+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Integration Spotlight’ Category

Get Complete Application Control Management with CylancePROTECT and Privilege Manager

October 19th, 2018

Thycotic customers are constantly requesting integrations with other products in their arsenal, especially other security products. Thycotic’s product team for Privilege Manager—our least privilege and application control product—is asked to work with CylancePROTECT® day after day. Our common customers are using both Thycotic and Cylance products on the endpoint to provide multiple layers of malware protection.…


Security: Powered by People

June 8th, 2017

Guest column by SailPoint. Author: Juliette Rizkallah The acceleration of cloud adoption is gaining more traction each day. If we’ve said it once, we’ve said it a thousand times, cloud is where the majority of enterprises are headed. It’s more than just your employees who are using the cloud to get things done; the cloud connects…


Cybersecurity Awareness: Empowering Our People

May 5th, 2017

Guest column by SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. Author: Darren Rolls Like it or not, when it comes to…


Need an IAM Solution? Make Sure It Has the Right Foundation

April 19th, 2017

Guest column by SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. In today’s highly distributed IT world, where organizations must secure a…


Security Metrics Must Tell a Story That is Relevant to Your Business

September 6th, 2016

To help you communicate your security program’s effectiveness, I’d like to share my first-hand experiences and thoughts on why metrics are crucial to your security program and how they should be presented to your executives and board members. Metrics must tell a story Most chief executive officers (CEOs) and board-level executives assume that the security…


Integration Spotlight: Enhanced Security with Credentialed Vulnerability Assessments with Tenable

July 7th, 2016

Organizations today are only barely scratching the surface when it comes to vulnerability assessments with unauthenticated scans. Unauthenticated scans still leave many unknowns that leave your organization vulnerable to attack. Credentialed Vulnerability Assessments Made Easy We are excited to announce our partnership and integration between Nessus® Cloud and Nessus® Manager with Thycotic Secret Server. The…


Why Authenticated Scanning Matters, and How To Do It Right

October 20th, 2015

Earlier this month, a few of us from Thycotic attended the Qualys Security Conference (QSC) and had the opportunity to speak at one of their spotlight sessions regarding authenticated scanning and how to do it right with Thycotic Secret Server. Amazingly, in speaking with several of the attendees there, we discovered that many of them…


New Enterprise Ticketing System Integrations Available for BMC Software and ServiceNow in Secret Server

October 5th, 2015

The ability to automatically respond to and track Secret Server privileged user activity in enterprise ticketing systems is a huge benefit for our customers, because it removes the manual burden of updating and closing out tickets based on what privileged users are doing within the solution. That’s why the latest update to Secret Server now…