Thycotic Telephone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘PAM Advanced’

Together Thycotic & IBM Deliver Next-Generation Privileged Access Management

November 27th, 2018

Did you hear the news? We’ve entered into an original equipment manufacturing (OEM) agreement with IBM Security! This partnership comes with an increased need for organizations to secure privileged accounts that are connected to just about every device on the network. Breaches through privileged accounts are on the rise. Now more than ever, organizations need…


What is Least Privilege? Why you need it and how to get started

November 20th, 2018

Least privilege calls for granting only the minimum permissions required by an end-user, application, service, task or system to perform the jobs they have been assigned. Least privilege is intended to prevent “over-privileged access” by users, applications, or services to help reduce the risk of exploitation without impacting productivity or involving the IT help desk.…


How to get your entire company on board with Privileged Access Management

November 13th, 2018

Maybe you’ve recently failed an audit, or you can’t stand yet another password being uploaded to your IT team’s risky, shared Excel doc. For whatever reason you are here, you are ready to tackle Privileged Access Management head on. But hold on, you may have a few hurdles you have to overcome first. Before you…


Gartner says PAM a top cybersecurity priority. Thycotic makes robust PAM in the Cloud a reality.

September 25th, 2018

With the recent introduction of Thycotic’s upgraded Secret Server Cloud offering, organizations worldwide now have a full-featured PAM as a service product they can choose to protect their “keys to the kingdom.” That’s because Secret Server Cloud now delivers all the features and capabilities of our Secret Server on-premise flagship product, available in three editions…


2018 Global State of Privileged Access Management Risk and Compliance: Part 1

April 26th, 2018

Most companies are FALLING SHORT on compliance when it comes to privileged accounts! Thycotic’s research shows Privileged Access Management is a Top Risk and Compliance requirement, yet it’s significantly failing to be fully implemented meaning that most companies fall short on compliance for privileged access. The majority of organizations begin to implement Privileged Access Management…


Privileged Behavior Analytics Deep-Dive: Responsive Actions

February 27th, 2018

Privileged Behavior Analytics Recap Thycotic’s Privileged Behavior Analytics (PBA) software monitors user activity within Secret Server to detect anomalous behavior.  Once the user’s baseline activity is determined, deviations from that behavior can trigger alerts or warnings to notify security admins.  The software’s machine learning considers the time of day, IP address, user history, Secret importance,…


Secret Server and Privilege Manager 10.4: Six improvements mean more security in less time

January 25th, 2018

Thycotic is proud to announce the release of version 10.4 for Secret Server and Privilege Manager. Secret Server 1. Software Development Kit (SDK) One of the greatest problems in IT security today is the widespread use of embedded credentials—usually as part of a connection string, scripts and applications can contain usernames and passwords that they…


SSH Key Management: why you should never manage SSH keys manually

December 5th, 2017

Has your organization moved beyond simple user name and password schemes for accessing Unix and Linux systems by relying on SSH keys to allow access? If so, congratulations! You have greatly increased your overall security posture. However, if your organization is managing SSH keys manually, you have a long way to go before you can…


How one of the most well known cyber security organizations in the world benefited from privileged account management

September 26th, 2017

Any Privileged Account Management (PAM) solution that you purchase, whether it’s from Thycotic or elsewhere, is nothing more than a tool to help you secure your infrastructure.  That’s a key thing to remember, because as a tool it will not do the job for you, nor suddenly make your organization secure if you do not…


Passwords and Biometrics. Can they coexist, and should they?

August 23rd, 2017

The vision of a biometrics-led future for IT security is breathtaking, but is there a place in the future for passwords? Or are passwords ancient history? Passwords Need Better Management, Not Replacement Forget your passwords. They’re ancient history. That’s the message you’ll increasingly see if you keep up with the latest developments in security. But…