Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

Gartner Magic Quadrant Privileged Access Management Thycotic

FEATURED STORY:

Thycotic named a
Leader in Gartner 2020
PAM Magic Quadrant

Filter by Tags: 

Application Control Strategies Help You Prepare for the Unknown

June 9th, 2020

One of the most significant challenges today within endpoint security via application control is the sometimes tedious task of application categorization to create allowlists, denylists, and restrictlist. What is application control? Application control allows you to proactively manage and monitor all the applications running on your endpoints with policy-driven controls. Application control can be executed…


A New Approach to Modern Enterprise Access Management

June 4th, 2020

Earlier this week, we publicly announced the acquisition of Onion ID—a San Francisco-based identity and privileged access management (PAM) company. The acquisition marks a significant milestone in Thycotic’s strategic direction as a PAM company. Over the past several years, we have driven innovation through a multi-stage product roadmap designed to help companies adopt PAM and…


Addressing emerging PAM use cases to protect access to SaaS applications, cloud infrastructure, and databases

June 2nd, 2020

With most of the global, white-collar workforce suddenly shifting to working remotely, cloud technology has emerged as a critical component to keep businesses up and running. These services are enabling people to collaborate with one another, and provide the tools they need to stay productive, enhance accessibility and create a mobile friendly environment while working…


10 Features Every Privileged Access Management Solution Must Have

May 26th, 2020

The MoSCoW method is a prioritization technique used in project management and software to prioritize requirements. It stands for: Must have, Should have, Could have, and Won't have. Using this approach can help you build a common understanding among your stakeholders as you evaluate and select a privileged access management (PAM) solution. In this blog, we’ll focus on the 10…


DevOps Secrets Vault and Dynamic Secrets in the Cloud

May 19th, 2020

Back in July of 2019, Thycotic released DevOps Secrets Vault, a high-velocity vault for high-speed password and secret creation, archiving, and retrieval. Each month we roll out improvements to this cloud-based tool. In 2020, we’ve been focused on adding dynamic secrets for key cloud platforms. For infrastructure-as-a-service platforms dynamic secrets in DevOps Secrets Vault offer…


How can you prevent insider threats when none of your insiders are actually “inside”?

May 12th, 2020

Security teams can be so focused on blocking cyber attacks from outside that they turn a blind eye to potential threats within their own organizations. In fact, 34% of all breaches are caused by insider threats. Insider threats are uniquely difficult to defend against because insiders inherently require an elevated level of trust and access…


Thycotic named leader in new KuppingerCole Leadership Compass

May 8th, 2020

Why innovation has become so important to Privileged Access Management As noted in the 2020 KuppingerCole Leadership Compass, Privileged Access Management (PAM) is one of the fastest growing areas of cyber security today. Forty PAM vendors now compete for annual revenues that will total $2.2 billion this year and will more than double to $5.4…


How Do Passwords Work?

May 7th, 2020

If you want to make a purchase, post a comment in a forum, or even read content on many websites, you’re prompted to create (and remember!) a password. What’s going on when you create a password? And how does this process help keep your information safe? When you create a password on a website, that…


The Landscape of PAM is Changing – Customers Want Mobile PAM

May 5th, 2020

At Thycotic, we’re watching the landscape of our customers’ privileged access management needs evolve. PAM can no longer be simply a web application hosted on premise; our customers are telling us they need flexible deployment and access options. More day-to-day business operations need access to data, applications, and platforms Organizations are also acknowledging that PAM…


5 Most Popular Password Cracking Tools: Protect Your Enterprise

April 28th, 2020

Passwords. How on earth did we get here?  They've been around for so many years and yet there’s still so much to be said about them. In most organizations passwords are what make the difference between keeping cyber criminals out—and falling victim to a cyber-attack. And for the multitude of applications, systems and infrastructure of…