
The Thycotic team is excited to announce that we have been recognized as a Customers’ Choice in the January 2021 Gartner Peer Insights ‘Voice of the Customer’: Privileged Access Management Markets Large Enterprise, Finance, and North America. Our team at Thycotic takes great pride in this distinction, as customer feedback continues to shape our products…
Continuous learning is a top priority for me. It's critical to stay updated on the latest cyber security methods, technologies, strategies, and developments. 2020 brought the opportunity for us to indulge in some additional reading and learn new skills from incredible industry experts. From a young age, I struggled reading the likes of Shakespeare and…
Thycotic customers come in all shapes, sizes, and levels of experience. Some are new to PAM. Perhaps they recently inherited the program. Or maybe they’re building a PAM strategy from scratch. Our pro services team supports them at every stage of their journey. Some want more hands-on control. They prefer writing their own scripts, building…
According to recent technology buying decision research sponsored by Thycotic, a significant number of executives, IT security and operations teams look primarily to the advice of independent analysts when evaluating a PAM or PIM solution that would work best for their organizations. That means independent analysis becomes very important in identifying vendors that belong on your…
How do CISOs and other IT security professionals make informed decisions about tech purchases? A research survey commissioned by Thycotic was conducted among more than 900 CISOs / Senior IT decision-makers across nine countries in August 2020. The report of survey results takes a close look at how IT and security professionals make technology buying…
Identity governance is a critical foundational practice required to secure and manage privilege and access across the enterprise. Organizations are required to demonstrate an enterprise identity governance program that complies with nearly every significant compliance audit for almost every industry. Identity governance programs are typically deployed as part of the security stack that includes Identity…
What drives change in the security space? Either a significant shift in the business environment disrupts how people work, or technology advancements impact the attack surface. Today, security teams are facing both challenges. Remote work is here to stay. No company that I've talked with has plans to bring the full workforce back to the…
Thycotic is proud to announce that we have been named a Leader in the Gartner 2020 Magic Quadrant for Privileged Access Management (PAM). Based on our ability to execute and completeness of vision, Thycotic has been positioned as a Leader in the new Gartner 2020 Magic Quadrant for PAM. This marks a major milestone in our growth…
The convergence of operational technology (OT) and information technology (IT) has propelled “Industry 4.0” into the spotlight as the next wave of the industrial revolution. The Industrial Internet of Things (IIoT) brings IT and OT together in industries such as manufacturing, logistics, smart buildings, utilities, and critical infrastructure. Companies that get IIoT right will have…
The 2020 Verizon Data Breach and Incident Report (DBIR) published in May gives a clear indication of where privileged access management (PAM) security is going these days. And the forecast is for cloudy skies ahead. That’s because: 77% of cloud breaches are due to compromised credentials Attacks on web applications more than doubled in 2019…