Phone Number +1-202-802-9399 (US)

Privileged Access Management Software for DevOps

Thycotic DevOps Secrets Vault

Manage credentials for applications, databases, CI/CD tools, and services
without causing friction in the development process

GET TRIAL

Try DevOps Secrets Vault free


























By completing this form you are opting into emails from Thycotic. You can unsubscribe at any time.
GET PRICING

Get a custom quote for DevOps Secrets Vault by filling out this form

Devops Secrets Vault: Screenshot

DevOps Secrets Vault is Optimized for Machines

API-as-a-Service provides instant availability of secrets, SSH keys,
certificates, API keys, and tokens.

Devops Secrets Vault Icon: Applications and Databases

Applications and
Databases

Enable app-to-app communications and app-to-database access without hardcoding credentials.

Devops Secrets Vault Icon: DevOps Toolchains

DevOps
Toolchains

Secure access to tools for software and infrastructure deployment, testing, orchestration, and configuration.

Devops Secrets Vault Icon: Robotic Process Automation

Robotic Process
Automation

Centrally manage, control, and audit secrets for automated processes that operate without human oversight.

See how you can reduce DevOps secret sprawl across your attack
surface as you adopt cloud platforms and automate processes.

DevOps Secrets Vault helps you

Devops Secrets Vault Icon: Establish Secure Vault

Establish
Secure Vault

Store DevOps privileged credentials in an encrypted, centralized vault in minutes.

Devops Secrets Vault Icon: Manage Secrets

Manage
Secrets

Consolidate disparate DevOps vaults for easier secret rotation and a central audit trail.

Devops Secrets Vault Icon: Automate and Scale

Automate and
Scale

Match the pace of DevOps pipelines and RPA deployments with CLI and APIs.

Devops Secrets Vault Icon: Issue Certificates

Issue
Certificates

Issue X.509 and SSH certificates. Enable automated certificate signing and distribution.

Devops Secrets Vault Icon: Remove Standing Access

Remove Standing
Access

Provide Just-in-Time access to databases and cloud platforms with URLs that expire automatically.

DEVOPS SECRETS VAULT

Features Chart

Deployment Deploy rapidly with cloud-native SaaS architecture and elastic scalability that static, IP-based PAM solutions can’t provide.
Advanced automation Tap into command-line interface (CLI) and REST API. Simplify human navigation with CLI wizards for PKI, SIEM, Policy, and Auth-provider commands.
Infinite scalability Eliminate the need to add servers.
High availability Ensure 99.999% availability.
Disaster recovery Add a layer of protection with hot standby for rapid switchover.
Local caching Easily handle high-performance workloads.
Cloud authentication Assign AWS roles, Azure Service Principles, or GCP service accounts to servers (EC2, VMs) and authenticate to DSV.
OpenID Connect (OIDC) authentication Enable SSO and two-factor authentication with identify providers.
Dynamic secrets for IaaS and databases Make secrets available instantly for AWS, Azure, GCP, Microsoft SQL, MySQL, PostgreSQL, and Oracle. Expiring secrets mean you won’t have to worry about leaked secrets, rotation, or revocation.
Secret Zero Create a one-time-use URL for initial access to DSV.
Languages / tool support
  • DevOps tools: Jenkins, Kubernetes, Terraform, Ansible, Chef, Puppet, Azure DevOps.
  • RPA tools: UiPath Orchestrator and Robots.
  • Languages: Java, Go, Python, Ruby, .NET, and Node.js.
Integrations
  • Secret Server integration: Create secrets in DevOps Secrets Vault and sync updates to Thycotic’s flagship PAM solution for central password management, including secret rotation.
  • SIEM integration: Push logs automatically in near real-time to a SIEM endpoint, including Syslog, CEF, and JSON log formatting.
  • Kubernetes (K8s) integration: Take advantage of the K8s mutating admission webhook to patch secrets with data ingested from DSV without the overhead and complexities associated with sidecars.
Certificate issuance Import a root or intermediate certificate and automate the distribution of client (leaf) certificates. Also enable short-lived leaf certificates and rotation of the intermediate certificate.
SSH Keys and Certificates Sign client keys with target keys in SSH certificate. Automate SSH key generation and distribution to eliminate standing access.
Home Vault Give each user their own space for secrets; even admins don’t have access by default.
Sandbox tenant available Test before deploying to production.
Compliance Rely on SOC 2 certification.

Try DevOps Secrets Vault

Free 30 Day Trial

See how you can simplify password management at DevOps speed and scale.

Empower developers, engineers, and other IT teams to conduct their work securely, with a centralized, policy-based DevOps secrets management system.

TRY DEVOPS SECRETS VAULT FREE

By completing this form you are opting into emails from Thycotic. You can unsubscribe at any time.

DevOps Secrets Vault and Secret Server: Better Together

Synchronize secrets between Secret Server and DevOps Secrets Vault

DevOps Secrets Vault
is Optimized for Machines

  • Application to application communications
  • Application to database access
  • DevOps tools for software and infrastructure deployment, testing, orchestration, and configuration
  • Robotic Process Automation

Secret Server
is Optimized for Humans

  • GUI centric
  • Sharing Secrets/Controlled Access
  • Session Management and Recording
  • Heartbeat
  • Password Rotation
  • Compliance and Reporting
DevOps Flowchart
join the webinar

Top Cloud Security Use Cases
On-demand webinar

Managing privileged access as part of your cloud strategy
needs to be one of your top priorities.

In this webinar, you’ll learn the most common privileged account vulnerabilities in the cloud for IaaS, PaaS, and SaaS and get a sneak peek of Thycotic’s DevOps Secrets Vault.

Our Speakers

Barbara Hoffman
Director Product Marketing
Billy VanCannon
Director Product Management
Critical Controls for Modern Cloud Security

Critical Controls for Modern
Cloud Security

The rapid, iterative DevOps workflow exposes numerous security vulnerabilities.
Download the whitepaper to see how PAM for the cloud lowers your risk.