Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

Gartner Magic Quadrant Privileged Access Management Thycotic

FEATURED STORY:

Thycotic named a
Leader in Gartner 2020
PAM Magic Quadrant

Filter by Tags: 

Thycotic shifts the language used in products and materials to promote inclusivity

August 27th, 2020

This moment in 2020 is a flashpoint in time. We hear calls for a number of changes to address the current political and cultural climate.  As a security software company, our engineers have seen a lot of discussion around the use of terminology in technology that may be perceived as racist. Is it appropriate to…


Privilege Manager 10.8: Simplifying endpoint privilege management through usable security

August 25th, 2020

A powerful new interface and additional enhancements make Privilege Manager 10.8 an important release to ensure usable security. Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Over the past year, our product teams and UX and human-computer interaction team have…


Thycotic named a Leader in the 2020 Gartner Magic Quadrant for Privileged Access Management

August 19th, 2020

Thycotic is proud to announce that we have been named a Leader in the Gartner 2020 Magic Quadrant for Privileged Access Management (PAM).  Based on our ability to execute and completeness of vision, Thycotic has been positioned as a Leader in the new Gartner 2020 Magic Quadrant for PAM. This marks a major milestone in our growth…


Announcing Identity Bridge: Streamline authentication and authorization for Unix and Linux

August 18th, 2020

I’ve been working in the identity and access management (IAM) field for more than 20 years. Unix and Linux user management has been a challenge throughout all those years. If you have a single Unix or Linux server and a manageable number of users, there’s no issue. But no one only has one server and…


Secret Server Product Update: Enhancements for the New Reality of Cloud and Remote Work

August 11th, 2020

The modern IT environment is diverse and constantly changing. In the always-on, Internet-connected global marketplace, traditional perimeters are disappearing as most organizations rely more and more on cloud-based applications to conduct business. Now, you can simplify management of an IT environment that includes multiple cloud instances, remote workers, and 3rd-party contractors It’s challenging to keep…


Industrial IoT, Security, and Privileged Access Management

August 4th, 2020

The convergence of operational technology (OT) and information technology (IT) has propelled “Industry 4.0” into the spotlight as the next wave of the industrial revolution. The Industrial Internet of Things (IIoT) brings IT and OT together in industries such as manufacturing, logistics, smart buildings, utilities, and critical infrastructure. Companies that get IIoT right will have…


PAM cloud security is different. Let me explain why

July 28th, 2020

The 2020 Verizon Data Breach and Incident Report (DBIR) published in May gives a clear indication of where privileged access management (PAM) security is going these days. And the forecast is for cloudy skies ahead.  That’s because: 77% of cloud breaches are due to compromised credentials Attacks on web applications more than doubled in 2019…


EU GDPR two years in: What’s happened so far, and what’s in store for the future?

July 21st, 2020

On May 25th, 2020 EU GDPR was 2 years old and it passed with little noise.  I guess that everyone’s been distracted by other events such as the COVID-19 Pandemic which has put the world on pause for the time being, and that includes EU GDPR. EU GDPR has raised the bar for digital rights,…


The Twitter Hack and the Failure to Protect Privileged Access

July 17th, 2020

Twitter. The biggest social media hack so far, and it could have been much, much worse! We all should be very worried. Could a tweet start a war, change the outcome of an election, cause a riot, or even get people to send money (bitcoin) to unverified BTC wallets? On Wednesday 15 July, we experienced…


IAM: The Future of Identities and How We’ll Get There

July 14th, 2020

Identity and Access Management (IAM) is the ability to provision, manage, audit and secure digital identities to facilitate and enable approved, authentic requests or connections to view company data, services, systems, networks, and assets. This applies whether they are located on premise or in the cloud, based on roles and privileges assigned to each digital…