Ostriches, Zero Day Exploits, and the Elusive CyberSec Expert: Why SMBs Should Implement Cloud-Based PAM

Ostriches, Zero Day Exploits, and the Elusive CyberSec Expert: Why SMBs Should Implement Cloud-Based PAM

Small and medium-sized businesses (SMBs) face a cyber security trifecta. Cyber criminals are increasingly targeting the most vulnerable businesses (not just the biggest fish). Sophisticated attackers quickly take advantage of newly revealed vulnerabilities. And, cyber security professionals are in short supply. Maybe SMBs aren’t aware that they can use the ... Read More
Gartner says PAM a top cybersecurity priority. Thycotic makes robust PAM in the Cloud a reality.

Gartner says PAM a top cybersecurity priority. Thycotic makes robust PAM in the Cloud a reality.

With the recent introduction of Thycotic’s upgraded Secret Server Cloud offering, organizations worldwide now have a full-featured PAM as a service product they can choose to protect their “keys to the kingdom.” That’s because Secret Server Cloud now delivers all the features and capabilities of our Secret Server on-premise flagship ... Read More
Complex Cyber Security Tools Aren’t Just Painful, They are Downright Dangerous

Complex Cyber Security Tools Aren’t Just Painful, They are Downright Dangerous

Securing your company is a big job. People are counting on you to stay one step ahead of cyber criminals and keep them safe. But, when the cyber security tools you rely on are too cumbersome to use, you can’t get your job done. We believe cyber solution providers have ... Read More
Introducing Privileged Access Management that fits your Bandwidth, Budget and Small Business

Introducing Privileged Access Management that fits your Bandwidth, Budget and Small Business

Thycotic has just introduced Secret Server Vault—a privileged access management (PAM) solution specifically designed for small to medium size businesses and department-level teams. There are a several big reasons why Secret Server Vault makes sense for SMBs like yours. First and foremost, no matter the size of your business you ... Read More
What DevOps Teams Need to Know about Privileged Account Security

What DevOps Teams Need to Know about Privileged Account Security

| | DEVOPS, Product News
In a DevOps workflow, your testing and production environments are constantly changing. DevOps teams need access to a variety of infrastructures, across cloud, multi-cloud, hybrid cloud and on-prem environments. Administrative privileges are used by the configuration management and orchestration systems that continually spin up new servers, install software and make ... Read More
Privileged Behavior Analytics Deep-Dive: Responsive Actions

Privileged Behavior Analytics Deep-Dive: Responsive Actions

Privileged Behavior Analytics Recap Thycotic’s Privileged Behavior Analytics (PBA) software monitors user activity within Secret Server to detect anomalous behavior. Once the user’s baseline activity is determined, deviations from that behavior can trigger alerts or warnings to notify security admins. The software’s machine learning considers the time of day, IP ... Read More
Which of your endpoints is most likely to let an attacker inside?

Which of your endpoints is most likely to let an attacker inside?

Is your organization trying to reduce the risk of malware or ransomware in 2018? Knowing where to start can be the hardest part. The following risk factors can increase the odds of a cyber attack, and being aware of them can help you focus on and secure your most vulnerable ... Read More
Privileged Behavior Analytics Dashboard

Secret Server and Privilege Manager 10.4: Six improvements mean more security in less time

Thycotic is proud to announce the release of version 10.4 for Secret Server and Privilege Manager. Secret Server 1. Software Development Kit (SDK) One of the greatest problems in IT security today is the widespread use of embedded credentials—usually as part of a connection string, scripts and applications can contain ... Read More