With this newest release, Secret Server not only further strengthens its PAM cloud leadership, but also its overall enterprise readiness and usability.
With Secret Server 10.7, users can now:
- Discover, manage, and delegate access for Amazon AWS privileged accounts
- Use Secret Server’s command line interface (CLI) from Windows, Mac, and Linux/Unix workstations
- Meet even the strictest uptime requirements for large enterprise environments.
New AWS discovery capabilities in this release allow customers to access and manage IAM accounts and keys for their Amazon AWS privileged accounts. Thycotic continues to provide powerful and comprehensive management for privileged access in AWS. Now organizations can have expansive cloud access as part of a comprehensive, cloud-based privileged access and account management security solution.
This release also features an updated user interface that allows for better folder management and simplified check-in/check-out functions, making PAM even easier to control through Secret Server. Additionally, command line access to Secret Server for Linux/Unix admins simplifies their workflow and enables tighter security. When security solutions are easy to use, they support rapid adoption and reduce the chance of human error.
Finally, new updates in Secret Server further streamline the upgrade process and provide a seamless end user experience by meeting even the strictest uptime requirements for large enterprise environments.
See for yourself:
Background: Cloud security continues to be a challenge for IT
The cloud makes new levels of speed and scale possible, freeing IT organizations from the time and expense of on-premises infrastructure so they can spend that time and money on critical projects.
With virtual resources providing support behind the scenes, IT teams are also less burdened with installing and patching servers, maintaining uptime, and responding to problems at 3 AM. Instead, moving to the cloud demands that IT operations and security teams update their skills and practices to support this new, more efficient way of working.
In addition, organizations of all sizes and across global regions continue to embrace cloud infrastructure at an accelerating rate because cloud IT solutions promise easy access, unlimited storage, and pay-as-you-go pricing, on top of the speed and scalability of the infrastructure. Gartner’s latest annual report on the public cloud infrastructure-as-a-service (IaaS) market shows Amazon Web Services (AWS) dominating the overall public cloud infrastructure market with 47.8% share, more than triple the number two vendor, Microsoft, with 15.5%.
But the cloud’s virtues can also be its Achilles heel: easy access and storage of sensitive data creates an attractive target for cyber-criminals. A report by the Cloud Security Alliance (CSA) listed the “Treacherous 12” top threats to cloud computing, which included “Insufficient identity, credential, and access management” at number 2.
The 2019 Cloud Adoption and Risk Report by McAfee reported 21% of files in the cloud contain sensitive data, the average enterprise uses 1,935 different cloud services, and 80% of all organizations experience at least one compromised account threat per month. These reports illustrate the quickly expanding privileged account attack surface, and why controlling privileged access to cloud infrastructure has become an imperative for organizations of all sizes and industries.
Unfortunately, many organizations aren’t adequately implementing and enforcing proper security policies around cloud privileged access. According to Gartner, through 2023, 99% of cloud security failures will be the customer’s fault, driven in large part by issues attributed to the inadequate management of identities, access, and privileges.
Thycotic leading PAM’s transition to the cloud
Thycotic has been leading the PAM industry’s transition to the cloud with privileged access and password management built both in and for the cloud. All products in Thycotic’s end-to-end PAM solution are available in the cloud with full enterprise-grade functionality. Companies can manage all types of privileges – from application and service accounts to local administrative rights on endpoints – without the management burden or overhead of on-premise security tools.
*** This is a Security Bloggers Network syndicated blog from Thycotic authored by Barbara Hoffman. Read the original post at: http://feedproxy.google.com/~r/Thycotic/~3/k85-_XDGGwI/