Moving from on-premise to Privileged Access Management (PAM) in the cloud could be your next move

Moving from on-premise to Privileged Access Management (PAM) in the cloud could be your next move

Are you considering moving from an on-premise PAM solution to one that delivers the security you expect for privileged credentials while still gaining the advantages of a cloud-based solution? If so, you’ll want to take a few tips from Tim Enders, Senior System Engineer at Loyola University Maryland’s Department of Technology ... Read More
Protect Your Privileged Credentials with WebAuthn

Protect Your Privileged Credentials with WebAuthn

85% of organizations fail to achieve basic PAM capabilities according to Thycotic’s 2019 State of Privileged Access Management (PAM) Maturity Report. This is due in large part to poor security hygiene. It’s essential that organizations deploy proper security precautions to ensure privileged user accounts are not vulnerable or even already ... Read More
SCIM: Users / Groups apply access to Containers

Thycotic SCIM Connector for Integrations with Secret Server

Today, many organizations have both privileged account management (PAM) and identity governance solutions that operate independently. As a result, organizations lack the ability to have a unified view of identities. As we discussed in “Top PAM Technology Integrations,” while PAM secures access to key system and admin accounts, integration with ... Read More
Behind the Scenes: Endpoint Protection in the Cloud

Behind the Scenes: Endpoint Protection in the Cloud

The cloud has certainly been a game changer, driving innovation and growth. Companies that adopted cloud services experienced a 20.7% average improvement in time to market, 18.8% average increase in process efficiency and a 15% reduction in IT spending. Together, these benefits led to a 19.6% increase in company growth ... Read More
Measurable Results of Service Account Privilege Management

Measurable Results of Service Account Privilege Management

It’s very easy for service accounts to fall off your radar. Virtually all organizations have some unknown service accounts and some have thousands. Why do service accounts get lost? An employee leaves and the account is simply abandoned. The account is used less and less until it becomes obsolete and ... Read More
Complete Guide to leveraging Session Recording to Improve Accountability and Meet PCI Compliance

Complete Guide to leveraging Session Recording to Improve Accountability and Meet PCI Compliance

You’ve set up policies. You’ve trained your team. You’ve vetted third parties. But, even the most proactive privilege security strategy can’t account for every situation and every type of risky behavior. Today many Thycotic customers rely on session recording and monitoring capabilities for added peace of mind. If any privileged ... Read More
Usable Security in Secret Server 10.6 Addresses Top Pain Points of IT Ops

Usable Security in Secret Server 10.6 Addresses Top Pain Points of IT Ops

IT Ops teams have spoken, loud and clear. Their top goals for Privileged Access Management are increasing automation and ease of deployment. Over one third of respondents in Thycotic’s recent IT Ops Survey say PAM software that’s “too complex for daily use” hinders its effectiveness. We couldn’t agree more. Secret ... Read More