Thycotic Secret Server

Secure privileges for service, application, root, and administrator accounts across your organisations.


Privilege access management (PAM) is complex and possesses a risk to businesses.

End users have become one of the largest attack-surfaces for threat actors (e.g. Phishing). As businesses focus on technology to gain a competitive edge, the management of users becomes more complex and has risen in importance due to the need for rapid change in the IT landscape due to technology focus in business strategy.

Privileged accounts are great targets for intruders because small breaches can cause significant data leaks. Some of the challenges regarding management of privileged accounts might be:

  • Lack of automated tools to manage accounts increases risk of human errors

  • Too many tools to manage accounts creates poor overview

Functions & Requirements

  • Available both on premise and in the cloud.

  • Establish a Secure Vault: Store privileged credentials in an encrypted, centralised vault.

  • Discover Privileges: Identify all service, application, administrator, and root accounts to curb sprawl and gain full view of your privileged access.

  • Manage Secrets: Provision and deprovision, ensure password complexity, and rotate credentials.

  • Delegate Access: Set up RBAC, workflow for access requests, and approvals for third parties.

  • Control Sessions: Implement session launching, proxies, monitoring, and recording.

Learn more about Secret Server at the Secret Server ressource library.

Read more about system requirements here.

Why Deloitte?

Awarded market leaders

We strive to continuously lead the market in the area of cyber risk and security services. We are awarded and acknowledged by some of the most renowned institutions within the area of cyber, e.g. Gartner, ALM Intelligence and Forrester. In 2020, we were named global leader in Security Consulting Services for the 9th year in a row by Gartner.

Leading-edge technologies

We are committed to investing in innovation and emerging technologies to ensure that we are equipped with the latest tools to solve current and future challenges for our clients. Alliances with market-leading cyber vendors and groundbreaking startups around the world offer our clients access to a wide range of cyber-risk technologies and leading-edge technology innovation.

Global intelligence delivered locally

We have the largest professional services network in the world. Diversity across our cyber teams helps us work across the globe with a local and personal lens. We have over 8,600 dedicated cyber-risk service practitioners of which 1,300 are dedicated to Europe and the Middle East alone, ready to help our clients everywhere with any challenge.

End-to-end cyber-risk services

We cover every aspect of cyber risk — from advisory and implementation of strategic transformations to managed security services, product solutions and incident management. This enables us to deliver more resilient and silo-breaking solutions, taking the whole business chain into account. This helps our clients to leverage their potential and growth even more.

Reach out

Call or email our experts to know more about Thycotic or how to esnure secure privileges for administrator accounts.

Christian Schmidt


Michael Møller Kristensen


$(document.head).append(''); $(document.head).append('