BP

Barracuda PhishLine

Delinea (formerly Thycotic) provides privileged access management and identity security solutions to protect against credential-based attacks and unauthorized access.

No image available

About

Delinea, formerly known as Thycotic, operates as a leading provider of privileged access management (PAM) and identity security solutions. The company serves enterprise organizations seeking to protect against credential-based attacks and unauthorized access to critical systems.

The platform centers around Secret Server, a comprehensive privileged account security solution that manages, monitors, and rotates privileged credentials. This core offering includes automated password rotation, session recording, and detailed access auditing capabilities.

DevOps Secrets Vault extends protection to development environments by securing API keys, certificates, and other secrets used in CI/CD pipelines. The solution integrates with popular development tools and platforms to maintain security throughout the software development lifecycle.

Delinea's Privilege Manager provides application control and endpoint privilege management for Windows, Mac, and Unix systems. This component removes unnecessary administrative rights while allowing approved applications to run with elevated permissions when required.

The company's identity security approach includes multi-factor authentication and single sign-on capabilities that integrate with existing directory services. These features work alongside privileged access controls to create layered security architectures.

Enterprise customers across healthcare, financial services, manufacturing, and government sectors utilize Delinea's solutions to meet compliance requirements including SOX, PCI DSS, and HIPAA. The platform supports hybrid and cloud environments, accommodating modern infrastructure needs.

Delinea distinguishes itself through its focus on reducing attack surfaces related to privileged credentials and identities. The company's solutions address the reality that compromised privileged accounts remain a primary attack vector in data breaches.

The platform integrates with major SIEM systems, ticketing platforms, and IT service management tools to fit within existing security operations workflows. This integration capability enables security teams to maintain visibility and control across their technology stack while implementing privileged access protections.