Phone Number +1-202-802-9399 (US)

THANK YOU!

Access Your PAM Policy Template Below

How to Use this Template to Create Your Own PAM Policy

  • Download the template
  • Open the template as a Microsoft Word document.
  • Remove the “About this Template” and “Customizing the Template” instructions and other author comments.
  • Replace the current logo and add your company logo in the upper left corner.
  • Replace “Company X” with the name of your organization throughout the document.
  • Update all of the company-specific contact information.
  • Update the effective date.
  • Revise any policy guideline to meet your organization’s policies.
  • Revise the Violations section to meet your organization’s policies.
  • Rename the document and save your changes.
  • Obtain your management and auditors’ approval of the completed policy.
  • Distribute the policy according to your management guidance.
Privileged Access Management Policy Template Cover

The only enterprise-grade PAM solution available both
in the cloud and on-premise

Discover, Manage, Provision, and Delegate Access To All Privileged Accounts from a Central Dashboard

Privileged account discovery,
Provisioning & protection

Lock Symbol

Secret Server

Discover privileged accounts, vault credentials, govern service accounts, delegate access, monitor and record sessions.

Easiest to use and fastest to deploy enterprise-grade privileged access management & governance for organizations of all sizes, with on premise or cloud deployment.

ENDPOINT PRIVILEGE ELEVATION
& APPLICATION CONTROL

Shield Symbol

Privilege Manager

All-in-one solution for least privilege management, threat intelligence, and application control.

Seamless adoption for security teams, help desk support, and business users, because productivity is never impacted.

Access Control For Cloud Apps, Remote Workers, Databases

Cloud Symbol

Cloud Access Controller

Authentication, authorization, auditing for anytime, anywhere access to IaaS, SaaS Apps, Databases.

Easily grant and revoke access for remote workers and third parties without clients, agents, or VPNs, granular role-based access control, MFA, and session recording for IaaS platforms and SaaS Applications.

Ready to get started with one of our solutions? Try one free for 30 days. Looking for pricing? Request a quote

What’s New

Forrester Wave PAM 2020 Thumbnail

Thycotic Recognized as a Leader.

Read a complimentary copy of Forrester's latest Privileged Identity Management (PIM), Q4 2020 report on the PIM market and vendors to see why Thycotic is recognized as a Leader.

Learn More

windows discovery tool

FREE Windows Privileged Account Discovery Tool

Do you know your privileged accounts? All-new Privileged Account Discovery Tool for Windows evaluates privileged accounts and passwords on your network to identify areas of security risk. 

Learn More

Wiley’s Privileged Access Cloud Security for Dummies

Learn how your organization can secure privileged assess to cloud applications with this free, easy-to use guide

Learn More