Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Product Spotlight’ Category

Interview: PAM Product Q&A with Richard Wang

September 28th, 2021

It takes a village to develop ThycoticCentrify’s industry-leading Privileged Access Management solutions. I spoke with Richard Wang, Senior Director of Product Management at ThycoticCentrify to discuss what it’s like to lead the product team, how we develop our product roadmap, and advice for those starting and continuing along their PAM journey. Sara: Hi Richard, thank…


Privilege Manager Offers Increased Flexibility and Enterprise-Wide Security

September 21st, 2021

No enterprise is alike in the way they organize privileged users or choose to connect IT systems.  The latest release of Privilege Manager provides greater flexibility and choice by supporting diverse models for computer management and identity federation. For organizations that manage a variety of privileged users, business units, and connected technologies, Privilege Manager now…


Approval Workflows and Notifications for Busy People

August 31st, 2021

Maybe it's happened to you. You deleted a service account because it didn’t seem like any processes were tied to it. And then something broke. Privilege management mistakes happen—but they don’t have to. Setting up an end-to-end workflow for privileged account governance decreases the risk of mistakenly pulling the plug on an important process. The…


Certificate-Based Authentication and TTL for All Cloud Platforms

August 24th, 2021

DevOps is a world of machines. To access systems and data, secrets are exchanged between all types of machines, including databases and applications for software and infrastructure deployment, testing, orchestration, configuration, and Robotic Process Automation (RPA).    The speed and scale of DevOps requires secrets to be created instantly, tracked incessantly, and eliminated when no longer…


Six Questions Secret Server Answers in the Latest Updates

August 17th, 2021

You asked and we answered. We’ve been listening to questions Secret Server customers ask and working hard to make the industry’s top PAM solution even better. We’re excited to share a batch of updates to Secret Server that address your top concerns. 1. Is it possible to get rid of secrets and related data after…


Layered Privilege Security with Secret Server and Privilege Manager

June 22nd, 2021

Nearly all major data breaches involve both compromised endpoints and compromised privileged credentials. You must address both of these attack vectors in a layered security strategy to effectively lower your risk of a cyber attack. Layered security combines different security solutions into a coordinated, comprehensive strategy, the whole of which is greater than the sum…


Account Lifecycle Manager Automates and Simplifies Cloud-Based Service Account Governance

June 15th, 2021

It’s easy for a service account to get “lost.” It happens when an original account owner leaves and neglects to pass on vital information about its purpose. Or when the system tied to the service account is no longer needed. Or, when a service account is set up for temporary purposes, like software installation or…


Azure Sentinel Now Integrates with Secret Server for Better Visibility and Faster Incidence Response

May 25th, 2021

Complex, dynamic organizations often have dozens of platforms to manage, each monitoring a different aspect of the security stack. Many Microsoft shops use Azure Sentinel as the single source of truth for security logging. Sentinel aggregates data from multiple security solutions and automates much of the noise away so that security teams can focus on…


Secrets Management, Reporting, and Encryption for Effective DevSecOps

May 18th, 2021

As more enterprises adopt DevSecOps, success stories keep piling up. The latest comes from CyberEdge Group in its 2021 Cyberthreat Defense Report. According to their survey of DevSecOps organizations: 45.8% deploy applications more quickly 47.2% deploy updates more quickly 38.5% reduce costs 38.3% reduce app security vulnerabilities What secrets do these organizations know that others…


Cloud Discovery: Find and Keep Track of Cloud Privileged Accounts

May 11th, 2021

One of the main advantages of using a cloud platform like AWS is that you don’t need to worry about maintenance and upgrades. Yet, cloud partnerships don’t absolve you of protecting sensitive information and processes. When you consider that Forrester Research found that 93% of enterprises are storing sensitive data in the cloud, you can…