implement for our clients.

It is used for privileged access management for networks, servers, applications, databases, and more.

View full review »
VG
System Analyst at a computer software company with 5,001-10,000 employees

I'm working in India in a private IT firm and we are working as a consultant for Thycotic, and Azure Development.

View full review »
it_user1150704 - PeerSpot reviewer
Analytické a bezpečnostní nástroje IBM at ITS

This solution provides us with increased security when working with privileged accounts. It has well-arranged and detailed logging of privileged accounts. It offers the possibility of secure administration of hardware devices, as well as Linux systems administration from a Windows environment.

View full review »
Buyer's Guide
Delinea Secret Server
April 2024
Learn what your peers think about Delinea Secret Server. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
769,065 professionals have used our research since 2012.