Offer the ideal fit for every stage
of the Privileged Access Management journey

Partner with Thycotic

With a comprehensive range that covers Privileged Access Management and enforcing least privilege, Thycotic’s products are in big demand worldwide.

As a Thycotic reseller, you’ll be able to help every customer take the next step on their privileged access journey – whether that’s finding their privileged accounts or restricting privileges on more endpoints. So they can stay protected against the account abuse that makes up 80% of all cybercrime.

Image of an administrator login screen

Privileged access and password management

Thycotic Secret Server

The easiest way to discover all your privileged accounts, store passwords in an encrypted vault, and monitor how they’re used every day.

Thycotic Account Lifecycle Manager

Control the non-human service accounts your business depends on – from discovery to decommissioning.

Thycotic Password Reset Server

Give your users self-service tools to reset Active Directory passwords – reducing helpdesk calls and keeping people productive.

Least privilege and application control

Thycotic Privilege Manager

Discover privileged accounts on your endpoints and automatically remove unnecessary privileges based on your policies.

Thycotic UNIX Protection

Extend your Secret Server to limit what’s possible with root and privileged accounts on Linux and Unix systems.

Matt Hubbard photo

With privileged credentials involved in so many attacks, enforcing least privilege and monitoring privileged accounts has become as essential as a firewall or antivirus.

Matt Hubbard
Account Manager

Why start selling Thycotic?

In-demand technology

With high-profile news stories involving account abuse, your customers already know they need help.

Expose the unknown

The biggest challenge your customers face is unknown service accounts and default credentials. Thycotic brings them to light.

A fast sales cycle

Built for simplicity, Thycotic’s products are quick and easy to deploy on-premise or in the cloud – dramatically shortening your sales cycle.

A complementary line-up

Thycotic’s products cover the entire spectrum of privileged access management and least privilege – ideal for driving more sales from your existing customers.

PAM and Least Privilege Playbook

Start now with your free download: a reseller’s guide to the scale of the privileged account problem and how Thycotic’s products can help your customers.

Connecting the channel

From sales support to ready-made, high-performing email and landing page campaigns, we’ll give you everything you need to reach customers and close deals. Because your success is our success –our technical, commercial and marketing expertise is yours to use as your own.

QBS Alpha Gen Logo

Partner with the privileged access experts

of the Fortune 100 use Thycotic
customers around the world
customer satisfaction rate

Become a Thycotic reseller

Leave your details and we’ll be in touch

How we use your information

To contact you, we need personal information like:

  • Your first name and last name
  • The company you work for
  • Your email address

We’ll use it in a few different ways. Mainly, it’s about telling you the stuff you asked us to tell you about. Sometimes, we may also tell you about vendors we work with, product news, incentives and marketing campaigns if you’re a reseller.

We think it’s all very useful – and very relevant. But if you don’t feel the same, you can unsubscribe at any time. Use the ‘Unsubscribe Instantly’ link at the top or bottom of our emails, or email our Data Protection Officer at

If you choose to unsubscribe, we’ll be sorry to see you go. But we’ll make sure you don’t receive any more marketing information – we’ll only retain your email address so it can be added to our exclusion list.

We like to keep our subscribers, though, and that means understanding how people use our emails so we can make them better. We send emails using a third-party platform, Campaign Monitor, which gives us industry-standard email metrics like clicks and opens. For more information on the data collected by Campaign Monitor, see their Privacy Policy.

Legitimate interest

It’s our goal to run an efficient business and provide a good, responsive service. To do that, we sometimes determine we have a legitimate interest in the absence of specific consent. This is used to communicate with you when:

  • You make an enquiry
  • You place an order
  • You request technical support
  • You request marketing support

In short, if it’s critical to fulfilling an agreement or our work as a business, we’ll go ahead and get in touch. Everywhere else, we’ll continue to ask for specific consent wherever possible.