Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Author Articles

Privilege Manager 10.8: Simplifying endpoint privilege management through usable security

August 25th, 2020

A powerful new interface and additional enhancements make Privilege Manager 10.8 an important release to ensure usable security. Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Over the past year, our product teams and UX and human-computer interaction team have…


Endpoint Security Demands a Defense-in-depth Strategy

June 16th, 2020

Endpoints, the devices people use to access company resources, are a weak spot in corporate security. Compromised endpoints are a primary access point that cyber criminals use to infiltrate a network. Two-thirds of companies are compromised by exploits that originate with an endpoint. The volume of endpoint attacks is rising, as is the sophistication of…


Application Control Strategies Help You Prepare for the Unknown

June 9th, 2020

One of the most significant challenges today within endpoint security via application control is the sometimes tedious task of application categorization to create allowlists, denylists, and restrictlist. What is application control? Application control allows you to proactively manage and monitor all the applications running on your endpoints with policy-driven controls. Application control can be executed…


New Privilege Manager Release Extends Endpoint Protection for Macs

December 10th, 2019

Apple products continue to grow in popularity. With strong iPhone X and 11 sales, Apple is boosting their smartphone market share. And it’s not just consumer products where we’re seeing growth. Enterprises are using Macs more and more and Thycotic is seeing significant growth in these devices and operating systems. Endpoints present a significant security…


Get Complete Application Control Management with CylancePROTECT and Privilege Manager

October 19th, 2018

Thycotic customers are constantly requesting integrations with other products in their arsenal, especially other security products. Thycotic’s product team for Privilege Manager—our least privilege and application control product—is asked to work with CylancePROTECT® day after day. Our common customers are using both Thycotic and Cylance products on the endpoint to provide multiple layers of malware protection.…


Seven Signs It’s Time to Move On from GPO-Only Privilege Management

September 11th, 2018

Many organizations gravitate towards Group Policy Objects (GPO) for privilege management because it offers enough functionality to get started managing privileges. Yet, as your needs evolve, you may find that you require a privilege management system better suited to a maturing, sophisticated organization. What are some of the warning signs that you need more than…


Seven reports you can share with auditors and execs to demonstrate proactive privilege management

May 8th, 2018

All major compliance bodies recommend or require a least privilege policy to protect sensitive data. Removing local administrative access on user workstations is a fundamental strategy for endpoint security to protect against both internal and external threats. Auditors will see that you have implemented a proactive security strategy to prevent malicious activity and accidental data…


Microsoft’s Frankenstein Approach to Endpoint Protection

March 27th, 2018

With Windows 10 Microsoft has embedded and enhanced a number of free tools it claims give IT and security teams the opportunity to close security gaps exposed in previous versions of Windows. One of the critical goals Microsoft aims to address is the principle of least privilege. Under a least privilege policy, administrative credentials are…


How to Protect Your Desktop Team When Moving to Least Privilege 

March 6th, 2018

When companies yank local administrative privileges from business users without considering the downstream impact, their least privilege programs are doomed to fail. Suddenly unable to download applications, run programs, install printers or make other system changes, users will be confused and frustrated. Those frustrations are going to land squarely on the plate of the desktop support team.   Imagine a desktop…


Top 10 Keys to Successful Least Privilege Adoption Via Application Control

February 15th, 2018

Gone are the days when a security team could select a new tool, turn it on, and expect everyone in the organization to adjust. When security hinders the business, the business fights back. Users now have numerous ways they can work around security tools and policies to get their job done. Least privilege is a…