Thycotic Ends 2018 with Record-Setting Quarter

Company Finished Year with Addition of 858 New Customers and 45 Percent Year-Over-Year Sales Growth

WASHINGTON, D.C., January 10, 2019 — Thycotic, provider of privileged access management (PAM) solutions for more than 10,000 organizations worldwide, today announced that it has ended a stellar 2018, outperforming 2017 with a 45 percent year-over-year sales growth. In addition to its sales growth, Thycotic also added 285 new customers in Q4 alone and 858 for 2018 overall. In addition to its on-premise enterprise-class PAM solution, Thycotic’s focus in providing a cloud PAM option to its customers has contributed to its success which allows users to reduce regulatory compliance burdens and meet requirements to keep data in their home region.

“This year has far-and-away exceeded what we set out to accomplish in 2018,” said James Legg, CEO at Thycotic. “Organizations are selecting Thycotic because they want a comprehensive, scalable and simpler PAM solution available on-premise or from the cloud. We’re especially pleased that Thycotic customers are successful as reflected by how highly they rate us in customer satisfaction surveys.”

Highlights of Thycotic’s overall 2018 performance includes:

  • 45 percent year-over-year sales growth in 2018
  • 285 new customers added in Q4 alone – bringing the total number of new customers added in 2018 to 858
  • 342 percent growth in cloud sales – now more than 900 PAM cloud customers
  • Opened data centers to support PAM cloud growth in Germany and Australia
  • 95 percent maintenance renewal rate and a 4.6 out of 5 satisfaction ranking from customers
  • 40 percent year-over-year increase in partner deal registrations resulting in 118 percent growth in sales from partners
  • Downloads of more than 8,500 of Thycotic’s free tools, including:
  • Received 15 industry recognitions, which include:
  • Achieved Common Criteria Certification, proving ability to protect the government from security breaches
  • Development of five industry reports and books, including:



*** This is a Security Bloggers Network syndicated blog from Thycotic authored by Jordan True. Read the original post at: http://feedproxy.google.com/~r/Thycotic/~3/7k3jNKPuP2I/