Thycotic Secret Server Overview

Thycotic Secret Server is the #2 ranked solution in our list of top Enterprise Password Managers. It is most often compared to CyberArk Privileged Access Manager: Thycotic Secret Server vs CyberArk Privileged Access Manager

What is Thycotic Secret Server?

Secret Server is a fully-featured Privileged Access Management (PAM) solution available both on premise and in the cloud. It empowers security and IT ops teams to secure and manage all types of privileged accounts and offers the fastest time to value of any PAM solution.

Thycotic Secret Server Buyer's Guide

Download the Thycotic Secret Server Buyer's Guide including reviews and more. Updated: July 2021

Thycotic Secret Server Customers

Secure-24, University of San Diego, International Rescue Committee, San Francisco Ballet, Perkins Coie, University of San Diego, D.S.S. Limited, Turbo's Hoet, Eclipse Computing, Cathay Bank, Stellarise, J&R Consulting

Thycotic Secret Server Video

Pricing Advice

What users are saying about Thycotic Secret Server pricing:
  • "Pricing is comparable to competing products."
  • "Secret Server is expensive when compared to the cost to some alternatives."
  • "There are different plans and additional licensing costs that can be instituted for add-ons."
  • "Its price is okay. We don't compete on pricing. We seldom use price to win over our competitors. We prefer it this way because if we can sustain the price, we make more margin as well. We don't want the price to go down to the bottom where despite the win, there's no margin at all."
  • "There is an annual license fee per user and the price is fair."
  • "The price of this solution is good."

Filter Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Tor Nordhagen
Executive Director at Semaphore
Real User
Top 20
Excellent access management that can serve very large networks

What is our primary use case?

The primary use case is managing access for user groups and individuals in a very large environment.

Pros and Cons

  • "The GUI interface is well-designed and user-friendly."
  • "This product is excellent in every way except minor details in handling extremely large environments."

What other advice do I have?

On a scale from one to ten where one is the worst and ten is the best, I would rate Thycotic as probably a nine. That is only because I have to rank them slightly lower after we decided to make the switch to CyberArk, and replacing a product that is a ten would not make a lot of sense. So a nine-out-of-ten it is. Thycotic is a product that is so friendly that it can be used by nearly anyone and everyone, and that is a good place to be. As for the limitations in a very large environment, Thycotic could invest in making changes in the product to handle structuring in a segmented way. It would be…
TS
Pre Sales/Technical Engineer at a tech services company with 11-50 employees
Real User
Good user interface and session monitoring and easy to set up

What is our primary use case?

I primarily use the solution for PRAM management, privileged access management, and other similar tasks as well. We submit credentials and replicate and post them directly behind the scenes. There's also some session monitoring and issue recording, etc. that we handle.

Pros and Cons

  • "The user interface is quite good. It's very straightforward."
  • "There could be tweaks here and there. For example, instead of going to one main function to do this and another main function to do that, the solution could remap the user interface so that a person only has to go through one function. The way that function branches off should make a bit more sense."

What other advice do I have?

I have a lot of hands-on experience with the solution and I present it to customers and do all the POCs for them. I'd recommend the solution and advise others to look at cloud options, as most companies are moving to the cloud anyway right now. It's flexible, so users can deploy it both on-prem or on the cloud. There are lots of great custom features and network monitoring capabilities. You can also patch the privileged behavior and it will, on the fly, give you nice digital printouts with privileged behavior also. If your system admin or one of your admins suddenly acts strangely, even at 2…
Learn what your peers think about Thycotic Secret Server. Get advice and tips from experienced pros sharing their opinions. Updated: July 2021.
522,693 professionals have used our research since 2012.
Zebulon Griggs
Chief Executive Officer at Zigabyte
Real User
Windows-based with a good function set, easy to deploy, and capable of scaling up and out depending on your needs

What is our primary use case?

We are a Thycotic partner. We use Thycotic extensively, and we also do a lot of implementations for them. Generally, it is for privilege access management and session recording capabilities. A few clients have used it as a proxy capability, and the functionality there is that the privileged accounts have access from their workstations to the servers. In order to get access, they have to be basically proxied through Thycotic for an SSH or RDP connection, and then you have a control capability for auditing and session recording. We have used pretty much every version since 2018, including the… more »

Pros and Cons

  • "I like that it is Windows-based. It is good that primarily, it is not an appliance. Some of the other applications in the space, such as a Quest Software CPAM or a Safeguard, are appliances, so you can't deploy the ends of them. With Thycotic, you can either install your Temporal Protection module physically in the VM host, or you can use BouncyCastle for high-security module capabilities."
  • "One thing that I wish they would do is to have a Kubernetes or container-based deployment supported, but they're not quite there yet. Containerization or support for containerization would be fantastic."

What other advice do I have?

It is a kind of self-serving advice, but I would advise getting a partner to deploy it for you. There are a lot of really good partners out there, not just us. In terms of the maturity of their product, there are a lot of Enterprise capabilities that they haven't yet brought into the market, but after it has been called out to them that there is a customer who needs a capability, they're very quick and responsive around doing development to get that capability in, which is something I like. There was an Enterprise scalability capability where you have high availability and multi-site failover…
JK
DevOps Lead at a computer software company with 1,001-5,000 employees
Real User
Top 5Leaderboard
It performs its basic use case with no downtime but its API is no good

What is our primary use case?

The most common use case will be just for keeping personal passwords. There are other things that we use if for, but that is the most common use case.

Pros and Cons

  • "It is able to manage storage and use of personal passwords."
  • "There has been no downtime this year."
  • "The API is no good."
  • "It is expensive compared to other solutions in this category and for what it does."

What other advice do I have?

I would not recommend this product. I would not because the basic functionality is okay, but we need some API access to use KPI (Key Performance Indicator) properly. We also need to automate some stuff using this secure vault. Attempting to do that is almost impossible because of the low quality of the API. Me, speaking as a lead DevOps, I would not recommend it for this office. It is not the best choice for what we need. On a scale from one to ten (where one is the worst and ten is the best), I would rate this product differently depending on what level or type of user is using the product…
FabioPericoli
Director / Engineer at Provincia
Real User
Top 10
Monolithic software that is easy to use but the documentation is insufficient

What is our primary use case?

I'm a director/engineer and we partnered with the company. Our primary use case was for a project that we followed from an administrator point of view, not the end-user point of view. My responsibility was to manage the migration-related to the project, installing and configuring the infrastructure, creating policies and so on. Technically speaking, it was at a high level. All of my clients are enterprise companies.

Pros and Cons

  • "Ease of use because of its monolithic software."
  • "Documentation could be improved if they were to include more about connectors. There is not enough documentation."

What other advice do I have?

In general, I would recommend the product. It's very good and is cheaper than CyberArk. It's something that a team leader or project manager would take into consideration because even the cost of the license is something to keep in mind when planning a project. It really depends on the company's requirements.
ML
VP - Enterprise Solutions at a comms service provider with 11-50 employees
Real User
Top 10
Its ease of integration and the use of power shells are really attractive features

Pros and Cons

  • "I have found the password management and the secret management features to be the most valuable. Our customers find its ease of integration and the use of power shells really attractive."
  • "We always ask for partner enablement, which is more like a soft requirement rather than a product requirement. It would be great if they can provide us deeper knowledge of their products for integration."

What other advice do I have?

Before suggesting or implementing a solution, getting the customer requirements is the most important, for example, whether they have an isolated site or multiple sites and whether the bandwidth between sites is sufficient. This solution is for big and medium-to-big enterprises. Small enterprises won't require Thycotic Secret Server because you need a certain number of administrators, at least 10, and enough secrets to justify it. I don't think small enterprises can afford it. It will be great if they can scale down the cloud version, in terms of the pricing and other things, to accommodate…
RR
Senior Security Engineer at a insurance company with 10,001+ employees
Real User
Top 5Leaderboard
Plenty of useful features, highly scalable, and readily available documentation

What is our primary use case?

We use the solution to store all of our secrets. For example, passwords, usernames, and other credentials. These credentials can be from many places, such as service accounts, bank accounts, and key pairs. It also has the functionality if, for example, a contractor requests to log into a specific server, they would use the Secret Server to log in to the server session that is monitored and he or she would be logging in without the actual real credentials. It is also on a rotating password system.

What is most valuable?

I have found most valuable the automatic scheduled password rotation and remote desktop monitoring. Additionally, the documentation is readily available and easy to find and the dashboard is straightforward.

What needs improvement?

I…
CS
Assistant Technical Manager at a tech services company with 11-50 employees
Reseller
Top 20
Good session monitoring and reporting capability, but more online training sessions should be available

What is our primary use case?

We are a system integrator and this is one of the solutions that we implement for our clients. It is used for privileged access management for networks, servers, applications, databases, and more.

Pros and Cons

  • "The most valuable feature is session monitoring."
  • "Having more detailed reporting would improve this solution."

What other advice do I have?

My advice to anybody who is considering this solution is to first understand their requirements and then define the scope before implementing it. The reason is that once deployed, there is a lot of integration into the existing environment. This is a product that I would recommend. I would rate this solution a seven out of ten.
See 4 more Thycotic Secret Server Reviews
Buyer's Guide
Download our free Thycotic Secret Server Report and get advice and tips from experienced pros sharing their opinions.