
I wrote about the basics of service account management in Back to Basics: Service Account Management 101. Before I dive into service accounts in the cloud, here's a quick recap of that post. A quick recap on Service Accounts 101 What exactly are service accounts and why are they needed? Most organizations have two types…
With this newest release, Secret Server not only further strengthens its PAM cloud leadership, but also its overall enterprise readiness and usability. With Secret Server 10.7, users can now: Discover, manage, and delegate access for Amazon AWS privileged accounts Use Secret Server’s command line interface (CLI) from Windows, Mac, and Linux/Unix workstations Meet even the…
Virtually all cloud security failures will be the customers’ fault. That’s what Gartner believes the future of cloud security for the enterprise will look like within the next four years. More than half of cloud security issues will be caused by inadequate management of identities, access and privileges. “The challenge exists not in the security…
Are you considering moving from an on-premise PAM solution to one that delivers the security you expect for privileged credentials while still gaining the advantages of a cloud-based solution? If so, you’ll want to take a few tips from Tim Enders, Senior System Engineer at Loyola University Maryland’s Department of Technology Services—the Loyola University case study…
Today, many organizations have both privileged account management (PAM) and identity governance solutions that operate independently. As a result, organizations lack the ability to have a unified view of identities. As we discussed in “Top PAM Technology Integrations,” while PAM secures access to key system and admin accounts, integration with Identity & Access Management (IAM)…
Enterprises are no longer asking, “is the cloud secure?” with the same anxiety and fear they expressed just a few years back. As long as cloud-based IT resources are protected in a highly secure environment (such as SOC2 data centers) and demonstrate advanced security controls, enterprises have gotten on board the cloud train. The pace…
The cloud has always been this mysterious place—many companies embraced it and put everything they could into the cloud, while others watched cautiously from a distance, wondering whether they should do the same. Before taking you on the journey to the cloud, let’s answer the question “What is the cloud, exactly?” Clearly, it’s been a…
With the recent introduction of Thycotic’s upgraded Secret Server Cloud offering, organizations worldwide now have a full-featured PAM as a service product they can choose to protect their “keys to the kingdom.” That’s because Secret Server Cloud now delivers all the features and capabilities of our Secret Server on-premise flagship product, available in three editions…
Guest blog post by emt Distribution. According to The Australian Strategic Policy Institutes’ report on Cyber Maturity in the Asia-Pacific Region (2016), Australia is ranked at 4th place, one up from the weighted scores in 2015. Who’s doing better? The US, South Korea, and Japan, followed by Singapore, then New Zealand. So why are we not ranked…
Guest column by Mike Somerville originally posted on Ed TechDigest on February 16, 2017 As Manager of Systems Support and Chief Cloud Evangelist, I lead the IT systems team at the University of San Diego. We’re responsible for four data centers, the network, virtualization, servers, and more—everything that needs a password for access. Automating Privileged…