Skip to content
Services
Support
Contact
Blog
Search
Search
Solutions
▼
Secure Credentials
Enterprise Vault
DevOps Vault
Service Account Management
Privileged Remote Access
Remote Admin Access
VPN-less Browser Sessions
Privilege & Entitlement Elevation
Servers
Workstations
Cloud Infrastructure
Identity Protection
Detect & Remediate Threats
Delinea Products
Account Lifecycle Manager
Cloud Suite
Connection Manager
DevOps Secrets Vault
Identity Threat Protection
Privileged Behavior Analytics
Privilege Control for Cloud Entitlements
Privilege Control for Servers
Privilege Manager
Privileged Remote Access
Secret Server
Server Suite
Delinea Platform
Delinea Platform
Seamlessly extend Privileged Access Management to provide just-in-time access with easy, adaptive controls
View the Platform
Use Cases
▼
By common security issue
Audit and Compliance
Incident Response
IT Complexity
Privileged Access
Management Maturity
Remote Workforce /
Secure Remote Access
Service Account Management
Zero Trust / Least Privilege
By industry or sector
Cyber Insurance
Education
Energy & Utilities
Financial Services
Government
Healthcare
Telecommunications
By role and responsibility
Cybersecurity Management
DevOps
IT Management
Resources
▼
Resource 1
All Resources
Analyst Reports
Case Studies
Conferences
Datasheets
Demos
eBooks
Free Tools
Glossary
Resources 2
Infographics
Podcasts
Product Documentation
Solution Briefs
Videos
Webinars
Whitepapers
Trials
Promo Panel
Company
▼
About Delinea
Delinea Overview
Seamless privileged access without the excess
Leadership
Meet the team at Delinea
Board of Directors
Our strategic advisors
Company News
Read the latest Delinea News
Careers
Discover your possibilities
Contact Us
Here to help you define the boundaries of access
Why Delinea
Why Delinea
Proven leader in Privileged Access Management
Trust Center
We’ve got you covered
In the Press
Read the latest Delinea Press
Social
Spread the word about Delinea
Customers
Customers
We work to keep your business moving forward
Partners
▼
Partner Program
Program Overview
Partnership options with Delinea
Partnership Inquires
Become a Partner or get in touch to talk
Partner Resources
Register a Deal
For Reseller, Technology and Trusted
Advisory Partners
Partner Portal
All the resources you need, in one place
Find a Partner
Strategic Partnerships
Implement and operationalize PAM programs
Integrations Marketplace
Making your privileged access goals a reality
Free Trials
▼
Trials 1
Secret Server
Discover, manage, protect and audit privileged account access
Account Lifecycle Manager
Discover, secure, provision, and decommission service accounts
Privileged Behavior Analytics
Detect anomalies in privileged account behavior
Trials 2
Privilege Manager
Workstation endpoint privilege management and application control
Server PAM
Manage identities and policies on servers
DevOps Secrets Vault
Manage credentials for applications, databases, CI/CD tools, and services
Trials 3
All Trials
Try one of our PAM solutions free for 30 days
All Tools
Free Privileged Account Security and Management Tools
Request a Quote
We’re here to give you pricing when you’re ready
Delinea PAM & Cybersecurity Glossary
Improve your vocabulary and advance your IT security knowledge
A
B
C
D
E
I
J
L
M
P
R
S
T
U
V
W
Z
⇧
A
Active Directory (AD)
Active Directory (AD) Bridging
Active Directory (AD) Security
Active Directory Authentication
Application Programming Interfaces (APIs)
Application Secrets
Application-to-Application Password Management (AAPM)
⇧
B
Brokered Authentication Service
⇧
C
Chief Information Security Officer (CISO)
Cloud Computing Security
Cloud Infrastructure Entitlement Management (CIEM)
CritSit
⇧
D
Defense-in-Depth (DiD)
Delegated Machine Credential (DMC)
DevOps Security
⇧
E
Endpoint Detection and Response (EDR)
Endpoint Privilege Management (EPM)
Endpoint Protection Platform (EPP)
Enterprise Password Management
⇧
I
Identity and Access Management (IAM)
Identity as a Service (IDaaS)
Identity Governance and Administration (IGA)
Identity Lifecycle Management (ILM)
Identity Security
Identity Threat Detection and Response (ITDR)
⇧
J
Just-in-Time Access (JIT)
⇧
L
Least Privilege
Local System Account
⇧
M
Machine Identity Management (MIM)
Multi-Factor Authentication (MFA)
⇧
P
Pass-the-Hash-Attack (PtH)
Password Vaulting
Passwordless Authentication
Privilege Elevation and Delegation Management (PEDM)
Privileged Access Governance (PAG)
Privileged Access Management (PAM)
Privileged Access Management (PAM) Tool
Privileged Access Management as a Service (PAMaaS)
Privileged Access Workstations (PAWs)
Privileged Account
Privileged Account and Session Management (PASM)
Privileged Account Management (PAM)
Privileged Identity Management (PIM)
Privileged Session Management (PSM)
Privileged User Management (PUM)
PWN
⇧
R
Remote Desktop Protocol (RDP)
Robotic Process Automation (RPA)
Role-Based Access Control (RBAC)
⇧
S
Secure Shell (SSH)
Security as a Service (SaaS / SECaaS)
Security Assertion Markup Language (SAML)
Security Information and Event Management (SIEM)
Self-Service Password Reset (SSPR)
Service Account Governance (SAG)
Shared Account Password Management (SAPM)
Single Sign On (SSO)
Software Change and Configuration Management (SCCM)
Superuser Privilege Management (SUPM)
⇧
T
Tactics, Techniques and Procedures (TTPs)
⇧
U
User Access Reviews
User Account Control (UAC)
User and Entity Behavioral Analytics (UEBA)
⇧
V
Vendor Privileged Access Management (VPAM)
⇧
W
Web Access Management (WAM)
⇧
Z
Zero Standing Privileges (ZSP)
Zero Trust