Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Author Articles

How to protect service accounts without losing your mind: Automated tools!

January 14th, 2020

Here at Thycotic, we are always banging the drum on the importance of securing privileged access. Early in 2019, we got a glimpse of what can happen if you don’t when more than 100 million credit applications at Capital One were stolen by an individual in a security breach that involved a web service and…


Newest Secret Server Release Enhances Performance, Flexibility and Control

December 17th, 2019

Our customers are at the heart of everything we do.  So it's been a busy year at Thycotic as we've rolled out a number of new solutions and enhancements to create an even more seamless experience for our Secret Server customers.  This drives PAM adoption to protect a large and diverse set of privileged accounts…


New Product Launch! Thycotic Connection Manager centrally manages multiple remote sessions and integrates with Secret Sever for vaulted credentials

September 17th, 2019

Connection Manager provides centralized management of multiple remote sessions Connection Manager is an advanced remote connection management solution that provides one place to manage and interact with multiple remote sessions. Connection Manager can scale across hundreds of different connections to improve productivity, strengthen security and tighten compliance. With the release of Connection Manager, tight integration…


Secret Server product update: Conquer common cloud challenges with the release of Secret Server 10.7

September 12th, 2019

With this newest release, Secret Server not only further strengthens its PAM cloud leadership, but also its overall enterprise readiness and usability. With Secret Server 10.7, users can now: Discover, manage, and delegate access for Amazon AWS privileged accounts Use Secret Server’s command line interface (CLI) from Windows, Mac, and Linux/Unix workstations Meet even the…


Service Account Governance: Reduce your attack surface with Account Lifecycle Manager

August 20th, 2019

Service accounts abound in every organization. Failure to manage them leads to significant risk. This has been a critical issue for organizations that use Active Directory and have grown to a level that accounts can no longer be managed by hand. Almost all medium to large organizations suffer from extreme service account sprawl, perpetuating the…


Moving from on-premises to Privileged Access Management (PAM) in the cloud could be your next move

July 2nd, 2019

Are you considering moving from an on-premises PAM solution to one that delivers the security you expect for privileged credentials while still gaining the advantages of a cloud-based solution? If so, you’ll want to take a few tips from Tim Enders, Senior System Engineer at Loyola University Maryland’s Department of Technology Services—the Loyola University case study…


Thycotic SCIM Connector for Integrations with Secret Server

May 30th, 2019

Today, many organizations have both privileged account management (PAM) and identity governance solutions that operate independently. As a result, organizations lack the ability to have a unified view of identities. As we discussed in “Top PAM Technology Integrations,” while PAM secures access to key system and admin accounts, integration with Identity & Access Management (IAM)…


Behind the Scenes: Endpoint Protection in the Cloud

April 16th, 2019

The cloud has certainly been a game changer, driving innovation and growth.  Companies that adopted cloud services experienced a 20.7% average improvement in time to market, 18.8% average increase in process efficiency and a 15% reduction in IT spending. Together, these benefits led to a 19.6% increase in company growth. These savings and benefits, among…


Measurable Results of Service Account Privilege Management

April 4th, 2019

It’s very easy for service accounts to fall off your radar. Virtually all organizations have some unknown service accounts and some have thousands. Why do service accounts get lost? An employee leaves and the account is simply abandoned. The account is used less and less until it becomes obsolete and forgotten. Default accounts are left…


Complete Guide to Leveraging Session Recording to Improve Accountability and Meet PCI Compliance

March 5th, 2019

You’ve set up policies. You’ve trained your team. You’ve vetted third parties. But, even the most proactive privilege security strategy can’t account for every situation and every type of risky behavior.   Today many Thycotic customers rely on session recording and monitoring capabilities for added peace of mind. If any privileged user adds a backdoor account or makes an unauthorized configuration change,…