• 23 NOV 15

2 DAYS ONLY- Win a Bottle of 17 year old Wild Turkey Masters Keep

Are you ready to survive the chaos of the holidays? Rest easy this Thanksgiving knowing your privileged accounts are secure. Download a FREE trial of Thycotic Secret Server before Tuesday, November 24th at 5:00 PM EST and register to win one of three exclusive bottles of Wild Turkey Masters Keep (oldest ever released to the

  • 16 NOV 15

5 Reasons you’ll love Thycotic’s Free Privileged Password Security Policy Template

Privileged accounts are a favorite target for hackers—it’s critical that your organization’s IT Admins have a password protection policy in place to prevent attacks. So Thycotic and Information Shield partnered to create an easy-to-use, free password security policy template for organizations that do not yet have an official privileged account management policy. Don’t have a

  • 12 NOV 15

10 Must-Follow InfoSec Bloggers of 2015

Want to stay up to date on the latest information security trends, breaches, and discoveries? We searched across the deep web to find the top bloggers who live and breathe information security. It’s these amazing security experts who make your life easier by keeping you up to date on the latest InfoSec news and research.

  • 05 NOV 15

Bob Gagnon Joins the Team as VP of Channel Sales

Thycotic is making some very exciting partner announcements today. First, I joined the team as vice president of channel sales. After working in channels for over 20 years – most recently at Unitrends, AppAssure (now part of Dell Software), and AVG Technologies – I’m truly excited about the opportunity to take such a great set

  • 02 NOV 15

Achieve PII Compliance Through Security Awareness Training

Introduction Personally Identifiable Information is defined by the National Institute of Standards and Technology (NIST) as: Information which can be used to distinguish or trace an individual’s identity, such as their name, social security number, biometric records, etc., alone, or when combined with other personal or identifying information which is linked or linkable to a

  • 27 OCT 15

Thycotic Oktoberfest Festivities

Last Friday, Thycotic gathered to celebrate the successes of the third quarter “Oktoberfest” style. We left the office a little early and convened at a local bier garden. Dressed in lederhosen, alpine hats, and suspenders, our executive team took turns summarizing all we accomplished this past quarter. They also recognized a few individuals who went

  • 21 OCT 15

From CEO to CTO: Handing over the reins and getting back to my roots

Hello all, It’s been about ten years since we started building Thycotic as an IT Security business and launched our first security products into the market. With a lean team and careful bootstrapping, we took a small software startup from nothing all the way to revenue over ten million dollars, which has been pretty awesome.

  • 20 OCT 15

Why Authenticated Scanning Matters, and How To Do It Right

Earlier this month, a few of us from Thycotic attended the Qualys Security Conference (QSC) and had the opportunity to speak at one of their spotlight sessions regarding authenticated scanning and how to do it right with Thycotic Secret Server. Amazingly, in speaking with several of the attendees there, we discovered that many of them

  • 13 OCT 15

Enhanced Help Desk Support and Password Synchronization for Office 365 Added to Thycotic Password Reset Server

Password Reset Server has seen substantial product updates in the last year alone. One of the major improvements to our password-reset tool has been the addition of password synchronization to Office 365. If an organization needs to keep passwords between their internal AD and Office 365 in sync, and aren’t using ADFS users can reset

  • 09 OCT 15

Go from Last to First: Why Thycotic is the #1 Password Management Tool chosen by IT admins

It’s no surprise that passwords are the number one target for attackers to achieve success during any data breach. Password management has been a major discussion for IT professionals for years, and as the battle between efficiency and security rages on between security and operations teams, the idea of password management often becomes a point