Privileged Account Management

Organizations typically ask users to comply with complicated password policies, in order to achieve compliance and increase security. But what about the local Windows administrator account, the Linux root account or SAP* account for SAP? These accounts are typically also covered by a corporate password policy, but are never enforced. Further most organizations will not be able to provide proper auditlogs with a complete history of usage of these privileged accounts.

This does create a paradox, where our most privileged accounts – the keys to the kingdom – are not as safely managed as the common and less privileged user accounts.

Our Privileged Account Management service, does support you in several ways to achieve a higher level of security and at the same time reduce costs related to managing privileged accounts.

We offer the following deliverables within this service:

  • Hotline Support: day to day troubleshooting and support
  • Professional Services: complete implementation getting you from unmanaged privileged accounts to a managed state
  • Solutions: best of breed products integrated to fit your demands



When things get complicated, we will support you and provide direct access to the vendor support.

Hotline is available via email, phone and our customer portal.

Response time is defined by the SLA you attach to the agreement:

  • 8 x 5 x 4
  • 24 x 7 x 4


Analysis & Design
We have years of experience integrating privileged password management solutions into your network and organizations. Take advantage of our Professional Services team, that will support you doing your classic architectural tasks such as:

  • Highly resilient password vault design
  • Role Based Access Control for employees and 3rd parties
  • Security monitoring of the password vault
  • Define your password policies for service accounts

Implement & Configure
If you buy the solution, we can do more than a simple Rack & Stack. We will support throughout the deployment and deliver a detailed set of system documentation. Deployments are always performed by combining best practices from the vendor with our own experiences. Typically we can estimate deployments beforehand and are delivered using fixed pricing.

We have the following deployment options available:

  • Small: 15 hours
  • Medium: 50 hours
  • Large: 100 hours

Review & Assess
We offer the following:

  • Thycotic SecretServer Configuration Review
  • Privileged Password Audit (find vulnerable unmanaged privileged and shared accounts)



Thycotic SecretServer enables you to store, distribute, change and audit enterprise passwords in a secure environment.

  • Manage and organize
  • Real-Time management
  • Seamless integration
  • Top-Level security
  • Essential compliance
  • Disaster recovery