+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Product News’ Category

VIDEO: Key Benefits of Privileged Behavior Analytics

April 5th, 2017

Wouldn’t it be nice to ignore the “clutter” around privileged accounts and be notified immediately when there are indicators of privileged account abuse? According to Forrester, it is estimated that 80% of breaches involve Privileged Accounts. If you don’t have a system in place, your organization may never detect a stolen credential. In this video,…


Privileged Behavioral Analytics 101 – How does PBA strengthen IT security

March 21st, 2017

According to Forrester, it is estimated that 80% of breaches involve privileged accounts. Many of those breaches are due to compromised privileged accounts or insider abuse. Our privileged account management tool, Secret Server, already assists you by safeguarding your privileged accounts by storing them in an encrypted repository where you can launch sessions using the…


Privileged Account Management Moves to the Cloud

February 22nd, 2017

How a cloud-first strategy works to secure student data and meet compliance mandates. Guest Column by Mike Summerville, University of San Diego and featured in EdTech Magazine. Automating Privileged Account Password Security As Manager of Systems Support and Chief Cloud Evangelist, I lead the IT systems team at the University of San Diego. We’re responsible for…


Everything you need to know about Secret Server’s New Add-on Modules

November 3rd, 2016

It’s time to boost your Secret Server productivity with our new add-on modules created to give you the customization and features your organization needs. Save time and effort while increasing your security when you enhance your Thycotic Secret Server solution with any of these integrated add-on modules. Choose which edition you currently use or are…


Protecting your network by implementing Least Privilege Policy

October 27th, 2016

Cyber breaches and ransomware are a global epidemic. According to SANS: • 44% admitted one or more of their endpoints had been compromised in the past 24 months. • 85% of reported breaches involved desktops, 68% involved laptops, and 55% involved servers. • The most common type of data compromised (49%) was login and access…


Security Metrics Must Tell a Story That is Relevant to Your Business

September 6th, 2016

To help you communicate your security program’s effectiveness, I’d like to share my first-hand experiences and thoughts on why metrics are crucial to your security program and how they should be presented to your executives and board members. Metrics must tell a story Most chief executive officers (CEOs) and board-level executives assume that the security…


Integration Spotlight: Enhanced Security with Credentialed Vulnerability Assessments with Tenable

July 7th, 2016

Organizations today are only barely scratching the surface when it comes to vulnerability assessments with unauthenticated scans. Unauthenticated scans still leave many unknowns that leave your organization vulnerable to attack. Credentialed Vulnerability Assessments Made Easy We are excited to announce our partnership and integration between Nessus® Cloud and Nessus® Manager with Thycotic Secret Server. The…


Using Secret Server as Proactive Security Defense at Saab

June 21st, 2016

As vice president and CIO at Saab Defense and Security USA LLC, Per Hammarin manages a 10 member IT team in Washington, DC which is part of a parent organization based in Sweden.  Over more than 30 years and progressive positions within the civil aircraft and defense subsidiary of the company known for its iconic…


How Security Can Make IT More Productive

May 31st, 2016

Recently, IDC posed the question “Can Security Make IT More Productive”? In their Technology Spotlight, IDC examined issues around security and the undergoing transformation from negative to positive and from obstructionist to an enablement role. The paper also highlighted how Thycotic solutions play in addressing associated challenges. According to IDC, Privileged Access Management (PAM) is…


Ransomware is a major threat. Learn how to use Least Privilege, Application Whitelisting & Privilege Account Management to reduce risk

May 3rd, 2016

Ransomware has become a major threat due to its many variations and drastic impact on restricting access to systems and data, often making day to day business unavailable and shutting down access to critical systems. Existing perimeter solutions today have failed to detect and prevent Ransomware from infecting and spreading within the organization’s networks creating…