Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Product Spotlight’ Category

Stronger Secrets Management in the Latest Version of Secret Server

April 15th, 2021

Secrets management requires broader and deeper security controls than traditional enterprise PAM. The latest release of Thycotic Secret Server provides stronger secrets management than ever before. Usability, workflow, and reporting enhancements to Secret Server save you time and strengthen your attack surface. Remove roadblocks in the approval workflow  Secret Server’s approval workflows increase visibility and…


Thycotic Cloud Automation Tool Bundle Is Multi-Layered Privilege Security

March 9th, 2021

The explosion of Cloud IT has made privileged access management impossible without automation tools. Critical technical service accounts run through AWS, Azure, and Google Cloud Platform. DevOps teams connect and build cloud applications using CI/CD toolchains. Business users are adopting SaaS tools at a rapid clip—the average enterprise has hundreds of web-based SaaS tools that…


Privilege Manager 11: New Privilege Management Capabilities for Unix and Linux

March 2nd, 2021

With the latest release of Privilege Manager, all endpoints and servers throughout your organization can now follow consistent least privilege and Zero Trust policies, whether they are Windows, Mac, or Unix/Linux. Until now, privilege security for Unix/Linux has been cumbersome and even risky.  Unix/Linux has become the go-to operating system for many types of computer…


Ensuring Database Security in the DevOps Pipeline with Dynamic Secrets

November 10th, 2020

The traditional “vault-and-forward” method for secrets management means a user or application authenticates to the vault and then gets access to the secrets they need. The fundamental problem is once those secrets are out of the vault, it is extremely difficult to ensure their safety. In the case of an application, the ways Secrets can…


Integrating Service Account Management Within Existing IT Workflows

September 22nd, 2020

IT service management providers have made strides replacing collections of legacy tools with a single unified IT service management platform. However, there are still many aspects of IT administration that must be done manually outside of such unified platforms. Service account management is one task that is commonly cumbersome to IT administrators and those in…


DevOps Secrets Vault Release Offers Out-of-the-Box Secret Server Integration and New Home Vault Feature

September 15th, 2020

For DevOps teams, on-demand access to source code, tools, test servers, and production builds are necessary to administer systems and debug production issues. The focus for DevOps security should be automation It’s common to share private keys and credentials for immediate access, which increases the risk from both external and insider threats, either malicious or…


Privilege Manager 10.8: Simplifying endpoint privilege management through usable security

August 25th, 2020

A powerful new interface and additional enhancements make Privilege Manager 10.8 an important release to ensure usable security. Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Over the past year, our product teams and UX and human-computer interaction team have…


Announcing Identity Bridge: Streamline authentication and authorization for Unix and Linux

August 18th, 2020

I’ve been working in the identity and access management (IAM) field for more than 20 years. Unix and Linux user management has been a challenge throughout all those years. If you have a single Unix or Linux server and a manageable number of users, there’s no issue. But no one only has one server and…


Secret Server Product Update: Enhancements for the New Reality of Cloud and Remote Work

August 11th, 2020

The modern IT environment is diverse and constantly changing. In the always-on, Internet-connected global marketplace, traditional perimeters are disappearing as most organizations rely more and more on cloud-based applications to conduct business. Now, you can simplify management of an IT environment that includes multiple cloud instances, remote workers, and 3rd-party contractors It’s challenging to keep…


Addressing emerging PAM use cases to protect access to SaaS applications, cloud infrastructure, and databases

June 2nd, 2020

With most of the global, white-collar workforce suddenly shifting to working remotely, cloud technology has emerged as a critical component to keep businesses up and running. These services are enabling people to collaborate with one another, and provide the tools they need to stay productive, enhance accessibility and create a mobile friendly environment while working…