
Thycotic is proud to announce the release of version 10.4 for Secret Server and Privilege Manager. Secret Server 1. Software Development Kit (SDK) One of the greatest problems in IT security today is the widespread use of embedded credentials—usually as part of a connection string, scripts and applications can contain usernames and passwords that they…
New Cloud-Based Tool Proactively Detects Advanced Cyberattacks WASHINGTON, April 13, 2017 /PRNewswire/ — Thycotic, a provider of privileged account management (PAM) solutions for more than 7,500 organizations worldwide, today unveiled Privileged Behavior Analytics (PBA). This cloud-based tool gives IT and security professionals the ability to quickly detect security breaches and abuse by analyzing anomalous behavior…
Wouldn’t it be nice to ignore the “clutter” around privileged accounts and be notified immediately when there are indicators of privileged account abuse? According to Forrester, it is estimated that 80% of breaches involve Privileged Accounts. If you don’t have a system in place, your organization may never detect a stolen credential. In this video,…
According to Forrester, it is estimated that 80% of breaches involve privileged accounts. Many of those breaches are due to compromised privileged accounts or insider abuse. Our privileged account management tool, Secret Server, already assists you by safeguarding your privileged accounts by storing them in an encrypted repository where you can launch sessions using the…
Get a load of this: an alarming 57 percent of Americans believe that they know as much, or more, about cybersecurity as their IT Directors, according to a comprehensive survey conducted on behalf of Blumberg Capital. This same group of individuals reported that keeping their work passwords secure (10 percent) is only a little more…
Wouldn’t it be nice to be able to identify a potential threat before it happens? Learn how Secret Server uses threat modeling and behavioral analytics to discover and take immediate action on a threat, stopping an attacker in their tracks. Threat Modeling The term “threat modeling” has become quite popular lately as an upcoming major…