+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Author Articles

Get Complete Application Control Management with CylancePROTECT and Privilege Manager

October 19th, 2018

Thycotic customers are constantly requesting integrations with other products in their arsenal, especially other security products. Thycotic’s product team for Privilege Manager—our least privilege and application control product—is asked to work with CylancePROTECT® day after day. Our common customers are using both Thycotic and Cylance products on the endpoint to provide multiple layers of malware protection.…


Seven Signs It’s Time to Move On from GPO-Only Privilege Management

September 11th, 2018

Many organizations gravitate towards Group Policy Objects (GPO) for privilege management because it offers enough functionality to get started managing privileges. Yet, as your needs evolve, you may find that you require a privilege management system better suited to a maturing, sophisticated organization. What are some of the warning signs that you need more than…


Seven reports you can share with auditors and execs to demonstrate proactive privilege management

May 8th, 2018

All major compliance bodies recommend or require a least privilege policy to protect sensitive data. Removing local administrative access on user workstations is a fundamental strategy for endpoint security to protect against both internal and external threats. Auditors will see that you have implemented a proactive security strategy to prevent malicious activity and accidental data…


Microsoft’s Frankenstein Approach to Endpoint Protection

March 27th, 2018

With Windows 10 Microsoft has embedded and enhanced a number of free tools it claims give IT and security teams the opportunity to close security gaps exposed in previous versions of Windows. One of the critical goals Microsoft aims to address is the principle of least privilege. Under a least privilege policy, administrative credentials are…


How to Protect Your Desktop Team When Moving to Least Privilege 

March 6th, 2018

When companies yank local administrative privileges from business users without considering the downstream impact, their least privilege programs are doomed to fail. Suddenly unable to download applications, run programs, install printers or make other system changes, users will be confused and frustrated. Those frustrations are going to land squarely on the plate of the desktop support team.   Imagine a desktop…


Top 10 Keys to Successful Least Privilege Adoption Via Application Control

February 15th, 2018

Gone are the days when a security team could select a new tool, turn it on, and expect everyone in the organization to adjust. When security hinders the business, the business fights back. Users now have numerous ways they can work around security tools and policies to get their job done. Least privilege is a…


Why is least privilege the place to start for endpoint security?

January 23rd, 2018

Because it will save you time and money.   Your end user’s computers are increasingly exploited as an attack vector used to attain accounts with local administrator rights on Windows or root access on Mac OS. There are a lot of solutions that promise malware detection and prevention. And you can buy more and more software to try to prevent these…