+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Customer Spotlight’ Category

Moving from on-premise to Privileged Access Management (PAM) in the cloud could be your next move

July 2nd, 2019

Are you considering moving from an on-premise PAM solution to one that delivers the security you expect for privileged credentials while still gaining the advantages of a cloud-based solution? If so, you’ll want to take a few tips from Tim Enders, Senior System Engineer at Loyola University Maryland’s Department of Technology Services—the Loyola University case study…


Behind the Scenes: Endpoint Protection in the Cloud

April 16th, 2019

The cloud has certainly been a game changer, driving innovation and growth.  Companies that adopted cloud services experienced a 20.7% average improvement in time to market, 18.8% average increase in process efficiency and a 15% reduction in IT spending. Together, these benefits led to a 19.6% increase in company growth. These savings and benefits, among…


Measurable Results of Service Account Privilege Management

April 4th, 2019

It’s very easy for service accounts to fall off your radar. Virtually all organizations have some unknown service accounts and some have thousands. Why do service accounts get lost? An employee leaves and the account is simply abandoned. The account is used less and less until it becomes obsolete and forgotten. Default accounts are left…


How to get your entire company on board with Privileged Access Management

November 13th, 2018

Maybe you’ve recently failed an audit, or you can’t stand yet another password being uploaded to your IT team’s risky, shared Excel doc. For whatever reason you are here, you are ready to tackle Privileged Access Management head on. But hold on, you may have a few hurdles you have to overcome first. Before you…


How secure are the passwords your MSP uses?

August 27th, 2018

How does your IT managed service provider (MSP) secure the passwords they use to access your systems?  Despite cyber-security concerns, few clients know where these passwords are stored or how often are they updated. With IT security, it’s what the client doesn’t see, that can matter most. Protecting passwords First Focus, a leading MSP in…


How one of the most well known cyber security organizations in the world benefited from privileged account management

September 26th, 2017

Any Privileged Account Management (PAM) solution that you purchase, whether it’s from Thycotic or elsewhere, is nothing more than a tool to help you secure your infrastructure.  That’s a key thing to remember, because as a tool it will not do the job for you, nor suddenly make your organization secure if you do not…


A Cloud-First Strategy

March 14th, 2017

Guest column by Mike Somerville originally posted on Ed TechDigest on February 16, 2017 As Manager of Systems Support and Chief Cloud Evangelist, I lead the IT systems team at the University of San Diego. We’re responsible for four data centers, the network, virtualization, servers, and more—everything that needs a password for access. Automating Privileged…


Using Secret Server as Proactive Security Defense at Saab

June 21st, 2016

As vice president and CIO at Saab Defense and Security USA LLC, Per Hammarin manages a 10 member IT team in Washington, DC which is part of a parent organization based in Sweden.  Over more than 30 years and progressive positions within the civil aircraft and defense subsidiary of the company known for its iconic…


IT Weapons Customer Spotlight: Reducing Cyber Risk for Global Client Base

March 1st, 2016

  For the last 15 years, IT Weapons, a Konica-Minolta Company, has provided award-winning security consulting, private cloud solutions, and technology services for organizations worldwide. They had been using homegrown privileged account management (PAM) solutions, but grew quickly and determined that they needed an enterprise-class PAM solution to improve security and make going through audits…


Why Adobe Chose Thycotic Secret Server for their Application Build Environment

January 19th, 2016

Recently, Adobe worked with us here at Thycotic to publish a use case document on how they’ve implemented Secret Server  for enterprise password management within their application build environment. While the core message surrounding the ability to automate processes and remove the human error element is critical for Adobe and just about any other organization out there,…