+1-202-802-9399 (US)

Efficient enforcement for Least Privilege Management

KuppingerCole Executive View – January 2018

Thycotic Privilege Manager blocks Social Engineering Attacks, Malware and Ransomware on Endpoints

Local admin accounts are privileged accounts. If a local admin clicks on a malicious link and downloads malware, their workstation could become “patient zero” in a catastrophic attack. When hackers gain privileges on one machine they can progress through your network and even cover their tracks by changing event logs.

Privilege Manager automatically removes admin rights from domain and non-domain managed endpoints, including hidden or hard-coded credentials—so that virtually all critical vulnerabilities are mitigated.  And because it uses policy-based controls to elevate applications without requiring admin credentials or requesting IT support—it enforces least privilege while maintaining user productivity and minimizing help desk calls.

Read the New Report

See why KuppingerCole recognizes Thycotic Privilege Manager as a mature, simple and straightforward solution that restricts privilege elevation for applications and underlying processes without impacting user productivity.

  • Delivers efficient, policy-based management of application entitlements and local privilege access on endpoints
  • Supports a wide range of capabilities for controlling and restricting access
  • Makes managing policies easy with simplified UI and mobile app
  • Integrates out-of-the-box with Secret Server, ServiceNow and other tools via API’s

Access The Report Now

Thycotic Privilege Manager is a mandatory addition to traditional Privilege Management solutions, which lack the support for the specific requirements of Endpoint Privilege Management.

– Martin Kuppinger

The Insider’s Guide to Successfully Implementing Least Privilege

Thursday, February 1 | 11:00 AM ET

Join Thycotic Product Manager Steve Goldberg as he explains how you can implement least privilege to protect confidential data, block malware, and meet compliance requirements, without slowing down users or requiring additional desktop support.

“Top 10 Keys to Successful Least Privilege Adoption Via Application Control”

This eBook explains how you can eliminate the risk of most malware attacks by implementing the security strategy of least privilege. Discover the keys to successful least privilege adoption using application control, and avoid the common pitfalls that cause least privilege strategies to fail.