Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Cloud Security’

PAM and AWS: Keeping pace with AWS privileged accounts

February 4th, 2020

Amazon Web Services (AWS) gives IT and development teams tools to move fast and change direction on a dime. Privileged accounts for AWS resources are created quickly and may be abandoned just as quickly. With such a fluid process, it’s difficult for security teams to stay on top of how many privileged accounts have access…


Service Account 201: Service Accounts in the Cloud

November 12th, 2019

I wrote about the basics of service account management in Back to Basics: Service Account Management 101.  Before I dive into service accounts in the cloud, here's a quick recap of that post. A quick recap on Service Accounts 101 What exactly are service accounts and why are they needed?  Most organizations have two types…


Secret Server product update: Conquer common cloud challenges with the release of Secret Server 10.7

September 12th, 2019

With this newest release, Secret Server not only further strengthens its PAM cloud leadership, but also its overall enterprise readiness and usability. With Secret Server 10.7, users can now: Discover, manage, and delegate access for Amazon AWS privileged accounts Use Secret Server’s command line interface (CLI) from Windows, Mac, and Linux/Unix workstations Meet even the…


Cloud Use Cases: Critical PAM controls to secure a modern cloud environment

July 30th, 2019

Virtually all cloud security failures will be the customers’ fault. That’s what Gartner believes the future of cloud security for the enterprise will look like within the next four years. More than half of cloud security issues will be caused by inadequate management of identities, access and privileges. “The challenge exists not in the security…


Moving from on-premises to Privileged Access Management (PAM) in the cloud could be your next move

July 2nd, 2019

Are you considering moving from an on-premises PAM solution to one that delivers the security you expect for privileged credentials while still gaining the advantages of a cloud-based solution? If so, you’ll want to take a few tips from Tim Enders, Senior System Engineer at Loyola University Maryland’s Department of Technology Services—the Loyola University case study…


Thycotic SCIM Connector for Integrations with Secret Server

May 30th, 2019

Today, many organizations have both privileged account management (PAM) and identity governance solutions that operate independently. As a result, organizations lack the ability to have a unified view of identities. As we discussed in “Top PAM Technology Integrations,” while PAM secures access to key system and admin accounts, integration with Identity & Access Management (IAM)…


The new cloud security question PAM experts need to answer

February 19th, 2019

Enterprises are no longer asking, “is the cloud secure?” with the same anxiety and fear they expressed just a few years back. As long as cloud-based IT resources are protected in a highly secure environment (such as SOC2 data centers) and demonstrate advanced security controls, enterprises have gotten on board the cloud train. The pace…


Up, up and to the Clouds: Cloud Computing 101

January 22nd, 2019

The cloud has always been this mysterious place—many companies embraced it and put everything they could into the cloud, while others watched cautiously from a distance, wondering whether they should do the same. Before taking you on the journey to the cloud, let’s answer the question “What is the cloud, exactly?” Clearly, it’s been a…


Gartner says PAM a top cybersecurity priority. Thycotic makes robust PAM in the Cloud a reality.

September 25th, 2018

With the recent introduction of Thycotic’s upgraded Secret Server Cloud offering, organizations worldwide now have a full-featured PAM as a service product they can choose to protect their “keys to the kingdom.” That’s because Secret Server Cloud now delivers all the features and capabilities of our Secret Server on-premises flagship product, available in three editions…


How mature is Australia really, when it comes to cyber security?

May 16th, 2017

Guest blog post by emt Distribution.  According to The Australian Strategic Policy Institutes’ report on Cyber Maturity in the Asia-Pacific Region (2016), Australia is ranked at 4th place, one up from the weighted scores in 2015. Who’s doing better? The US, South Korea, and Japan, followed by Singapore, then New Zealand. So why are we not ranked…