+1-202-802-9399 U.S. Headquarters

Find a partner

Use the filter below to find a Thycotic Partner

Search by Partner Type:
Results for: Technology

Technology

Vulnerability Scanning

Logo - Tenable Network Security

Tenable Network Security

Technology integration between Tenable and Thycotic increases efficiency for vulnerability assessments using privileged accounts.  The integration between Tenable Nessus® and Security Center with Thycotic’s Secret Server makes managing credentialed scans seamless and secure. Accounts are centralized and securely stored in Thycotic Secret Server, and Tenable requests them at run time, ensuring customers have the correct access every time without the hassles of manual credential management.

Columbia, Maryland
Technology:Vulnerability Scanning
www.tenable.com/alliance-partners/thycotic





Logo - Rapid7

Rapid7

Integration of Thycotic Secret Server and Rapid7 Nexpose Offers Improved Privileged Account Security and Credentialed Scanning Capabilities.  With the integration of Secret Server and Nexpose, IT administrators are able to mask credentials when accessing key applications and accounts on their network to perform vulnerability scans. Nexpose retrieves passwords directly from the Secret Server vault, which in turn maintains detailed security audit trails, tracking when a user accesses credentials and for what purpose. Administrators will maintain the ability to automatically generate complex passwords and perform scheduled rotations of credentials, diminishing the risk of privileged account abuses.

Boston, Massachusetts
Technology:Vulnerability Scanning
www.rapid7.com





Logo - Qualys

Qualys

Scan for security vulnerabilities proactively and protect your systems from security threats with QualysGuard.  Secret Server extends the reach of QualysGuard by making privileged passwords accessible for scanning while maintaining their security and compliance requirements. QualysGuard authenticates through the Secret Server API and credentials remain securely stored within Secret Server.

Redwood City, California
Technology:Vulnerability Scanning
www.qualys.com/partners/solution-technology/find/







Identity Governance and Administration

Sailpoint

The integration leverages the SailPoint Simple Table Integration (STI). Secret Server pushes data to the IdentityIQ (IIQ) STI database, which IIQ periodically reads to update entitlement data, via a synchronization task. This can be run on-demand or on a schedule.

Austin, Texas
Technology:Identity Governance and Administration
https://www.sailpoint.com/





RSA

You can build out custom workflows using your favorite scripting language with the Secret Server API to eliminate passwords embedded in scripts and build tasks. Secret Server has both SOAP and REST web services API’s, and can be integrated with using any programming language, such as .NET, Java, Python, Ruby, PowerShell, etc.

Bedford, Massachusetts
Technology:Identity Governance and Administration
community.rsa.com/community/products/rsa-ready#tuv





Omada

You can build out custom workflows using your favorite scripting language with the Secret Server API to eliminate passwords embedded in scripts and build tasks. Secret Server has both SOAP and REST web services API’s, and can be integrated with using any programming language, such as .NET, Java, Python, Ruby, PowerShell, etc.

Copenhagen, Denmark
Technology:Identity Governance and Administration
www.omada.net







Identity Access Management

Okta

Secret Server supports SAML 2.0 identity federation – an XML based protocol that uses tokens to pass information about a user between an Identity Provider (IdP) and a Service Provider (SP).  Secret Server acts as the Service Provider (SP) which communicates with any configured Identity Provider (IdP) such as Okta.

San Francisco, California
Technology:Identity Access Management
www.okta.com/







Access Rights Management

8MAN

You can build out custom workflows using your favorite scripting language with the Secret Server API to eliminate passwords embedded in scripts and build tasks. Secret Server has both SOAP and REST web services API’s, and can be integrated with using any programming language, such as .NET, Java, Python, Ruby, PowerShell, etc.

Berlin, Germany
Technology:Access Rights Management
www.8man.com







Reputation

VirusTotal

Application Reputation and Intelligence, Thycotic integrates into reputation engines like VirusTotal to check the reputation of an application before installing or executing the application.

Dublin, Ireland
Technology:Reputation
www.virustotal.com







Secure Remote Access

Bomgar

Bomgar retrieves passwords directly from the Thycotic Secret Server vault, which regularly randomizes complex passwords on privileged endpoints and maintains detailed security audit trails, tracking when a user accesses credentials and for what purpose. With the combined solutions, security organizations can empower users with the access they need to be productive, while granularly managing which systems they can connect to and when, monitoring and logging all access activity, and eliminating exposure of secure credentials.

Arlington, Virginia
Technology:Secure Remote Access
www.bomgar.com/press/bomgar-and-thycotic-partner-to-improve-privileged-account-access-security







Device Management

Symantec

Thycotic can integrate with Symantec Management Platform.  Thycotic can import existing Resource Collections from SMP and use them for Thycotic policy targets.  Thycotic can also scan SMP Software Packages and use the package contents in Thycotic Privilege Manager for Windows Policy Whitelists.

Mountain View, California
Technology:Device Management
www.symantec.com





Logo - wmware

VMware

Thycotic Secret Server helps VMware admins eliminate dangerous backdoor access by discovering and managing privileged accounts across the network.  Thycotic Secret Server is an on-premises privileged account management solution that discovers, vaults and securely manages passwords for privileged non-human accounts across the network – including hypervisor environments such as VMware ESX/ESXi.  With Thycotic Secret Server, IT administrators can better discover and automatically change passwords on ESX systems via built in API. This helps eliminate backdoor access, prevent unauthorized usage and ensure all device identities are secured in an encrypted vault.

Palo Alto, California
Technology:Device Management
www.vmware.com





Logo - Oracle Silver Partner

Oracle

Use Thycotic Secret Server to protect and manage Oracle credentials when accessing key applications and accounts.

San Jose, California
Technology:Device Management
www.oracle.com





Logo - F5

F5 Networks

Thycotic and F5 have partnered to provide overall security and reduce exposure of an organization’s most critical and vulnerable passwords: their privileged accounts. The Secret Server and BIG-IP integration allows organizations to store their sensitive credentials for managing BIG-IP configurations in a secure, on premises, web-based vault. Secret Server manages privileged accounts through strict granular access controls, full auditing, and automatic password rotation, drastically reducing risk around F5 BIG-IP privileged accounts.

Seattle, Washington
Technology:Device Management
www.f5.com





Logo - Cisco

Cisco

Use customizable command sets to target specific Cisco commands at any Cisco device with SSH or Telnet access.  Secret Server supports using an initial Secret to authenticate, and then elevates privilege to change the root password. This makes it possible to change UNIX / Linux root passwords, or the Cisco Enable, where the root credential cannot be used to connect to the device.  Secret Server can change or test passwords (using Heartbeat) for UNIX, Linux or Cisco devices.

San Jose, California
Technology:Device Management
https://marketplace.cisco.com/catalog/companies/thycotic-software-ltd







Remote Monitoring and Management (RMM)

Logo - LabTech

LabTech Software (Tech)

LabTech integration with Thycotic allows access to shared credentials through the LabTech console and drive efficiency with quick access to the passwords required to work on client devices to drive greater efficiency.

Tampa, Florida
Technology:Remote Monitoring and Management (RMM)
www.labtechsoftware.com/it-providers/solutions/security/thycotic







Security Information and Event Management (SIEM)

Logo - LogRhythm

LogRhythm

Thycotic has added another leader in SIEM technology to our list of out-of-the-box integrations. Now, Secret Server event logs integrate with LogRhythm’s Security Intelligence Engine to improve network visibility for users.  LogRhythm’s Security Intelligence Platform is known for combining enterprise-class SIEM, log management, file integrity monitoring and machine analytics to provide broad and deep visibility across an organization’s entire IT environment. Using Syslog format, Secret Server can ship important syslog data into LogRhythm to compare events and ensure a more successful audit for your organization. By pairing Secret Server with LogRhythm, administrators can better monitor successful and failed user logins to privileged accounts, secret expirations and unsanctioned changes to administrator privileges.  Out of the box, Secret Server comes standard with 44 different events tracking more than 20 unique data fields, as well as the ability to create custom events based on your organization’s security policy.

Boulder , Colorado
Technology:Security Information and Event Management (SIEM)
www.logrhythm.com





Logo - Solarwinds

Solarwinds

Using Secret Server with a Log and Event Manager tool such as Solarwinds allows administrators to gain a clear picture of what is going on throughout their network.  This allows easy retrieval of information from real time events, such as when users are launching sessions, accessing reports, checking out Secrets, or when Unlimited Administrator mode is turned on.

Austin, Texas
Technology:Security Information and Event Management (SIEM)
www.solarwinds.com





Logo - Splunk

Splunk

Using Secret Server with a SIEM tool such as Splunk allows administrators to gain a clear picture of what is going on throughout their network. The app can be used to filter out key events from the Secret Server sysLog using the Event Search feature. This allows easy retrieval of information from real time events, such as when users are launching sessions, accessing reports, checking out Secrets, or when Unlimited Administrator mode is turned on.

San Francisco, California
Technology:Security Information and Event Management (SIEM)
www.splunk.com





Logo - ArcSight

ArcSight (now part of HP)

Secret Server privileged account management software logs events to Security Information and Event Management (SIEM) platforms that support CEF or Syslog formats.  These events can be correlated on the SIEM side so administrators can be alerted when specific events occur on the system. When an administrator sets up a filter for events such as Unlimited Administration being turned on, user lockout, Heartbeat failure or Secret Expiration, the events are logged with different alert levels depending on their severity.  ArcSight is a comprehensive threat detection, response and compliance management platform that dramatically cuts down the time to detect and respond to threats. ArcSight lets security teams move beyond real-time correlation, to investigation and hunting for advanced persistent threats. With precise prioritization, advanced analytics and streamlined workflows, ArcSight powers intelligent SecOps.

Palo Alto, California
Technology:Security Information and Event Management (SIEM)
www8.hp.com/us/en/software-solutions/siem-security-information-event-management







Security Hardening: Two-Factor Authentication

Logo - DUO

Duo Security

Ann Arbor, Michigan
Technology:Security Hardening: Two-Factor Authentication
www.duosecurity.com/docs/thycotic





Logo - RSA

RSA (now part of EMC)

Hopkinton, Massachusetts
Technology:Security Hardening: Two-Factor Authentication
www.emc.com/security/index.htm





Logo - SecureAuth Assert your Identity

SecureAuth

Irvine, California
Technology:Security Hardening: Two-Factor Authentication
www.secureauth.com





Logo - TeleSign The Mobile Identity Company

TeleSign

Marina del Rey, California
Technology:Security Hardening: Two-Factor Authentication
www.telesign.com





Bluink

Ottawa, Ontario
Technology:Security Hardening: Two-Factor Authentication
bluink.ca







Security Hardening: Two-Factor Authentication and Hardware Security Module (HSM)

Logo - Thales

Thales e-Security

Plantation, Florida
Technology:Security Hardening: Two-Factor Authentication and Hardware Security Module (HSM)
www.thales-esecurity.com/partners/technology-partners/thycotic





Logo - SafeNet

SafeNet

Belcamp, Maryland
Technology:Security Hardening: Two-Factor Authentication and Hardware Security Module (HSM)
www.safenet.com







Session Monitoring and Recording

Logo - Wheel Systems

Wheel Systems

Warszawa, Poland
Technology:Session Monitoring and Recording
wheelsystems.com/partnerzy/integracje-technologiczne/index.html





Logo - BalaBit IT Security

BalaBit IT Security

New York, New York
Technology:Session Monitoring and Recording
https://andrea.blogs.balabit.com/2014/05/balabit-it-security-partners-with-thycotic-software-to-reduce-opportunity-for-privileged-account-abuse/