
Thycotic Unix Protection
A fully integrated addition, Thycotic Unix Protection extends the power of Thycotic Secret Server to your vital Unix systems.
Bringing SSH keys and SSH commands into Secret Server’s vault, you can limit what’s possible with root and privileged accounts. As a result, your users get the level of access they need to do their jobs – while you dramatically reduce the potential impact of a breach or misuse.

Keep your high-value assets safe
Generate new pairs securely and enforce policies like rotation or uniqueness.
Whitelist commandsGuarantee frustration-free access to the commands your users need every day.
Use session recording to see who is using commands – and why.
Implement least privilegeApply least privilege to root accounts, eliminating unnecessary commands and functionality.
How it works
Get your datasheet to see how Thycotic Unix Protection integrates into Thycotic Secret Server.

Unix servers often house the most sensitive information, yet have the weakest security. Thycotic Unix Protection makes root access less of a skeleton key that’s ready to be abused.
Matthew Boyce
Implementation Engineer
Why Thycotic Unix Protection?
Protect your Unix systems against breaches, insider threats and accidental misuse.
Effortless management
Unix Protection fits into your existing Secret Server dashboard – no need to learn a confusing new tool or interface.
Save time and money
Reduce the burden of account management issues related to your Unix systems and servers.
Demonstrate compliance
Use detailed auditing and reporting to show how your super-users are managed and governed.
Discover Thycotic Secret Server
See how Thycotic Secret Server becomes a central point of
control, security and auditability for every privileged account.
From the experts in privileged access
of the Fortune 100 use Thycotic
customers around the world
customer satisfaction rate