Thycotic Privilege Manager
Visit Website
thycotic.com
Loading

Thycotic Privilege Manager

Practical endpoint privilege control with app rules, live approvals, and deep reporting
4.8 
Rating
71 votes
Your vote:
No screenshots
Visit Website
thycotic.com
Loading

Start by tightening privileges where work happens—the endpoints. Use the discovery mode to map every executable users rely on, then group them by publisher, path, and hash. With that inventory in hand, build a baseline allowlist and a few smart elevation rules in the guided builder. Roll out to a pilot OU in Active Directory, removing standing local admin rights while enabling just‑in‑time access for approved tools. Keep the policy in audit-only for a week, review the results in the dashboard, and then flip enforcement on when noise is under control.

Day to day, admins use the live console to review elevation prompts, approve time‑boxed access, and push quick exceptions without granting broad rights. Hook into ServiceNow to require a ticket for certain elevation requests, and scope approvals to AD groups so team leads can handle their own queue. Unknown or untrusted binaries can be isolated in a sandbox while you decide to allow, limit, or block. For remote or contractor devices, route actions through the reverse proxy to keep policy decisions consistent even when endpoints are off the corporate network.

For threat triage, send file hashes to VirusTotal within the workflow and automatically downgrade or deny execution when reputation looks risky. Stream detailed events to your SIEM via Syslog so analysts can correlate blocked launches, privilege escalations, and lateral movement indicators. The central dashboard surfaces quick wins: top blocked items, apps frequently requesting elevation, devices with excessive prompts, and group membership drift. Use these insights to refine rules—convert repeating approvals into managed elevation policies and tighten noisy patterns into specific conditions.

Reporting is built for audits and continuous improvement. Schedule weekly exports that summarize denied executions, elevation outcomes, and least‑privilege adherence by business unit. Track progress before and after removing local admin rights, and highlight endpoints still carrying exceptions that need review. When a new line‑of‑business app arrives, run it through discovery, analyze usage for a few days, validate its reputation, and ship an allow rule tied to its signing certificate. The result is a sustainable least‑privilege program: minimal standing admin access, controlled application behavior, and clear, actionable telemetry for security and IT operations.

Review Summary

Features

  • Guided policy builder and live administration console
  • Application discovery and inventory by publisher, path, and hash
  • Just-in-time elevation with time-boxed approvals
  • Integration with VirusTotal for reputation checks
  • Active Directory scoping and group-based approvals
  • ServiceNow workflow integration for request/approval
  • Syslog/SIEM event forwarding and analytics
  • Central dashboard with trends and exportable reports
  • Sandbox execution for unknown applications
  • Reverse proxy support for off-network endpoints
  • Removal of persistent local admin rights
  • Monitoring of local groups and membership changes

How It’s Used

  • Roll out least-privilege by discovering apps, piloting policies, and removing local admin rights
  • Approve on-demand elevation tied to ServiceNow tickets and AD groups
  • Quarantine and assess unknown binaries in a sandbox before allowing
  • Auto-check file hashes with VirusTotal and block on poor reputation
  • Forward events to a SIEM to correlate blocked launches and privilege use
  • Audit local group membership drift and remediate excessive access
  • Convert recurring exceptions into precise, rule-based allow policies
  • Generate compliance-ready reports on blocked activity and privilege reductions
  • Support remote users by enforcing policies through a reverse proxy
  • Onboard new business applications with discovery, reputation, and signed-allow rules

Plans & Pricing

Thycotic Privilege Manager

Custom

Discovery
Local Security
Application Control
Auditing & Reporting
Integrations
Enterprise Readiness

Comments

4.8
Rating
71 votes
5 stars
0
4 stars
0
3 stars
0
2 stars
0
1 stars
0
User

Your vote: