+1-202-802-9399 (US)

Thycotic’s Cyber Security Publication

FEATURED STORY:
How to get your entire company on board with Privileged Access Management

What Blue Cross Blue Shield Louisiana looked for in a PAM solution

Filter by Tags: 

Least Privilege Access Control Uncovered

November 20th, 2018

Before I describe the behaviors that make least privilege access control a critical component of your organization’s PAM strategy, let’s clearly define the Principle of Least Privilege (PoLP). The principle of least privilege calls for granting only the minimum permissions required by an end-user, application, service, task or system to perform the jobs they have…


Thycotic moves into leadership position for Privileged Identity Management in Forrester Wave

November 14th, 2018

This week Forrester Research Inc. named Thycotic a Leader in Privileged Identity Management, along with CyberArk, Centrify, and Beyond Trust.  The Forrester Wave™: Privileged Identity Management, Q4 2018 Report* evaluated 11 vendors based on 35 criteria across the categories “Current Offering”, “Strategy” and “Market Presence”.  Thycotic earned the highest possible scores for Privileged Password Safe/Vault, Users, Roles, and Helpdesk Integration, and Reporting.  Additionally, Thycotic received the highest…


How to get your entire company on board with Privileged Access Management

November 13th, 2018

Maybe you’ve recently failed an audit, or you can’t stand yet another password being uploaded to your IT team’s risky, shared Excel doc. For whatever reason you are here, you are ready to tackle Privileged Access Management head on. But hold on, you may have a few hurdles you have to overcome first. Before you…


Back to the Basics: Service Account Management 101

November 8th, 2018

Service accounts don’t have to be a nightmare. Get in control now.  Service accounts are typically used in operating systems to execute applications or run programs, either in the context of system accounts (high privileged accounts without any password) or a specific user account, usually created manually or during software installation.  On Unix and Linux…


Why an Enterprise Password Manager is for Everyone from SMBs to Corporations

November 6th, 2018

A simple yet effective way of managing business passwords takes high priority on the wish-list of every organization, big and small. This is evidenced by the sheer volume of people searching Google for “business password manager” every day. But what may surprise you is that no matter the size of your business—you must go beyond…


5 Spooky Privilege Security Mistakes that Will Haunt Your Organization

October 30th, 2018

It’s a dark and stormy night. Suddenly your system locks up. Then you get a message, demanding online payment to release your sensitive data back to you. Unfortunately, this isn’t a Halloween prank. Ransomware is on the rise and organizations of all types are falling victim. Your risk of cyber-attack exponentially increases if you’ve made…


Get Complete Application Control Management with CylancePROTECT and Privilege Manager

October 19th, 2018

Thycotic customers are constantly requesting integrations with other products in their arsenal, especially other security products. Thycotic’s product team for Privilege Manager—our least privilege and application control product—is asked to work with CylancePROTECT® day after day. Our common customers are using both Thycotic and Cylance products on the endpoint to provide multiple layers of malware protection.…


Thycotic’s Strategic Alliance program means Privileged Access Management Security for everyone

October 16th, 2018

Privileged Access Management is an important and vital security solution that helps protect one of the most important assets in an organization.  Software vendors can simply enable and empower their solutions by integrating into the world’s most popular, friendly, easy-to-use and most valuable Privileged Access Management solution available. Organizations and governments around the world have…


(SSH) Keys to Unix Security

October 9th, 2018

Root accounts are the keys to powerful IT systems, the backbone of your entire infrastructure. They use privileged credentials to control shell access, file transfers, or batch jobs that communicate with other computers or apps, often accessed remotely, with local configuration. They can be the trickiest of all types of privileged accounts to secure, particularly…


Ostriches, Zero Day Exploits, and the Elusive CyberSec Expert: Why SMBs Should Implement Cloud-Based PAM

October 2nd, 2018

Small and medium-sized businesses (SMBs) face a cyber security trifecta. Cyber criminals are increasingly targeting the most vulnerable businesses (not just the biggest fish). Sophisticated attackers quickly take advantage of newly revealed vulnerabilities. And, cyber security professionals are in short supply. Maybe SMBs aren’t aware that they can use the same types of security systems…