Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘PAM Advanced’

Thycotic and Centrify both named Leaders again in the 2021 Gartner Magic Quadrant for Privileged Access Management

July 21st, 2021

We’ve done it again! I’m very proud to share that both Thycotic and Centrify have again been recognized by Gartner as Leaders in the 2021 Gartner Magic Quadrant for Privileged Access Management (PAM). Evaluation by Gartner had already commenced before we announced the intent to combine as ThycoticCentrify in March 2021*. So this will be…


Case Study: High Security Architecture for Healthcare Networks

July 20th, 2021

Cyber attacks against the healthcare industry continue to rise. The recent cautionary tale of the University of Vermont Health Network’s ransomware scare is but one example of how attackers are ramping up to steal data and disrupt services. Hospitals are working to fortify their defenses to keep one step ahead of the bad guys. Even…


Layered Privilege Security with Secret Server and Privilege Manager

June 22nd, 2021

Nearly all major data breaches involve both compromised endpoints and compromised privileged credentials. You must address both of these attack vectors in a layered security strategy to effectively lower your risk of a cyber attack. Layered security combines different security solutions into a coordinated, comprehensive strategy, the whole of which is greater than the sum…


Interview: PAM Q&A with Dan Ritch

June 8th, 2021

It takes a village to develop ThycoticCentrify’s industry-leading Privileged Access Management solutions. I spoke with Dan Ritch, Senior Product Manager at ThycoticCentrify to discuss what it’s like to be a Product Manager at ThycoticCentrify and get his take on PAM for the cloud and how to drive adoption. What is your role at ThycoticCentrify? My…


Cloud Discovery: Find and Keep Track of Cloud Privileged Accounts

May 11th, 2021

One of the main advantages of using a cloud platform like AWS is that you don’t need to worry about maintenance and upgrades. Yet, cloud partnerships don’t absolve you of protecting sensitive information and processes. When you consider that Forrester Research found that 93% of enterprises are storing sensitive data in the cloud, you can…


Privileged Access Management Analytics: Make Your Data Work for You

May 4th, 2021

When time is a resource you don’t have — you must make your data work for you. IT teams face an ever-evolving and expanding environment compounded by a shifting remote workforce, increase in BYOD policies, expansion of the attack surface, and pivot towards the cloud. Users and endpoints have left the office and are now…


The New Cyber Security “Perimeter”: Securing Privileged Access

April 22nd, 2021

Because so many applications and services are now hosted in the cloud, the traditional cyber security perimeter no longer exists. Accelerated by the COVID global pandemic, remote access from multiple devices has become the rule rather than the exception across our networks. In our always-on, Internet-connected universe, every user potentially has access to privileged or…


Adoption Skyrockets with Invisible Privileged Access Management

April 20th, 2021

Traditional PAM solutions require users to interrupt their workflow to access privileged credentials. They must switch screens and switch contexts, slowing their productivity. Frustrated, busy users are more likely to skirt security policies when PAM is difficult to use. Privileged access management must be embedded in daily workflow To realize the benefits of enterprise PAM,…


Stronger Secrets Management in the Latest Version of Secret Server

April 15th, 2021

Secrets management requires broader and deeper security controls than traditional enterprise PAM. The latest release of Thycotic Secret Server provides stronger secrets management than ever before. Usability, workflow, and reporting enhancements to Secret Server save you time and strengthen your attack surface. Remove roadblocks in the approval workflow  Secret Server’s approval workflows increase visibility and…


Beazley Improves Security Compliance and Saves Time on Audits

April 6th, 2021

Specialist insurer Beazley has exponentially more secrets than employees. The volume and variety of their privileged accounts made them difficult to manage and time-consuming to audit. An external security audit identified gaps in Beazley’s secrets management processes that opened the door to potential privileged account attacks. “The audit discovered privileged account passwords that hadn’t been…