
By Art Gilliland and Jim Legg Today, we are pleased to share that Centrify and Thycotic have merged to become one. This follows on the previously-announced acquisitions of Centrify and Thycotic by TPG Capital. We are now able to embark on the process of integrating our businesses and solutions to better serve our customers and…
We are pleased to announce that Thycotic has been selected as a finalist in the “Best Customer Service” category of the 2021 SC Awards. For the last 24 years, the prestigious SC Awards have recognized the people, organizations and products that are forging the cybersecurity industry’s future and advancing the cause of safe and secure commerce and…
The landscape of privileged accounts is becoming increasingly complex as organizations add new applications and change working styles in an ongoing COVID-19 world. Meanwhile, cyber criminals are only getting smarter. If you wait too long to plug your security gaps there’s a good chance they’ll find a way to exploit them. Forrester’s most recent Privileged…
Technologists, engineers, and future-focused organizations tout automation as the answer to consistency, reliability, and quality. Automation takes basic tasks out of human hands, freeing up human resources to focus on research, strategy, and planning. Even more, automated systems and services can work tirelessly around the clock. ITOps, DevOps, and SecOps leaders and architects are incredibly…
A newly released eBook, The Definitive Guide to Endpoint Privilege Management (EPM), makes a strong case for why vulnerable endpoints must be secured from the perspective that all users are privileged users. In the guide’s Foreword, I emphasize that user identity has become the new “perimeter” of cyber security. That’s because a single compromised credential…
Over the past weeks, we've learned more about one of the biggest cyber attack on the software industry supply chain. This attack is a wake-up call for the software industry. It’s a true “mass indiscriminate global assault” as quoted by Brad Smith whom I regard as one of the most respected software leaders. His words…
The Thycotic team is excited to announce that we have been recognized as a Customers’ Choice in the January 2021 Gartner Peer Insights ‘Voice of the Customer’: Privileged Access Management Markets Large Enterprise, Finance, and North America. Our team at Thycotic takes great pride in this distinction, as customer feedback continues to shape our products…
Continuous learning is a top priority for me. It's critical to stay updated on the latest cyber security methods, technologies, strategies, and developments. 2020 brought the opportunity for us to indulge in some additional reading and learn new skills from incredible industry experts. From a young age, I struggled reading the likes of Shakespeare and…
Thycotic customers come in all shapes, sizes, and levels of experience. Some are new to PAM. Perhaps they recently inherited the program. Or maybe they’re building a PAM strategy from scratch. Our pro services team supports them at every stage of their journey. Some want more hands-on control. They prefer writing their own scripts, building…
According to recent technology buying decision research sponsored by Thycotic, a significant number of executives, IT security and operations teams look primarily to the advice of independent analysts when evaluating a PAM or PIM solution that would work best for their organizations. That means independent analysis becomes very important in identifying vendors that belong on your…