Delinea Secret Server Features
What are the features of Delinea Secret Server?
Administration
- Approval Workflows
- Centralized Management
Reporting
- Reporting
Top Rated Delinea Secret Server Alternatives
(48)
4.4 out of 5
Visit Website
Sponsored
Delinea Secret Server Categories on G2
Filter for Features
Functionality
Multi-Factor Authentication | Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. | Not enough data | |
Single Sign-On | Provides a single access point for users to access multiple cloud products without multiple logins. | Not enough data | |
BYOD support | Enables users to bring-your-own-device to access company applications. | Not enough data | |
Password Vault | Stores credentials and passwords in a secure vault. Eliminates hard-coded passwords. Hides passwords from users. | Not enough data | |
Centralized management | Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected. | Not enough data | |
Role-based security | Allows privileges based on roles, such as business unit or other factors. | Not enough data | |
Live notifications | Configure which events will trigger a notification to prevent privileged access abuse in real-time. | Not enough data | |
Live session recording & playback | Offers live session recording and playback for compliance and auditing purposes. | Not enough data | |
Hide passwords | Offers the option to hide passwords when sharing with users, such as contract workers | Not enough data | |
Temporary, time-limited privilege | Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse. | Not enough data | |
Audit trail | Creates audit trail of secrets lifecycle | Not enough data | |
Cental dashboard | Has a centralized dashboard for users to interact with | Not enough data | |
Universal approach | Offers a universal approach to secrets management with integrations to centralize secrets regardless of platform | Not enough data |
Monitoring
Audit Logging | Provides audit logs for compliance reasons. | Not enough data | |
Activity Logging | Monitors, records, and logs both real-time and post-event activity. | Not enough data | |
Anomaly Detection | Detects abnormal user behavior to mitigate risks. | Not enough data |
Administration
Policy, User, and Role Management | Creates access requirements and standards and establishes user, roles, and access rights. | Not enough data | |
Approval Workflows | As reported in 10 Delinea Secret Server reviews. Allows administrators to approve or reject access changes to using defined workflows. | 80% (Based on 10 reviews) | |
Automated Provisioning | Automates provisioning and deprovisioning to reduce the amount of administrative manual work. | Not enough data | |
Bulk Changes | Reduces manual administrative work. | Not enough data | |
Centralized Management | As reported in 10 Delinea Secret Server reviews. Manages identity information from on-premise and cloud applications. | 87% (Based on 10 reviews) | |
Self-Service Access Requests | Automatically allows access if users meet policy requirements. | Not enough data |
Reporting
Audit log | Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software. | Not enough data | |
Reporting | Includes reporting functionality. This feature was mentioned in 10 Delinea Secret Server reviews. | 87% (Based on 10 reviews) |