Empower Your Privileged Access Security
(102 ratings)
Thycotic Secret Server offers custom pricing plan
Overview
Pricing
Alternatives
Media
FAQs
Support
Thycotic Secret Server is the privileged access management (PAM) software that allows user to implement and enforce rigorous access control policies, even for privileged accounts – the kind hackers love to attack. Secret Server's unique architecture addresses the privileged access ... Read More
Yearly plans
Show all features
Professional
Secrets: Unlimited: On-premise or 10,000 Cloud
Tech Support, KB, Forums
Secure Vault and Password Manager with AD Integration
Discover Local and Active Directory Privileged Accounts
Automatic Password Changing for Network Accounts
Enhanced Auditing & Reporting
CRM, SAML, HSM Integrations
Service Account and Dependency Management (Add-On)
Platinum
Secrets: Unlimited: On-premise or 10,000 Cloud
Tech Support, KB, Forums
Secure Vault and Password Manager with AD Integration
Discover Local and Active Directory Privileged Accounts
Automatic Password Changing for Network Accounts
Enhanced Auditing & Reporting
CRM, SAML, HSM Integrations
Service Account and Dependency Management
Screenshot of the Thycotic Secret Server Pricing Page (Click on the image to visit Thycotic Secret Server 's Pricing page)
Disclaimer: Pricing information for Thycotic Secret Server is provided by the software vendor or sourced from publicly accessible materials. Final cost negotiations and purchasing must be handled directly with the seller. For the latest information on pricing, visit website. Pricing information was last updated on .
Contact
+1-202-802-9399
Customer Service
24/7 (Live rep)
Business Hours
Online
Location
Washington, DC
Thycotic Secret Server is the privileged access management (PAM) software that allows user to implement and enforce rigorous access control policies, even for privileged accounts – the kind hackers love to attack. Secret Server's unique architecture addresses the privileged access security program's primary weaknesses -- passwords, social engineering and the possibility of insider threats.
Disclaimer: This research has been collated from a variety of authoritative sources. We welcome your feedback at [email protected].
Researched by Rajat Gupta