+1-202-802-9399 (US)

Thycotic’s Cybersecurity Publication

FEATURED STORY:
The 6 Most Disturbing Data Breaches
In 2018 So Far

And how they could have been prevented

Filter by Tags: 

Thycotic moves into leadership position for Privileged Identity Management in Forrester Wave

November 14th, 2018

This week Forrester Research Inc. named Thycotic a Leader in Privileged Identity Management, along with CyberArk, Centrify, and Beyond Trust.  The Forrester Wave™: Privileged Identity Management, Q4 2018 Report* evaluated 11 vendors based on 35 criteria across the categories “Current Offering”, “Strategy” and “Market Presence”.  Thycotic earned the highest possible scores for Privileged Password Safe/Vault, Users, Roles, and Helpdesk Integration, and Reporting.  Additionally, Thycotic received the highest…


How to get your entire company on board with Privileged Access Management

November 13th, 2018

Maybe you’ve recently failed an audit, or you can’t stand yet another password being uploaded to your IT team’s risky, shared Excel doc. For whatever reason you are here, you are ready to tackle Privileged Access Management head on. But hold on, you may have a few hurdles you have to overcome first. Before you…


Back to the Basics: Service Account Management 101

November 8th, 2018

Service accounts don’t have to be a nightmare. Get in control now.  Service accounts are typically used in operating systems to execute applications or run programs, either in the context of system accounts (high privileged accounts without any password) or a specific user account, usually created manually or during software installation.  On Unix and Linux…


Enterprise Password Management for Everyone from SMBs to Corporations: Everything You Need to Know

November 6th, 2018

A simple yet effective business password management system takes high priority on the wish-list of every organization, big or small. This is evidenced by the sheer volume of people searching Google for “the best password protection” every day. But what may surprise you is that whether you’re attempting to manage passwords for a huge corporation,…


5 Spooky Privilege Security Mistakes that Will Haunt Your Organization

October 30th, 2018

It’s a dark and stormy night. Suddenly your system locks up. Then you get a message, demanding online payment to release your sensitive data back to you. Unfortunately, this isn’t a Halloween prank. Ransomware is on the rise and organizations of all types are falling victim. Your risk of cyber-attack exponentially increases if you’ve made…


Get Complete Application Control Management with CylancePROTECT and Privilege Manager

October 19th, 2018

Thycotic customers are constantly requesting integrations with other products in their arsenal, especially other security products. Thycotic’s product team for Privilege Manager—our least privilege and application control product—is asked to work with CylancePROTECT® day after day. Our common customers are using both Thycotic and Cylance products on the endpoint to provide multiple layers of malware protection.…


Thycotic’s Strategic Alliance program means Privileged Access Management Security for everyone

October 16th, 2018

Privileged Access Management is an important and vital security solution that helps protect one of the most important assets in an organization.  Software vendors can simply enable and empower their solutions by integrating into the world’s most popular, friendly, easy-to-use and most valuable Privileged Access Management solution available. Organizations and governments around the world have…


(SSH) Keys to Unix Security

October 9th, 2018

Root accounts are the keys to powerful IT systems, the backbone of your entire infrastructure. They use privileged credentials to control shell access, file transfers, or batch jobs that communicate with other computers or apps, often accessed remotely, with local configuration. They can be the trickiest of all types of privileged accounts to secure, particularly…


Ostriches, Zero Day Exploits, and the Elusive CyberSec Expert: Why SMBs Should Implement Cloud-Based PAM

October 2nd, 2018

Small and medium-sized businesses (SMBs) face a cyber security trifecta. Cyber criminals are increasingly targeting the most vulnerable businesses (not just the biggest fish). Sophisticated attackers quickly take advantage of newly revealed vulnerabilities. And, cyber security professionals are in short supply. Maybe SMBs aren’t aware that they can use the same types of security systems…


Gartner says PAM a top cybersecurity priority. Thycotic makes robust PAM in the Cloud a reality.

September 25th, 2018

With the recent introduction of Thycotic’s upgraded Secret Server Cloud offering, organizations worldwide now have a full-featured PAM as a service product they can choose to protect their “keys to the kingdom.” That’s because Secret Server Cloud now delivers all the features and capabilities of our Secret Server on-premise flagship product, available in three editions…