Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!

Endpoint Privilege Management and Application Control Software

Thycotic Privilege Manager

Mitigate malware and modern security threats from exploiting applications by removing local administrative rights from endpoints with a cloud-based solution


Try Privilege Manager On-Premise or in the Cloud for 30 Days free


Get a custom quote for Privilege Manager by filling out this form

Enterprise-scale cloud endpoint privilege management at lightning speed

Icon - Offline Bolt

Get Started

Deploy across hundreds of thousands of machines with a cloud solution. Install on all Windows, Mac, and Unix/Linux endpoints in minutes.

Icon - Launch

Scale for

Manage privileges via an interactive console and simple policy wizard.

Icon - Dashboard

Customize as
you like

Report on application usage, blocked malware and least privilege compliance. Take advantage of Privileged Behavior Analytics integration with Privilege Manager Cloud.

Mitigate critical vulnerabilities without disrupting
business users or your IT support team

Icon - Deploy Single Agent

Deploy a
Single Agent

Discover applications with admin rights, even on non-domain machines, and apply policies.

Icon - Define Flexible

Define Flexible Policies

Elevate, allow, deny, and restrict applications in just a few clicks with a policy wizard.

Icon - Manage and Remove

Manage and Remove Local Admin Rights

Create rules to permanently define local group membership and automatically rotate non-human privileged credentials.

Icon - Elevate Applications


Allow trusted applications to run, block or sandbox others, all while maintaining a least privilege model.

Icon - Improve IT

Improve IT &
End-User Productivity

Helpdesk tickets decrease with automated bulk or repeatable operations; people automatically access apps and systems they need.

Privilege Manager


Enterprise-grade PAM-as-a-Service to support large enterprises and fast growing organizations at scale.

Privilege Manager


Intelligent PAM to meet cyber security and least privilege best practices and compliance obligations.

Privilege Manager

Features Chart

  • Windows and Mac Account Discovery on Endpoints
  • Windows and Mac Application Discovery
  • Non-Domain Endpoint Support
features arrow
Local Security
  • Local Admin Rights Removal
  • Local User Account Management
  • Local Group Membership Management
  • Automated Local Account Password Rotation
features arrow
Application Control
  • Flexible Policy Deployment Configuration
  • Dynamic Allow, Deny, and Restrict Policies
  • Real-time Application Analysis
  • Sandboxing
  • User Access Control (UAC) Override
  • End-user Justification and Admin Approval Workflow
  • Child Process Control
features arrow
Auditing & Reporting
  • Responsive and Actionable Reporting Dashboard
  • Centralized Application Event Logging
  • Local User and Group Activity Auditing
  • Agent and OS Reports
  • Custom and Scheduled Reports
  • Privileged Behavior Analytics (PBA) integration
features arrow
  • Active Directory
  • ServiceNow
  • Secret Server
  • VirusTotal
  • System Center Configuration Manager (SCCM)
  • Symantec Management Platform
  • SysLog / SIEM
features arrow
Enterprise Readiness
  • Privilege Manager Mobile App
  • Public API
  • High Availability and Load Balancing
  • Reverse Proxying
features arrow


Try Privilege Manager

Privilege Manager’s practical software features are among the many reasons cyber security professionals and IT Admins consider it the best cloud-based endpoint privilege management solution on the planet.

join the webinar
least privilege discovery tool thumb

Least Privilege Discovery
Tool for Windows

Free Tool

Do you know which accounts are overprivileged?
With Thycotic’s Least Privilege Discovery tool, you’ll save time planning your least privilege strategy with critical insight into your vulnerabilities.

Least Privilege Cybersecurity for Dummies eBook Cover

Least Privilege Cybersecurity
for Dummies

Free eBook

The smart guide to jump start your least privilege strategy
Get this free 16-page eBook to see how you can limit user and application
access to privileged accounts—especially on endpoints—through various controls and tools without impacting productivity.