+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Product News’ Category

Gartner says PAM a top cybersecurity priority. Thycotic makes robust PAM in the Cloud a reality.

September 25th, 2018

With the recent introduction of Thycotic’s upgraded Secret Server Cloud offering, organizations worldwide now have a full-featured PAM as a service product they can choose to protect their “keys to the kingdom.” That’s because Secret Server Cloud now delivers all the features and capabilities of our Secret Server on-premise flagship product, available in three editions…


Introducing Privileged Access Management that fits your Bandwidth, Budget and Small Business

July 17th, 2018

Thycotic has just introduced Secret Server Vault—a privileged access management (PAM) solution specifically designed for small to medium size businesses and department-level teams. There are a several big reasons why Secret Server Vault makes sense for SMBs like yours. First and foremost, no matter the size of your business you need enterprise-grade PAM protection. That’s…


What DevOps Teams Need to Know about Privileged Account Security

April 10th, 2018

In a DevOps workflow, your testing and production environments are constantly changing. DevOps teams need access to a variety of infrastructures, across cloud, multi-cloud, hybrid cloud and on-prem environments. Administrative privileges are used by the configuration management and orchestration systems that continually spin up new servers, install software and make configuration changes throughout the SDLC. In an “infrastructure as code” model,…


MSPs: How do you get customers to pay for Privileged Account Management?

February 23rd, 2018

According to the Verizon 2017 data breach report, privilege misuse is the 2nd most cause of incidents. As a managed service provider there are two separate, but just as serious, points to consider. 1.You are using and storing privileged account credentials for your customer's networks so your technicians can perform their jobs quickly 2.Your customers…


Integrating Privileged Account Management Into DevOps

February 8th, 2018

By 2021, security practices will be embedded in 80% of rapid development teams. That’s a rapid increase from 15% in 2017, according to Gartner. Hence the term, “DevSecOps.”  Just a few years ago, DevOps was still a new concept, only implemented by cutting-edge tech teams pushing out dozens or hundreds of software updates per day. These days, at…


Secret Server and Privilege Manager 10.4: Six improvements mean more security in less time

January 25th, 2018

Thycotic is proud to announce the release of version 10.4 for Secret Server and Privilege Manager. Secret Server 1. Software Development Kit (SDK) One of the greatest problems in IT security today is the widespread use of embedded credentials—usually as part of a connection string, scripts and applications can contain usernames and passwords that they…


It’s Coming… The New Face of PAM

November 20th, 2017

At Thycotic, we are experts in Privileged Account security – and soon, we’ll be releasing new features, capabilities, and products to help ensure that our customers’ privileged accounts and endpoints remain secure from the growing threat of cyberattacks. What we’re working on will change how companies think about privileged account management and oversight. Our customers…


What is PuTTY and what’s new with it in 2017?

September 7th, 2017

  What is PuTTY? PuTTY is an open source application that allows you to connect remotely to many different types of systems, over various communication protocols.  However, PuTTY is most famously used for SSH connects from Windows systems to Unix based systems.  This application allows you to connect your private SSH keys and enter passphrases…


VIDEO: Key Benefits of Privileged Behavior Analytics

April 5th, 2017

Wouldn’t it be nice to ignore the “clutter” around privileged accounts and be notified immediately when there are indicators of privileged account abuse? According to Forrester, it is estimated that 80% of breaches involve Privileged Accounts. If you don’t have a system in place, your organization may never detect a stolen credential. In this video,…


Privileged Behavioral Analytics 101 – How does PBA strengthen IT security

March 21st, 2017

According to Forrester, it is estimated that 80% of breaches involve privileged accounts. Many of those breaches are due to compromised privileged accounts or insider abuse. Our privileged account management tool, Secret Server, already assists you by safeguarding your privileged accounts by storing them in an encrypted repository where you can launch sessions using the…