Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Customer Spotlight’ Category

Insurance Leader Rolls Out Enterprise PAM Strategy

June 11th, 2020

One of my favorite parts of this job is speaking with our customers to understand why they chose our solutions, and how they are using them to solve their challenges. Recently, I spoke with one of our customers who described Secret Server as his “favorite security tool!” So, I thought I would share his story.  Insurance Leader…


Moving from on-premises to Privileged Access Management (PAM) in the cloud could be your next move

July 2nd, 2019

Are you considering moving from an on-premises PAM solution to one that delivers the security you expect for privileged credentials while still gaining the advantages of a cloud-based solution? If so, you’ll want to take a few tips from Tim Enders, Senior System Engineer at Loyola University Maryland’s Department of Technology Services—the Loyola University case study…


Behind the Scenes: Endpoint Protection in the Cloud

April 16th, 2019

The cloud has certainly been a game changer, driving innovation and growth.  Companies that adopted cloud services experienced a 20.7% average improvement in time to market, 18.8% average increase in process efficiency and a 15% reduction in IT spending. Together, these benefits led to a 19.6% increase in company growth. These savings and benefits, among…


Measurable Results of Service Account Privilege Management

April 4th, 2019

It’s very easy for service accounts to fall off your radar. Virtually all organizations have some unknown service accounts and some have thousands. Why do service accounts get lost? An employee leaves and the account is simply abandoned. The account is used less and less until it becomes obsolete and forgotten. Default accounts are left…


How to get your entire company on board with Privileged Access Management

November 13th, 2018

Maybe you’ve recently failed an audit, or you can’t stand yet another password being uploaded to your IT team’s risky, shared Excel doc. For whatever reason you are here, you are ready to tackle Privileged Access Management head on. But hold on, you may have a few hurdles you have to overcome first. Before you…


How secure are the passwords your MSP uses?

August 27th, 2018

How does your IT managed service provider (MSP) secure the passwords they use to access your systems?  Despite cyber-security concerns, few clients know where these passwords are stored or how often are they updated. With IT security, it’s what the client doesn’t see, that can matter most. Protecting passwords First Focus, a leading MSP in…


How one of the most well known cyber security organizations in the world benefited from privileged account management

September 26th, 2017

Any Privileged Account Management (PAM) solution that you purchase, whether it’s from Thycotic or elsewhere, is nothing more than a tool to help you secure your infrastructure.  That’s a key thing to remember, because as a tool it will not do the job for you, nor suddenly make your organization secure if you do not…


A Cloud-First Strategy

March 14th, 2017

Guest column by Mike Somerville originally posted on Ed TechDigest on February 16, 2017 As Manager of Systems Support and Chief Cloud Evangelist, I lead the IT systems team at the University of San Diego. We’re responsible for four data centers, the network, virtualization, servers, and more—everything that needs a password for access. Automating Privileged…


Using Secret Server as Proactive Security Defense at Saab

June 21st, 2016

As vice president and CIO at Saab Defense and Security USA LLC, Per Hammarin manages a 10 member IT team in Washington, DC which is part of a parent organization based in Sweden.  Over more than 30 years and progressive positions within the civil aircraft and defense subsidiary of the company known for its iconic…


IT Weapons Customer Spotlight: Reducing Cyber Risk for Global Client Base

March 1st, 2016

  For the last 15 years, IT Weapons, a Konica-Minolta Company, has provided award-winning security consulting, private cloud solutions, and technology services for organizations worldwide. They had been using homegrown privileged account management (PAM) solutions, but grew quickly and determined that they needed an enterprise-class PAM solution to improve security and make going through audits…