Delinea Platform Bundles
Bundles designed to simplify, streamline and secure privileged access across your organization.
The flexibility and agility to scale PAM security controls on your own terms
Delinea Platform
Essentials
Get started by identifying, managing, and vaulting privileged accounts, with the ability to set rules to request access to credentials and monitor and audit privileged remote access sessions.
Delinea Platform
Standard
Continue your PAM journey by protecting against identity threats, applying just-in-time and just enough privileges, and enforcing MFA at depth.
Delinea Platform
Enterprise
Increase automation and intelligence across your authorization policies to further reduce identity-related risk and improve productivity.
Functionality and Capabilities |
Essentials |
Standard |
Enterprise |
Deployment | Cloud | Cloud | Cloud |
Administrators | Up to 15 users included | Up to 15 users included | Up to 30 users included |
Servers | Up to 15 servers included | Up to 30 servers included | |
Workstations | Up to 30 workstations included | ||
Engines/sites | UP to 4 engines | No limit | No limit |
Secure Credentials |
Essentials |
Standard |
Enterprise |
Secure vault and password management | |||
Privilege Automation | |||
Discovery | Advanced Discovery | ||
Advanced Scripting | Basic | Add on | |
Connection Manager | |||
Role Based Access Controls | |||
Web Password Filler | |||
HA/DR | |||
MFA on individual credentials | |||
Credential and Approval Workflows | Add on | ||
Service Account Governance | Add on | ||
Resilient Secrets | Add on | Add on | |
Privilege and Entitlements Management |
Essentials |
Standard |
Enterprise |
Asset Workflow | Advanced | ||
Privilege Elevation | Granular | ||
MFA on login and privilege elevation | |||
Local account control | |||
AD bridging, group policy translation | |||
Identity Federation | AD only | Any IDP | |
Workstation/endpoint management | Add on | ||
Multi-cloud identity and access inventory | Add on | Add on | |
Least privilege enforcement on cloud entitlements | Add on | Add on | |
Identity Threat Protection |
Essentials |
Standard |
Enterprise |
AI-based identity and access inventory | Add on | Add on | |
Threat detection and response | Add on | Add on | |
Identity posture elevation | Add on | Add on | |
Privilege Remote Access |
Essentials |
Standard |
Enterprise |
VPN-less browser-based remote access | Add on | Add on | |
Vendor secure access | Add on | Add on | |
Remote session auditing and recording | Add on | Add on | |
Credential injection | Add on | Add on | |
Shared Capabilities |
Essentials |
Standard |
Enterprise |
Analytics | |||
Session Monitoring and Control | |||
Session Recording storage | |||
Discovery | |||
Audit | |||
Mobile App | |||
Integrations Marketplace | |||
Delinea Expert |
Delinea Platform
Seamlessly extend Privileged Access Management to provide just-in-time access with easy, adaptive controls that help IT and security reduce risk while enabling growth, efficiency, and scalability.
- End-to-End Visibility
- Dynamic Privilege
- Adaptive Security
Evolving from PAM to Extended PAM
Extended Privileged Access Management (XPM) redefines PAM to treat all users as privileged users and address complex IT environments.
Get the whitepaper
Introducing the New Delinea Platform
See how the new Delinea Platform will help you extend Privileged Access Management across hybrid and multi-cloud infrastructures.
Register Now
Model for Privileged Access Management Maturity
A framework to help you systematically lower risk, increase business agility, and improve operational efficiency.
Assess your PAM maturity
Check out our interactive demos to experience the Delinea Platform for yourself.
Interactive Demo
Secret Server
Vault credentials, ensure password complexity, and delegate role-based access.
Secret Server Interactive Demo
Interactive Demo
Privilege Control for Servers
Govern PAM polices and control access and privileges for cloud-hosted servers.
Privilege Control for Servers Interactive Demo
Interactive Demo
Identity Threat Protection
High-quality intelligence to discover and remediate threats in real-time, reducing the risk to systems & data.
Identity Threat Protection Interactive Demo
Interactive Demo
Privileged Remote Access
Securely manage remote workers and third-party vendors with a VPN-less, browser-based Remote Desktop Protocol (RDP) and SSH solution
Privileged Remote Access Interactive Demo