Delinea Secret Server Primary Use Case
We've used it for auto-discovery, and password management on mainframes, networks, applications, and firewalls. We've also used it for password rotation.
We use it for credential management, including rotation for both human and non-human accounts, as well as session monitoring.
View full review »I need to look at using their tool's true multi-tenancy capability to cater to multiple customers within a single platform architecture without compromising security. Information security is key, and an MSP model's objective is to have a privileged access management solution.
Secret Server is called a secret server for a reason. You can create multiple secret servers underneath the parent for every secret server. Every "parent" will be considered as one customer, secret server #1, secret server #2, etc. Under every secret server, you can create multiple secret servers. Those secrets will belong to customers A, B, and C, respectively. If I want to access a customer's Windows environment under a secret server, I will create a secret group called "Windows." This group will be onboarded with customer A's Windows environments within their secret server. We have a logically separated environment as an MSP model.
View full review »We primarily use the solution for privileged access management.
Delinea Secret Server is like a vault for the users to store their device passwords and is also used for auditing sessions monitoring password production, et cetera.
View full review »Buyer's Guide
Delinea Secret Server
April 2024
Learn what your peers think about Delinea Secret Server. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,496 professionals have used our research since 2012.
The primary use case for Delinea Secret Server is to sort the privileged passwords. It can also change passwords after a set period or revoke passwords when someone leaves the company. Delinea needs to be on-premises because Turkish regulations do not allow cloud-based security solutions for some sectors.
We use the solution to control privileged accounts in our organization. We use it to discover and track privileged account usage and to ensure accountability. For example, we can use Delinea Secret Server to see who registers accounts and when.
SI
Sharkrit Impat
Head of Platform Engineering at Ascend Group Co., Ltd.
We use Delinea Secret Server for pharmacy equipment management. We use a secret vault. We use it as a temporary hold, and we use it for password rotation.
View full review »IS
IrmaShattuck
Program Manager at a recruiting/HR firm with 5,001-10,000 employees
We recently had to reset every company password globally, which I am in the process of undertaking at the moment.
It seems to be working well for us. While we did encounter several glitches, I believe this owed itself to the solution not having been fully deployed, even though they owned it for some time. We have since deployed it fully and are learning as we go, especially as concerns the various international laws, such as the GDPR. Yet, it works well for us.
I use Delinea Secret Server for demonstration purposes while talking to clients, for internet access management, and user monitoring.
View full review »I use it for laboratory practice before implementing it for end-users. Specifically, I use the Linux server to discover related accounts in our domain, pull them into the solution, manage their passwords, carry out session monitoring, and practice workflow, which allows for leading access to better-trained individuals when needed. I also make presentations to clients concerning this type of solution.
View full review »MN
reviewer1643352
Manager at a consultancy with 10,001+ employees
We provide Thycotic Secret Server as well as use it.
Thycotic Secret Server is used for data security.
View full review »DR
Darius Radford
Principal Solutions Architect at a computer software company with 51-200 employees
We have used Thycotic Secret Server for some secret management and integrated it with some applications. We mainly used it for Privileged Account Discovery and the management of them.
View full review »We use Delinea Secret Server as a PAM solution. It helps us to check, rotate, and store passwords.
View full review »HG
Himanshu-Gupta
Senior System Analyst at a government with 1,001-5,000 employees
We are selling this solution. Different customers have different use cases for it, which vary from our own. We do not use it for our organization; rather, we deploy and configure it for our customers to whom we sell it.
View full review »Our clients use this solution to manage privileged accounts, meaning their administrative accounts. Whether it's active directories, co-banking solutions, or databases, the solution will take over all the privileged accounts on the network or in the infrastructure.
RR
reviewer1440831
Senior Security Engineer at a insurance company with 10,001+ employees
We use the solution to store all of our secrets. For example, passwords, usernames, and other credentials. These credentials can be from many places, such as service accounts, bank accounts, and key pairs. It also has the functionality if, for example, a contractor requests to log into a specific server, they would use the Secret Server to log in to the server session that is monitored and he or she would be logging in without the actual real credentials. It is also on a rotating password system.
View full review »ZG
Zebulon Griggs
Chief Executive Officer at Zigabyte
We are a Thycotic partner. We use Thycotic extensively, and we also do a lot of implementations for them. Generally, it is for privilege access management and session recording capabilities.
A few clients have used it as a proxy capability, and the functionality there is that the privileged accounts have access from their workstations to the servers. In order to get access, they have to be basically proxied through Thycotic for an SSH or RDP connection, and then you have a control capability for auditing and session recording.
We have used pretty much every version since 2018, including the latest version. We have deployed it to AWS and on-prem.
View full review »FP
FabioPericoli
Director / Engineer at Provincia
I'm a director/engineer and we partnered with the company. Our primary use case was for a project that we followed from an administrator point of view, not the end-user point of view. My responsibility was to manage the migration-related to the project, installing and configuring the infrastructure, creating policies and so on. Technically speaking, it was at a high level. All of my clients are enterprise companies.
SM
Siddiq Mohiuddin Mohammed
Team Lead, System Infrastructure at GAL
We use the solution for automatic password rotation and managing system admin and database access.
View full review »PR
Peter Rajic
Technology Infrastructure Senior Analyst at a educational organization with 501-1,000 employees
We intend to replace our pairing password management solution with something more enterprise-friendly.
We are currently conducting a demonstration with Thycotic Secret Server.
I've only used this solution a few times as a demo and haven't explored everything it has to offer, but I have experience integrating it with our Active Directory and setting up the server.
View full review »The primary use case is managing access for user groups and individuals in a very large environment.
View full review »RB
reviewer1943931
Senior Quality Analyst at a computer software company with 5,001-10,000 employees
We use Delinea Secret Server for password rotations for end-point access.
View full review »DR
reviewer1642422
Principal Solutions Architect at a computer software company with 51-200 employees
One of our clients primarily uses it for automation capabilities.
View full review »YP
reviewer1384200
Threat Protection Architect at a consumer goods company with 10,001+ employees
We primarily use this product for password cycling.
View full review »ER
reviewer2318688
Infrastructure Engineer at a insurance company with 1,001-5,000 employees
It works for us, and the administration part, while functional, seems less straightforward, especially during upgrades. That's what I've noticed.
View full review »AD
Manager70c3
Manager at a consultancy with 1,001-5,000 employees
It's a password vault.
View full review »DR
reviewer1642422
Principal Solutions Architect at a computer software company with 51-200 employees
We use the most updated version.
One of our customers wanted automation in respect of the solution.
View full review »JK
reviewer1386936
DevOps Lead at a computer software company with 1,001-5,000 employees
The most common use case will be just for keeping personal passwords. There are other things that we use if for, but that is the most common use case.
View full review »TS
reviewer1284300
Pre Sales/Technical Engineer at a tech services company with 11-50 employees
I primarily use the solution for PRAM management, privileged access management, and other similar tasks as well. We submit credentials and replicate and post them directly behind the scenes. There's also some session monitoring and issue recording, etc. that we handle.
View full review »NF
Student9846
IT Strategy Consultant with 201-500 employees
Our primary use case is for password management.
View full review »SS
ProductSfdcf
Product Security Engineer
We use it for managing secrets and distributing them to our users.
View full review »AA
reviewer1536939
IT Governance, Risk & Compliance at a tech services company with 51-200 employees
We use Thycotic Secret Server for the lab environment. We have it as a vault for users and in a client project. We have set it as the users' mass login to the secret server so they have access to their SVN. It is for remote access, password changing, etc...
We use it on premise, mostly. I haven't used the cloud version, but we are discussing with the client about using the cloud deployment.
View full review »CS
reviewer1236738
Assistant Technical Manager at a tech services company with 11-50 employees
We are a system integrator and this is one of the solutions that we implement for our clients.
It is used for privileged access management for networks, servers, applications, databases, and more.
View full review »VG
reviewer1349928
System Analyst at a computer software company with 5,001-10,000 employees
I'm working in India in a private IT firm and we are working as a consultant for Thycotic, and Azure Development.
View full review »This solution provides us with increased security when working with privileged accounts. It has well-arranged and detailed logging of privileged accounts. It offers the possibility of secure administration of hardware devices, as well as Linux systems administration from a Windows environment.
View full review »Buyer's Guide
Delinea Secret Server
April 2024
Learn what your peers think about Delinea Secret Server. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,496 professionals have used our research since 2012.