» KuppingerCole Executive View

Thycotic Access Controller products address risks posed by virtual workforces
Leading analyst KuppingerCole outlines the benefits of Thycotic’s Access Controller products
Thycotic’s Access Controller products bring much needed controls designed to address the attendant security risks posed by virtual workforces
- The products acknowledge the need to shift to role or task based privileged access and duly make good use of RBAC for web applications.
- Enforcing more granular least privilege on any application a user is touching will be a growing security and compliance mandate.
- An easy to use and configure UI is ideal for fast changing environments.
- For administrators and compliance officers, the one button report generation of activity will be a welcome boost.
Access The Report Now
ENDPOINT PRIVILEGE ELEVATION
& APPLICATION CONTROL

Secret Server
Discover privileged accounts, vault credentials, govern service accounts, delegate access, monitor and record sessions.
Easiest to use and fastest to deploy enterprise-grade privileged access management & governance for organizations of all sizes, with on premise or cloud deployment.
ENDPOINT PRIVILEGE ELEVATION
& APPLICATION CONTROL

Privilege Manager
All-in-one solution for least privilege management, threat intelligence, and application Allowing, restricting, and denying.
Seamless adoption for security teams, help desk support, and business users, because productivity is never impacted.
Access Control for Remote Workers, Cloud Apps, Databases

Cloud Access Controller
Authentication, authorization, auditing for anytime, anywhere access to IaaS, SaaS Apps, Databases.
Easily grant and revoke access for remote workers and third parties without clients, agents, or VPNs, granular role-based access control, MFA, and session recording for IaaS platforms and SaaS Applications.