Phone Number +1-202-802-9399 (US)
The Lockdown

Thycotic’s Cyber Security Blog

Thycotic Named a Leader in Privileged Identity Management by Independent Research Firm

Written by Jordan True

November 15th, 2018

Thycotic receives highest possible score in Cloud and DevOps Support and SaaS Solution Maturity criteria

Washington D.C., November 15, 2018 — Thycotic, a provider of privileged access management (PAM) solutions for more than 10,000 organizations worldwide, today announced that it has been named a Leader in The Forrester Wave™: Privileged Identity Management, Q4 2018 Report*.  The report evaluated 11 vendors based on 35 criteria within three high-level categories: Current Offering, Strategy and Market Presence.

According to the report, “As password vaulting and session management technology mature and become less effective at thwarting threats, improved privileged behavior and threat analytics will dictate which providers will lead the pack. Vendors that provide cloud and container secret management and continuous improvement and delivery platform integration position themselves to deliver effective privilege threat mitigation and DevOps secret management to their customers.”

Thycotic received the highest possible score in 14 criteria including Cloud and DevOps Support, SaaS Solution Maturity and Privileged Threat/Behavior Analytics.  Thycotic also received the highest possible score among the following criteria: Privileged Password Safe/Vault, Users, Roles and Helpdesk Integration, and Reporting.

“We believe that being named a leader in the Forrester Wave validates Thycotic’s strategy of offering both a full featured Privileged Account Management-as-a-service option with Secret Server Cloud, along with our on-premises flagship product, Secret Server,” said Jim Legg, president and CEO at Thycotic.  “Thycotic continues to deliver innovative PIM solutions that are easy to deploy and use, including Privileged Behavior Analytics and most recently Privilege Manager, designed to enable least privilege with application control to help secure endpoints across the enterprise.



Like this post?

Get our top blog posts delivered to your inbox once a month.