Interview: PAM Product Q&A with Richard Wang

Interview: PAM Product Q&A with Richard Wang

| | PAM Basics, Product Spotlight
It takes a village to develop ThycoticCentrify’s industry-leading Privileged Access Management solutions. I spoke with Richard Wang, Senior Director of Product Management at ThycoticCentrify to discuss what it’s like to lead the product team, how we develop our product roadmap, and advice for those starting and continuing along their PAM ... Read More
What Small Businesses Need to Know About Cyber Security and Password Management

What Small Businesses Need to Know About Cyber Security and Password Management

Small to medium businesses (SMBs) made tough choices this past year to keep their business running. Staff scattered to work from home—unexpectedly—and SMBs had to quickly enable them with tools and support to stay connected. Many small companies were forced to sacrifice cyber security best practices in favor of business ... Read More
Approval Workflows and Notifications for Busy People

Approval Workflows and Notifications for Busy People

Maybe it’s happened to you. You deleted a service account because it didn’t seem like any processes were tied to it. And then something broke. Privilege management mistakes happen—but they don’t have to. Setting up an end-to-end workflow for privileged account governance decreases the risk of mistakenly pulling the plug ... Read More
Certificate-Based Authentication and TTL for All Cloud Platforms

Certificate-Based Authentication and TTL for All Cloud Platforms

DevOps is a world of machines. To access systems and data, secrets are exchanged between all types of machines, including databases and applications for software and infrastructure deployment, testing, orchestration, configuration, and Robotic Process Automation (RPA).    The speed and scale of DevOps requires secrets to be created instantly, tracked incessantly, ... Read More
Case Study: High Security Architecture for Healthcare Networks

Case Study: High Security Architecture for Healthcare Networks

Cyber attacks against the healthcare industry continue to rise. The recent cautionary tale of the University of Vermont Health Network’s ransomware scare is but one example of how attackers are ramping up to steal data and disrupt services. Hospitals are working to fortify their defenses to keep one step ahead ... Read More
PAM Maturity Model

Privilege Elevation for Workstations and Servers

“Start with the end in mind.” That’s how people tell you to face a challenge. While that’s true, the end can sometimes look so far away you feel overwhelmed before you even begin. When that happens, the best thing to do is set small, attainable goals along the way. You ... Read More
Account Lifecycle Manager Automates and Simplifies Cloud-Based Service Account Governance

Account Lifecycle Manager Automates and Simplifies Cloud-Based Service Account Governance

It’s easy for a service account to get “lost.” It happens when an original account owner leaves and neglects to pass on vital information about its purpose. Or when the system tied to the service account is no longer needed. Or, when a service account is set up for temporary ... Read More
Dan Ritch

Interview: PAM Q&A with Dan Ritch

It takes a village to develop Thycotic’s industry-leading Privileged Access Management solutions. I spoke with Dan Ritch, Senior Product Manager at ThycoticCentrify to discuss what it’s like to be a Product Manager at ThycoticCentrify and get his take on PAM for the cloud and how to drive adoption. What is ... Read More
Privileged Access Management Analytics: Make Your Data Work for You

Privileged Access Management Analytics: Make Your Data Work for You

When time is a resource you don’t have — you must make your data work for you. IT teams face an ever-evolving and expanding environment compounded by a shifting remote workforce, increase in BYOD policies, expansion of the attack surface, and pivot towards the cloud. Users and endpoints have left ... Read More