Contact Us +1-202-802-9399 U.S. Headquarters

Archive for the ‘Solutions’ Category

Thycotic Launches Free Privileged Accounts Discovery for Windows

Tuesday, February 2nd, 2016

WASHINGTON, Feb. 2, 2016 /PRNewswire/ — Thycotic, provider of privileged account management solutions for more than 3,500 organizations world-wide, today announced that Privileged Accounts Discovery for Windows is now being offered for free. Designed with security pros, IT management and C-level executives in mind, the tool provides one collection point for all Windows privileged accounts, generates […]

Breaking Bad Behavior

Tuesday, December 1st, 2015

Behavioral Analysis is becoming a huge buzzword in the IT and Information Security industries. With the idea that you can automatically determine whether or not what’s going on within your network is legitimate or not is a huge benefit to any organization. But, challenges exist. The sheer volume of data available makes finding attention-worthy events […]

Go from Last to First: Why Thycotic is the #1 Password Management Tool chosen by IT admins

Friday, October 9th, 2015

It’s no surprise that passwords are the number one target for attackers to achieve success during any data breach. Password management has been a major discussion for IT professionals for years, and as the battle between efficiency and security rages on between security and operations teams, the idea of password management often becomes a point […]

PAM Security Blog Series Part 5: Tips for Implementing Privileged Account Management Solutions

Tuesday, September 8th, 2015

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. Don’t take the boil the ocean approach. Implementing a privileged account management strategy is a foundational element […]

PAM Security Blog Series Part 4: 3 Privileged Account Management Security Benefits

Tuesday, August 4th, 2015

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. Part four of our video blog series continues as Dave and Marcus dive into the security benefits […]

PAM Security Blog Series Part 3: How to secure your privileged credentials

Tuesday, July 21st, 2015

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. You’ve heard from the experts why privileged credentials are at the heart of most large-scale cyber-attacks, read […]

Up, up and away: How Distributed Engine technology helps Thycotic scale privileged account management for large enterprises

Tuesday, July 14th, 2015

Why Distributed Engine? When you run Discovery, Password Changing, or Heartbeat in Thycotic Secret Server, all the work is queued up inside the web application. This requires no additional configuration and works well out of box. We strive to make Secret Server easy to configure and get working quickly, but also powerful enough that when […]

How Marketers Can Prepare for a Cyber Security Crisis

Tuesday, March 31st, 2015

Do you have a cyber security plan? What happens when a corporate social media account is hijacked for mischief or political gain? Or when sexually explicit Tweets are accidentally published because corporate account access was mismanaged? In an ever-evolving cyber security climate where we hear about a new corporate breach almost every day, brands are […]

Predicting Potential Threat: Behavior Analytics & Threat Modeling

Tuesday, October 21st, 2014

Wouldn’t it be nice to be able to identify a potential threat before it happens? Learn how Secret Server uses threat modeling and behavioral analytics to discover and take immediate action on a threat, stopping an attacker in their tracks. Threat Modeling The term “threat modeling” has become quite popular lately as an upcoming major […]

What is a smart grid and why should I care about it?

Tuesday, September 16th, 2014

In the United States, we depend on the electrical grid to power our homes, our businesses, and several leisurely pastimes (late-night soccer, anyone?). Today, that grid is “smart,” which is a catchy way of saying it uses modern technology for operation and automation, a technology trendseen in everything from consumer gadgets to datacenters. Just as […]

Secret Server is the enterprise password management software that IT Admins and Security Pros love!

Try it FREE for 30 Days