+1-202-802-9399 U.S. Headquarters
Free Trial

Posts Tagged ‘enterprise password management’

How to create an Enterprise Password Policy that gets used

Friday, January 6th, 2017

Humans are fascinating creatures, and the way we think is intriguing and drives many career paths. But what does the human brain have to do with Security? And most importantly, what does it have to do with Password Policies? Understanding how the human brain works (at a high level) helps understand the best Password Policy […]

The Password Spreadsheet: why you must NOT store enterprise passwords in Excel

Tuesday, December 6th, 2016

Is your organization still using an Excel password spreadsheet to store and manage sensitive passwords—the keys to your kingdom? You’re not alone. But storing privileged account passwords and credentials in a spreadsheet poses a serious security risk. There should be no such thing as a ‘password spreadsheet’ Excel was never intended to be a password […]

The Mission of Secret Server Free

Tuesday, November 29th, 2016

The Threat Not only do privileged accounts exist on every network, but they exist on nearly every aspect of it. The router has an administrative login, the database has one, and every workstation has either a local or domain administrator account that can be accessed from it. The reality is that these accounts, if compromised, […]

CYBER SMART: How many organizations don’t require approval for creating new Privileged Accounts?

Thursday, November 3rd, 2016

Question of the Week: How many organizations don’t require approval for creating new Privileged Accounts? Answer: 70% New benchmark global survey shows Privileged Account Management a top security priority, but failing in enforcement. The 2016 State of PAM Report, based on the survey, highlights the major areas of concern including that 70% of organizations do not require […]

10 Questions the Board of Directors Should Ask About Cybersecurity

Tuesday, June 7th, 2016
Corporate directors play an important role in ensuring their companies have sufficient policies and resources in place to address IT security and to respond in the event that the company suffers a cyber-attack. Board of directors should demand to receive appropriate and timely information to help them fulfill their oversight role in managing cyber risk. [...]

Privileged Passwords and PCI-Compliance

Thursday, June 2nd, 2016
Guest post from Alpha Generation a Thycotic certified partner who specializes in IT distribution with a focus on proactive security in the UK. Anyone that handles payment card data is affected, so most of us have heard of the Payment Card Industry Data Security Standard (PCI-DSS). It establishes key expectations for protecting cardholder data, whether you’re handling [...]

Thycotic’s Secret Server 9.0 Wins Bronze in the 11th Annual 2016 IT World Award® in New Products and Services Category

Thursday, May 19th, 2016

WASHINGTON, May 19, 2016 – Thycotic, provider of privileged account management (PAM) solutions for more than 7,500 organizations worldwide, announced today that Network Products Guide, industry’s leading technology research and advisory guide, has named Thycotic’s Secret Server 9.0 a Bronze winner in the 11th Annual 2016 IT World Awards® in the New Products and Services […]

CYBER SMART: When was the world’s first computer password used?

Friday, February 5th, 2016

Question of the Week:  When was the world’s first computer password used?   Answer: 1960  Password usage dates back to the days of Shakespeare and the Romans. Although the true password creation story is unknown, the world’s first computer password was used by MIT in the 1960s with the beginning of the Compatible Time-Sharing System […]

The Triple A’s of Privileged Account Protection- A Customer Case Study

Tuesday, January 26th, 2016

Founded in 1993, Community IT Innovators provides a variety of managed IT services to over 150 organizations in the United States. As they grew, they quickly realized that their homegrown privileged account management solution needed to be replaced with a more scalable and secure solution that would also be capable of auditing credential usage and […]

Go from Last to First: Why Thycotic is the #1 Password Management Tool chosen by IT admins

Friday, October 9th, 2015

It’s no surprise that passwords are the number one target for attackers to achieve success during any data breach. Password management has been a major discussion for IT professionals for years, and as the battle between efficiency and security rages on between security and operations teams, the idea of password management often becomes a point […]