We just raised a $30M Series A: Read our story
2019-03-11T07:21:00Z

What is your primary use case for Thycotic Secret Server?

133

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

ITCS user
Guest
1111 Answers

author avatar
Top 5LeaderboardReal User

We use the solution to store all of our secrets. For example, passwords, usernames, and other credentials. These credentials can be from many places, such as service accounts, bank accounts, and key pairs. It also has the functionality if, for example, a contractor requests to log into a specific server, they would use the Secret Server to log in to the server session that is monitored and he or she would be logging in without the actual real credentials. It is also on a rotating password system.

2021-05-21T07:50:10Z
author avatar
Top 5Real User

The most common use case will be just for keeping personal passwords. There are other things that we use if for, but that is the most common use case.

2020-10-07T07:04:37Z
author avatar
Top 5LeaderboardReal User

We primarily use this product for password cycling.

2020-10-04T06:40:31Z
author avatar
Top 5Real User

The primary use case is managing access for user groups and individuals in a very large environment.

2020-03-18T06:06:00Z
author avatar
Top 10Real User

I primarily use the solution for PRAM management, privileged access management, and other similar tasks as well. We submit credentials and replicate and post them directly behind the scenes. There's also some session monitoring and issue recording, etc. that we handle.

2020-02-18T07:41:17Z
author avatar
Top 5LeaderboardReseller

We are a system integrator and this is one of the solutions that we implement for our clients. It is used for privileged access management for networks, servers, applications, databases, and more.

2020-02-13T07:50:59Z
author avatar
Top 5Real User

I'm a director/engineer and we partnered with the company. Our primary use case was for a project that we followed from an administrator point of view, not the end-user point of view. My responsibility was to manage the migration-related to the project, installing and configuring the infrastructure, creating policies and so on. Technically speaking, it was at a high level. All of my clients are enterprise companies.

2020-01-15T08:04:00Z
author avatar
Real User

This solution provides us with increased security when working with privileged accounts. It has well-arranged and detailed logging of privileged accounts. It offers the possibility of secure administration of hardware devices, as well as Linux systems administration from a Windows environment.

2019-07-22T18:29:00Z
author avatar
Real User

Our primary use case is for password management.

2019-03-14T11:34:00Z
author avatar
Real User

It's a password vault.

2019-03-11T07:21:00Z
author avatar
Real User

We use it for managing secrets and distributing them to our users.

2019-03-11T07:21:00Z
Learn what your peers think about Thycotic Secret Server. Get advice and tips from experienced pros sharing their opinions. Updated: November 2021.
552,305 professionals have used our research since 2012.