2019-07-22T18:29:00Z

What is your primary use case for Thycotic Secret Server?

0

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

ITCS user
Guest
99 Answers

author avatar
Top 20Real User

We are a Thycotic partner. We use Thycotic extensively, and we also do a lot of implementations for them. Generally, it is for privilege access management and session recording capabilities. A few clients have used it as a proxy capability, and the functionality there is that the privileged accounts have access from their workstations to the servers. In order to get access, they have to be basically proxied through Thycotic for an SSH or RDP connection, and then you have a control capability for auditing and session recording. We have used pretty much every version since 2018, including the latest version. We have deployed it to AWS and on-prem.

2021-07-21T20:53:28Z
author avatar
Top 5LeaderboardReal User

We use the solution to store all of our secrets. For example, passwords, usernames, and other credentials. These credentials can be from many places, such as service accounts, bank accounts, and key pairs. It also has the functionality if, for example, a contractor requests to log into a specific server, they would use the Secret Server to log in to the server session that is monitored and he or she would be logging in without the actual real credentials. It is also on a rotating password system.

2021-05-21T07:50:10Z
author avatar
Top 5LeaderboardReal User

The most common use case will be just for keeping personal passwords. There are other things that we use if for, but that is the most common use case.

2020-10-07T07:04:37Z
author avatar
Top 5LeaderboardReal User

We primarily use this product for password cycling.

2020-10-04T06:40:31Z
author avatar
Top 20Real User

The primary use case is managing access for user groups and individuals in a very large environment.

2020-03-18T06:06:00Z
author avatar
Real User

I primarily use the solution for PRAM management, privileged access management, and other similar tasks as well. We submit credentials and replicate and post them directly behind the scenes. There's also some session monitoring and issue recording, etc. that we handle.

2020-02-18T07:41:17Z
author avatar
Top 20Reseller

We are a system integrator and this is one of the solutions that we implement for our clients. It is used for privileged access management for networks, servers, applications, databases, and more.

2020-02-13T07:50:59Z
author avatar
Top 10Real User

I'm a director/engineer and we partnered with the company. Our primary use case was for a project that we followed from an administrator point of view, not the end-user point of view. My responsibility was to manage the migration-related to the project, installing and configuring the infrastructure, creating policies and so on. Technically speaking, it was at a high level. All of my clients are enterprise companies.

2020-01-15T08:04:00Z
author avatar
Real User

This solution provides us with increased security when working with privileged accounts. It has well-arranged and detailed logging of privileged accounts. It offers the possibility of secure administration of hardware devices, as well as Linux systems administration from a Windows environment.

2019-07-22T18:29:00Z
Learn what your peers think about Thycotic Secret Server. Get advice and tips from experienced pros sharing their opinions. Updated: August 2021.
534,226 professionals have used our research since 2012.