thycotic Secret Server

Manage and protect your organisation’s most vulnerable secrets: your privileged passwords.
Please contact us for pricing.

Category: Brands: .
  • PRIVILEGED ACCOUNT MANAGEMENT. ENTERPRISE PASSWORD MANAGEMENT FOR IT ADMINS

    With Secret Server enterprise password management software, you and your colleagues can control access to critical passwords in one centralised, web-based repository. Our password management software offers permissioned users secure access to passwords and other privileged information.

    Choose the edition that is right for you. Secret Server seamlessly scales to meet your organisation’s evolving IT challenges. Gain security and reduce risk through multiple levels of auditing, monitoring, and alerts.
    Streamline IT operations with automatic password changing and account discovery. Ongoing feature development ensures the software is always up to the demands of world-class enterprises.

    Request a Web Demo Request a Free Trial

    FREE TOOL:  WEAK PASSWORD FINDER FOR ACTIVE DIRECTORY

    Fast, easy way to find weak passwords and improve your security. Get your FREE Thycotic Weak Password Finder Tool from Idency to quickly and easily identify the riskiest passwords among your Active Directory users:

    Read more

    FREE TOOL: PRIVILEGED ACCOUNT DISCOVERY FOR WINDOWS & UNIX

    When it comes to privileged account credentials, what you don’t know can (and will) hurt you.
    Privileged Account Discovery for Windows & Unix from Thycotic will save you hours of effort while making your organisation much more secure from hackers targeting your privileged account credentials – and it’s absolutely free!

    Read more (Windows) Read more (Unix)

    GDPR COMPLIANCE:

    PROTECT PRIVILEGED ACCOUNT PASSWORDS TO HELP COMPLY WITH NEW EU GENERAL DATA PROTECTION REGULATIONS.

    WHATS THE CHALLENGE

    The European Union’s new data protection framework, known as the GDPR (General Data Protection Regulation) will come into force soon.

    WHY IT’S IMPORTANT

    It affects any company doing business in the EU. Expect stronger enforcement and penalties. Failure to comply with new rules could result in fines up to 4% of firms’ total worldwide annual turnover.

    HOW THYCOTIC SOLVES IT

    Thycotic Privileged Account security solutions help you enforce security policies to protect privileged account passwords, demonstrate compliance with regulations, and establish least privilege access.

    For pricing and more information on thycotic Secret Server please contact us.
    GET IN TOUCH

  • Features

    • Active Directory provides synchronisation and authentication for easy management of permissions based on AD users and groups
    • API (Web Services) allows users the ability to integrate custom applications or third party solutions with Secret Server
    • Application Server API eliminate passwords stored in source code and config files with the Application Server API
    • Cisco Enable target specific commands on any Cisco device with Cisco Enable connection
    • CRM Integration integration with Connectwise, AutoTask and Microsoft CRM for easy organisation
    • Firefox Add-On full support for the Firefox web browser including a custom extension to access Secrets
    • HSM Integration increase the security of encrypted data with optional support for HSM integration
    • PowerShell Integration upload custom PowerShell scripts for greater flexibility making environmental changes
    • Qualys Integration perform authenticated scanning on your network with Secret Server and QualysGuard
    • Remote Desktop and PuTTY Launcher provides convenient and secure connections to Remote Desktop and SSH sessions without revealing password
    • SAML Integration enjoy single-sign on to applications and sites with available SAML integration
    • SAP Platform Support manage SAP accounts using an out of the box using a SAP Secret Template and Password Changer
    • Secret Import allows users to easily migrate existing sensitive data into Secret Server
    • Session Recording records video of privileged account sessions using PuTTY and Remote Desktop
    • SIEM Integration integrates with SIEM tools that use the CEF and SYSLOG formats, aggregating events to reduce risk
    • Smartphone Applications allows secure access to sensitive information from smartphones
    • SSH Proxying and Keystroke Logging proxy SSH sessions through Secret Server for greater control and logging capabilities
    • Virtual Machine Support install Secret Server on a virtual machine such as VMware for additional scalability
    • Web Password Filler use the Web Password Filler to instantly fill in username and password credentials in your browser
    • Windows Form Filler log into any Windows application using the Windows Form Fille