Phone Number +1-202-802-9399 (US)

ThycoticCentrify is now Delinea!   delinea.com

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘For IT Admins’

Cloud Discovery: Find and Keep Track of Cloud Privileged Accounts

May 11th, 2021

One of the main advantages of using a cloud platform like AWS is that you don’t need to worry about maintenance and upgrades. Yet, cloud partnerships don’t absolve you of protecting sensitive information and processes. When you consider that Forrester Research found that 93% of enterprises are storing sensitive data in the cloud, you can…


Privileged Access Management Analytics: Make Your Data Work for You

May 4th, 2021

When time is a resource you don’t have — you must make your data work for you. IT teams face an ever-evolving and expanding environment compounded by a shifting remote workforce, increase in BYOD policies, expansion of the attack surface, and pivot towards the cloud. Users and endpoints have left the office and are now…


Stronger Secrets Management in the Latest Version of Secret Server

April 15th, 2021

Secrets management requires broader and deeper security controls than traditional enterprise PAM. The latest release of Thycotic Secret Server provides stronger secrets management than ever before. Usability, workflow, and reporting enhancements to Secret Server save you time and strengthen your attack surface. Remove roadblocks in the approval workflow  Secret Server’s approval workflows increase visibility and…


Privileged Identity Management (PIM) and Identity-Centric Security Controls

April 1st, 2021

The number of identities in the enterprise is exploding. Gaining control of identities related to people as well as machines is a challenge for many organizations. You need to know who your users are and what they do. If you experience a security incident, you must be able to reverse engineer who did what in…


Beyond Password Managers

March 16th, 2021

Passwords should be complex. Password management should be easy. Consumer password managers are popular solutions for personal password storage. These digital password vaults make it possible for people to have complex passwords for each website and application they use and help them avoid bad habits like writing passwords down or using the same password for…


Can Your Secrets Management System Keep a Secret?

March 4th, 2021

There are many different types of secrets in a digital enterprise. Secrets management requires broader and deeper security controls than traditional enterprise password management. It requires a coordinated process for managing all types of secrets in a centralized way to ensure systems and data remain secure. Secrets management keeps all secrets safe, prevents secret sprawl,…


What to Expect When Working with Thycotic Professional Services

January 12th, 2021

Thycotic customers come in all shapes, sizes, and levels of experience. Some are new to PAM. Perhaps they recently inherited the program. Or maybe they’re building a PAM strategy from scratch. Our pro services team supports them at every stage of their journey. Some want more hands-on control. They prefer writing their own scripts, building…


A look behind the scenes of a Wi-Fi Hack: What are the secrets?

December 29th, 2020

You snag a seat at your local café and open your laptop. Maybe you’re on the patio, grateful for the heater. The scent of coffee powers up your brain. The low hum of people chatting is welcome, after months of isolation. The logon page appears as you search for the Wi-Fi in your settings. Despite…


Every system is a privileged system: Incorporating Unix/Linux in your privilege management strategy

November 24th, 2020

Lately we’ve been banging the drum that “every user is a privileged user,” meaning privileged users aren’t limited to system administrators but also include business users with access to applications and endpoints linked to critical business data and functions. The second verse to that refrain is that “every system is a privileged system.” Within your IT environment,…


How to Remove Admin Rights Without Reducing Productivity

November 20th, 2020

This is a guide to the risks associated with admin rights and over-privileged users, and how to remove admin rights in order to reduce those risks.  There are many options for removing administrator rights, however you must always consider business operation—removing admin rights should never jeopardize productivity.  Why do organizations use admin rights in the…