Thycotic Telephone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Demo Video: See what it’s like to use Secret Server, our privileged account management solution and password vault

September 13th, 2019

This short demo video touches on several highlights of using Secret Server to secure and manage all types of privileged accounts. Features introduced here include the password vault, audit trail, discovery and reports.


Video: See why Thycotic’s security engineering team has a passion for cyber security

September 13th, 2019

Take 3 minutes to see what it’s like to work as a security engineer at Thycotic. If you are passionate about cyber security and love a challenge, we’d love to meet you.


Video: What’s it like to work at the fastest growing global provider of PAM solutions? We’ll let our team tell you

September 13th, 2019

The only way to find out what’s it’s like to work at Thycotic is to hear it from the horse’s mouth. In this short video we get feedback from the people who know us best—our talented employees.


Video: Enterprise cyber security – why a business-first approach must replace traditional methods of cyber security

September 12th, 2019

Our Chief Security Scientist Joseph Carson and Aidan Simister, CEO of Lepide, discuss cyber security challenges facing the enterprise today, and why the enterprise cannot approach cyber security from a technology-only point of view.


Video: Limit user privileges and minimize privileged credential risk with these privileged access management tools

September 12th, 2019

Jacob Stucky, our VP of Software Development provides a quick overview of several privilege access management tools that enable IT Security and IT Ops to secure passwords and other privileged credentials, and enforce least privilege on endpoints.


Video: Understand the benefits of least privilege to the enterprise, and how much privileged access is too much

September 12th, 2019

Our Chief Security Scientist, Joseph Carson, explains exactly what least privilege is and its importance in an organization’s cyber security strategy. Learn about the Principle of Least Privilege, the benefits of least privilege, and how much privileged access is too much.


Video: Access & Identity Management – managing BankUnited’s privileged service accounts

September 12th, 2019

Anne Gorman, Access and Identity Management VP at BankUnited described the company’s privileged service accounts as a ‘hot mess’. She was looking for a solution that was easily installed, easily run, and very user friendly when she found Secret Server.


Video: State of Indiana opts for secure privilege management and accelerates their development process

September 12th, 2019

After having to get up in the middle of the night to share screens with a developer, Brent Collier, System Administrator of the State of Indiana, explains why they dumped ‘shadow sessions’ in favor of Privilege Manager for managing privileged access for developers.


Video: Annie E. Casey Foundation Transitioned to Cloud PAM to Lower its Costs, Maintenance Requirements, and Carbon Footprint

September 12th, 2019

After struggling to securely manage 900 passwords, the Annie E. Casey Foundation adopted privileged access management in the cloud. In this video, Chigozie Okorie, Senior Network Administrator, describes how the organization’s move to PAM in the cloud was not only cost effective but also enabled them to reduce their servers and improve their carbon footprint.