
Endpoints, the devices people use to access company resources, are a weak spot in corporate security. Compromised endpoints are a primary access point that cyber criminals use to infiltrate a network. Two-thirds of companies are compromised by exploits that originate with an endpoint. The volume of endpoint attacks is rising, as is the sophistication of…
One of the most significant challenges today within endpoint security via application control is the sometimes tedious task of application categorization to create allowlists, denylists, and restrictlist. What is application control? Application control allows you to proactively manage and monitor all the applications running on your endpoints with policy-driven controls. Application control can be executed…
We focus on usable security. Here’s what that means for the next iteration of Privilege Manager It’s no secret that Thycotic is the usable security leader in the Privileged Access Management space. In the past year our UX team has been working on the entire product line to modernize and simplify the products’ experience. One…
The cloud has certainly been a game changer, driving innovation and growth. Companies that adopted cloud services experienced a 20.7% average improvement in time to market, 18.8% average increase in process efficiency and a 15% reduction in IT spending. Together, these benefits led to a 19.6% increase in company growth. These savings and benefits, among…
The matter of least privilege cybersecurity has become a priority for companies across the spectrum. One of the big reasons, of course, is that 80 percent of breaches today involve the compromise of IT and business user credentials including usernames and passwords. To combat the exploitation of compromised accounts, organizations increasingly recognize how important it…
PowerShell and other scripting tools are part of an IT professional’s arsenal. They are incredibly powerful, a force multiplier which allows you to automate important or frequently used tasks. The same traits that make these tools a boon for IT pros also make them valuable to malicious actors who can use them to exponentially increase their…
Did you hear the news? We’ve entered into an original equipment manufacturing (OEM) agreement with IBM Security! This partnership comes with an increased need for organizations to secure privileged accounts that are connected to just about every device on the network. Breaches through privileged accounts are on the rise. Now more than ever, organizations need…
Updated April 14, 2020 Implementing least privilege means granting only the minimum permissions required by an end-user, application, service, task or system to perform the jobs they have been assigned. Least privilege is intended to prevent “over-privileged access” by users, applications, or services to help reduce the risk of exploitation without impacting productivity or involving…
Thycotic customers are constantly requesting integrations with other products in their arsenal, especially other security products. Thycotic’s product team for Privilege Manager—our least privilege and application control product—is asked to work with CylancePROTECT® day after day. Our common customers are using both Thycotic and Cylance products on the endpoint to provide multiple layers of malware protection.…
Many organizations gravitate towards Group Policy Objects (GPO) for privilege management because it offers enough functionality to get started managing privileges. Yet, as your needs evolve, you may find that you require a privilege management system better suited to a maturing, sophisticated organization. What are some of the warning signs that you need more than…