+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Product News’ Category

It’s Coming… The New Face of PAM

November 20th, 2017

At Thycotic, we are experts in Privileged Account security – and soon, we’ll be releasing new features, capabilities, and products to help ensure that our customers’ privileged accounts and endpoints remain secure from the growing threat of cyberattacks. What we’re working on will change how companies think about privileged account management and oversight. Our customers…


What is PuTTY and what’s new with it in 2017?

September 7th, 2017

  What is PuTTY? PuTTY is an open source application that allows you to connect remotely to many different types of systems, over various communication protocols.  However, PuTTY is most famously used for SSH connects from Windows systems to Unix based systems.  This application allows you to connect your private SSH keys and enter passphrases…


VIDEO: Key Benefits of Privileged Behavior Analytics

April 5th, 2017

Wouldn’t it be nice to ignore the “clutter” around privileged accounts and be notified immediately when there are indicators of privileged account abuse? According to Forrester, it is estimated that 80% of breaches involve Privileged Accounts. If you don’t have a system in place, your organization may never detect a stolen credential. In this video,…


Privileged Behavioral Analytics 101 – How does PBA strengthen IT security

March 21st, 2017

According to Forrester, it is estimated that 80% of breaches involve privileged accounts. Many of those breaches are due to compromised privileged accounts or insider abuse. Our privileged account management tool, Secret Server, already assists you by safeguarding your privileged accounts by storing them in an encrypted repository where you can launch sessions using the…


Privileged Account Management Moves to the Cloud

February 22nd, 2017

How a cloud-first strategy works to secure student data and meet compliance mandates. Guest Column by Mike Summerville, University of San Diego and featured in EdTech Magazine. Automating Privileged Account Password Security As Manager of Systems Support and Chief Cloud Evangelist, I lead the IT systems team at the University of San Diego. We’re responsible for…


Everything you need to know about Secret Server’s New Add-on Modules

November 3rd, 2016

It’s time to boost your Secret Server productivity with our new add-on modules created to give you the customization and features your organization needs. Save time and effort while increasing your security when you enhance your Thycotic Secret Server solution with any of these integrated add-on modules. Choose which edition you currently use or are…


Protecting your network by implementing Least Privilege Policy

October 27th, 2016

Cyber breaches and ransomware are a global epidemic. According to SANS: • 44% admitted one or more of their endpoints had been compromised in the past 24 months. • 85% of reported breaches involved desktops, 68% involved laptops, and 55% involved servers. • The most common type of data compromised (49%) was login and access…


Security Metrics Must Tell a Story That is Relevant to Your Business

September 6th, 2016

To help you communicate your security program’s effectiveness, I’d like to share my first-hand experiences and thoughts on why metrics are crucial to your security program and how they should be presented to your executives and board members. Metrics must tell a story Most chief executive officers (CEOs) and board-level executives assume that the security…


Integration Spotlight: Enhanced Security with Credentialed Vulnerability Assessments with Tenable

July 7th, 2016

Organizations today are only barely scratching the surface when it comes to vulnerability assessments with unauthenticated scans. Unauthenticated scans still leave many unknowns that leave your organization vulnerable to attack. Credentialed Vulnerability Assessments Made Easy We are excited to announce our partnership and integration between Nessus® Cloud and Nessus® Manager with Thycotic Secret Server. The…


Using Secret Server as Proactive Security Defense at Saab

June 21st, 2016

As vice president and CIO at Saab Defense and Security USA LLC, Per Hammarin manages a 10 member IT team in Washington, DC which is part of a parent organization based in Sweden.  Over more than 30 years and progressive positions within the civil aircraft and defense subsidiary of the company known for its iconic…