Phone Number +1-202-802-9399 (US)

Thank You For Using Secret Server!

Product Resources

Professional Services

Getting Started Services or Existing Customer Heath Checks
Learn More

Technical eLearning

Become an Expert at your own Pace
Request Access

All Product Features

Do you have all the Security and Automation Features?
Get Full Feature List

looking for support?

Support Portal

Access the Support Portal

Installation Guide

Installation Guide

End User Guide

End User Guide (pdf)

Getting Started Guide

Getting Started Guide

What else can Thycotic do for You?

Automatically React to Privileged Password Misuse

An instant analysis of privileged user activity enables you to discover insider threats fast!

Secret Server integrates with Privileged Behavior Analytics for powerful machine-learning technology and security.

Automatically identify suspicious behavior and react based on severity by increasing security, locking down access, and ensuring careful review.

Successfully Enforce Least Privilege on Desktops

Thycotic's Privilege Manager 10.4 New User Interface

Protect your organization’s employees from accidentally clicking malware and ransomware by enforcing Least Privilege.

Get seamless least privilege adoption with application control policies that reduce the workload of IT/desktop support and don’t impact end user productivity.

Free Resources to Train Your Team

We like to give away helpful, free tools! Check these out…

Password Security Policy Template

Need a Privileged Password Policy for your Organization?

Use our customizable policy template, pre-built for the most common compliance standards.

Want to Teach End Users how to be Safe at Home and at Work?

Share our Cybersecurity for Dummies book, an official, quick read from Thycotic and Wiley Publishing.

Lesson 1 - The Importance of Privileged Account Security

Have New IT Staff Who Need to Learn About Privileged Account Management?

Check out our 1-hour PAM Certification Course, with all the basics you need to know about privileged account management.

Understand the meaning of IAM, PIM, PAM and other cyber security acronyms.

Can’t remember what all those Acronyms mean?

Become an expert on PIM, PAM, IAM, SAPM, EPM, UAC, and all the other terms used by security experts and analysts.