Using the Privileged Accounts Discovery Tool
Guest blog post by Bryan Krausen, author of IT Diversified. Find the full article here. Thycotic has released yet another free IT tool for Admins in an effort to help them discover where privileged...
View ArticleIT Weapons Customer Spotlight: Reducing Cyber Risk for Global Client Base
For the last 15 years, IT Weapons, a Konica-Minolta Company, has provided award-winning security consulting, private cloud solutions, and technology services for organizations worldwide. They had...
View ArticleKuppingerCole Report: Protecting the keys to your kingdom against...
In November 2015, KuppingerCole released a White Paper titled “Protecting the keys to your kingdom against cyber-attacks and insider threats” outlining the state of security surrounding organizations...
View ArticlePrivileged Passwords. The easiest way into your business?
We’ve had great success in EMEA teaming with the top partners to deliver the industry’s most comprehensive privileged account management solution. Here’s an example of what our distributor in the UK,...
View ArticleSNEAK PEEK–The Greatest Secret Server Launch Yet!
With the release of Thycotic Secret Server 9.0 comes some major new features and enhancements. Session launchers get changes with new options for SSH connections with root users, an OS X launcher...
View ArticleWhy Adobe Chose Thycotic Secret Server for their Application Build Environment
Recently, Adobe worked with us here at Thycotic to publish a use case document on how they’ve implemented Secret Server for enterprise password management within their application build environment....
View ArticleHIPAA: Closing the Gap between Being Compliant and Being Secure with Secret...
With digital medical records, patient online portals, and other electronic methods of healthcare management, maintaining a secure network is critical to meeting the Health Insurance Portability and...
View ArticleMac Launcher Deep Dive: What You Need To Know
One of the most requested features on our feature vote tracker of all time has been native support for a Mac OSX session launcher with the same capabilities and functionality as the Windows launchers....
View ArticleAvoid being the next victim of cyber crime
Every advanced persistent threat uses application vulnerabilities and privileged accounts to gain access so they can reach their target and carry out fraudulent or malicious activity. To mitigate...
View ArticleHow Security Can Make IT More Productive
Recently, IDC posed the question “Can Security Make IT More Productive”? In their Technology Spotlight, IDC examined issues around security and the undergoing transformation from negative to positive...
View ArticlePrivileged Passwords and PCI-Compliance
Guest post from Alpha Generation a Thycotic certified partner who specializes in IT distribution with a focus on proactive security in the UK. Anyone that handles payment card data is affected, so most...
View ArticleThe Triple A’s of Privileged Account Protection- A Customer Case Study
Founded in 1993, Community IT Innovators provides a variety of managed IT services to over 150 organizations in the United States. As they grew, they quickly realized that their homegrown privileged...
View ArticleThe more you know about where your privileged accounts are in your Windows...
I remember watching Saturday morning cartoons when they would air a lot of those public service announcements with the shooting star tagline “The More You Know” (yes, I’m dating myself a bit here). I...
View ArticleThycotic Launches Free Privileged Accounts Discovery for Windows
WASHINGTON, Feb. 2, 2016 /PRNewswire/ — Thycotic, provider of privileged account management solutions for more than 4,000 organizations world-wide, today announced that Privileged Accounts Discovery...
View ArticleUsing Secret Server as Proactive Security Defense at Saab
As vice president and CIO at Saab Defense and Security USA LLC, Per Hammarin manages a 10 member IT team in Washington, DC which is part of a parent organization based in Sweden. Over more than 30...
View ArticleIntegration Spotlight: Enhanced Security with Credentialed Vulnerability...
Organizations today are only barely scratching the surface when it comes to vulnerability assessments with unauthenticated scans. Unauthenticated scans still leave many unknowns that leave your...
View ArticleTop 5 Reasons for Privileged Account Management in the Cloud
The wait is almost over. We couldn’t be more thrilled to announce Secret Server Cloud and to give you the option to exercise freedom of choice in Privileged Account Management security. Immediately get...
View ArticleEverything you need to know about Secret Server’s New Add-on Modules
It’s time to boost your Secret Server productivity with our new add-on modules created to give you the customization and features your organization needs. Save time and effort while increasing your...
View ArticleHow to meet FISMA Compliance in 9 Steps
Any organization that maintains a computer network is vulnerable to outside attacks. Even if it is a single computer in someone’s home, break-in attempts are constant with hackers automatically...
View ArticleThe Mission of Secret Server Free
The Threat Not only do privileged accounts exist on every network, but they exist on nearly every aspect of it. The router has an administrative login, the database has one, and every workstation has...
View Article