+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Free How-To Tech Advice’ Category

SSH proxies vs. jump hosts—how to save time and spend less

October 29th, 2019

Security practices are constantly evolving. What might have been considered a state-of-the-art approach ten or even five years ago is no longer defined as a best practice.     In the case of securing Remote Desktop Protocol (RDP), PAM practices have followed this pattern of evolution. What was once a common way of securing RDP—jump hosts—is…


Trick or Treat? Stay safe during National Cybersecurity Awareness Month in October, and beyond

October 8th, 2019

Ah, October! Summer has officially come to an end and we’ve quickly moved on to jumpers, football, and pumpkin everything. October is also National Cybersecurity Awareness Month. The theme for 2019 is “Own IT. Protect IT. Secure IT.”  But it needn't be scary, and the tricks or treats you get at the end of the…


Can PAM and Zero Trust Coexist?

September 26th, 2019

What is the Zero Trust security model and why was it introduced? The concept of Zero Trust security isn’t new; the term was coined by Forrester back in 2010 and was initially synonymous with a network security approach known as micro-segmentation. Micro-segmentation is a way to create secure zones in data centers and cloud deployments…


How to Find Your Best Match Among Privileged Access Management Vendors

August 6th, 2019

So, you want to bring on a PAM solution and you’re either selecting a Privileged Access Management vendor for the first time, or you may be “upgrading” from a typical password manager software product.  In any case, you’re probably looking for several PAM capabilities, as well as how best to deploy your proposed PAM solution:…


Take Control of Secrets in Your DevOps Environment

July 23rd, 2019

DevOps has emerged as a key practice to maintain speed and innovation where technology and software development drives business. Now, at least half of IT organizations are using DevOps, accelerating their ability to release new code to accommodate ever more competitive market demands. The aim is to improve speed while simultaneously reducing chances of defects…


Thycotic SCIM Connector for Integrations with Secret Server

May 30th, 2019

Today, many organizations have both privileged account management (PAM) and identity governance solutions that operate independently. As a result, organizations lack the ability to have a unified view of identities. As we discussed in “Top PAM Technology Integrations,” while PAM secures access to key system and admin accounts, integration with Identity & Access Management (IAM)…


Fast, Faster, Fastest: Speed Requirements for Your Password Vault

May 28th, 2019

You’re facing unprecedented pressure to deliver higher levels of service and improve speed to market. At the same time, you need enterprise-wide visibility and control to reduce risk. Do you need a high-speed password vault to protect privileged accounts? If so, how fast is fast enough? These are the questions we’ve been asking to develop…


6 PAM Technology Integrations That Should Be On Every PAM Admin’s To-Do List

May 14th, 2019

Mastering the art and science of integrating other technologies with PAM solutions to enable maximum cyber security visibility and efficiency is no small task. Start from the premise that PAM controls work best when they are integrated with other IT and cyber security tools.  With tight integration, the IT Admin with an advanced level of knowledge can…


How to Remove Admin Rights Without Reducing Productivity

April 9th, 2019

This is a guide to the risks associated with admin rights and over-privileged users, and how to remove admin rights in order to reduce those risks.  There are many options for removing administrator rights, however you must always consider business operation—removing admin rights should never jeopardize productivity.  Why do organizations use admin rights in the…


The 7 Deadly Privileged Accounts You MUST Discover, Manage and Secure

March 26th, 2019

Privileged accounts and privileged access are at the heart of every business today. They ensure that the IT team can administer and manage the organization’s systems, infrastructure, and software, and they enable employees to access the data that enables them to make critical business decisions. Not only are most businesses dependent on privileged accounts, but…