Thycotic Secret Server logo

Thycotic Secret Server

Easy-to-use, full-featured privileged access management
2
1
+ 1
0

What is Thycotic Secret Server?

It is an enterprise-grade, privileged access management solution that is quickly deployable and easily managed. You can automatically discover and manage your privileged accounts through an intuitive interface, protecting against malicious activity, enterprise-wide.
Thycotic Secret Server is a tool in the Cloud Access Management category of a tech stack.

Who uses Thycotic Secret Server?

Developers

Thycotic Secret Server Integrations

Thycotic Secret Server's Features

  • Get up and running fast with solutions for privileged account discovery, turnkey installation and out-of-the-box auditing and reporting tools
  • Manage multiple databases, software applications, hypervisors, network devices, and security tools, even in large-scale, distributed environments
  • Create endless customizations with direct control to on-premise and cloud PAM. Work with professional services or use your own experts

Thycotic Secret Server Alternatives & Comparisons

What are some alternatives to Thycotic Secret Server?
AWS IAM
It enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.
Teleport
Teleport makes it easy for users to securely access infrastructure and meet the toughest compliance requirements.
AWS Service Catalog
AWS Service Catalog allows IT administrators to create, manage, and distribute catalogs of approved products to end users, who can then access the products they need in a personalized portal. Administrators can control which users have access to each application or AWS resource to enforce compliance with organizational business policies. AWS Service Catalog allows your organization to benefit from increased agility and reduced costs because end users can find and launch only the products they need from a catalog that you control.
HashiCorp Boundary
Simple and secure remote access — to any system anywhere based on trusted identity. It enables practitioners and operators to securely access dynamic hosts and services with fine-grained authorization without requiring direct network access.
SailPoint
It provides enterprise identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.
See all alternatives
Related Comparisons
No related comparisons found

Thycotic Secret Server's Followers
1 developers follow Thycotic Secret Server to keep up with related blogs and decisions.