dcsimg

What to expect when working with Thycotic Professional Services

Thycotic customers come in all shapes, sizes, and levels of experience. Some are new to PAM. Perhaps they recently inherited the program. Or maybe they’re building a PAM strategy from scratch. Our pro services team supports them at every stage of their journey. Some want more hands-on control. They prefer writing their own scripts, building custom reports, and setting up their own architecture. … [Read more...]

A look behind the scenes of a Wi-Fi Hack: What are the secrets?

You snag a seat at your local café and open your laptop. Maybe you’re on the patio, grateful for the heater. The scent of coffee powers up your brain. The low hum of people chatting is welcome, after months of isolation. The logon page appears as you search for the Wi-Fi in your settings. Despite the security risks of free Wi-Fi, 81% of people readily connect What you don’t know is the backpack … [Read more...]

9 Cloud Security Best Practices Your Organization Should Follow

Transitioning to the cloud is one of the most significant technology shifts your company will face. Last year, over 80% of organizations operating in the cloud experienced at least one compromised account each month, stemming from external actors, malicious insiders, or unintentional mistakes. The specifics of cloud security activities may vary depending on your cloud platforms and use cases, … [Read more...]

Election Protection: How Cyber Criminals Could Steal Your Vote

How much should we worry about the security of the upcoming US presidential election? Could a hacker or nation-state actor influence the result? Well, there’s good news and there’s bad news for election cyber security. The good news is that The Cybersecurity and Infrastructure Security Agency and the FBI, in a joint statement, said they “have not seen cyber-attacks this year on voter … [Read more...]

Thycotic named a Leader in the 2020 Gartner Magic Quadrant for Privileged Access Management

Thycotic is proud to announce that we have been named a Leader in the Gartner 2020 Magic Quadrant for Privileged Access Management (PAM).  Based on our ability to execute and completeness of vision, Thycotic has been positioned as a Leader in the new Gartner 2020 Magic Quadrant for PAM. This marks a major milestone in our growth as a company and in the recognition … [Read more...]

Secret Server Product Update: Enhancements for the New Reality of Cloud and Remote Work

The modern IT environment is diverse and constantly changing. In the always-on, Internet-connected global marketplace, traditional perimeters are disappearing as most organizations rely more and more on cloud-based applications to conduct business. Now, you can simplify management of an IT environment that includes multiple cloud instances, remote workers, and 3rd-party contractors It’s … [Read more...]

Insurance Leader Rolls Out Enterprise PAM Strategy

One of my favorite parts of this job is speaking with our customers to understand why they chose our solutions, and how they are using them to solve their challenges.  Recently, I spoke with one of our customers who described Secret Server as his “favorite security tool!”  So, I thought I would share his story.  Insurance Leader Rolls Out Enterprise PAM Strategy When a national insurance … [Read more...]

Addressing emerging PAM use cases to protect access to SaaS applications, cloud infrastructure, and databases

With most of the global, white-collar workforce suddenly shifting to working remotely, cloud technology has emerged as a critical component to keep businesses up and running. These services are enabling people to collaborate with one another, and provide the tools they need to stay productive, enhance accessibility and create a mobile friendly environment while working remotely. While there has … [Read more...]

10 Features Every Privileged Access Management Solution Must Have

The MoSCoW method is a prioritization technique used in project management and software to prioritize requirements. It stands for: Must have, Should have, Could have, and Won’t have. Using this approach can help you build a common understanding among your stakeholders as you evaluate and select a privileged access management (PAM) solution. In this blog, we’ll focus on the 10 must-have … [Read more...]

How Do Passwords Work?

If you want to make a purchase, post a comment in a forum, or even read content on many websites, you’re prompted to create (and remember!) a password. What’s going on when you create a password? And how does this process help keep your information safe? When you create a password on a website, that password isn’t stored verbatim on the website’s server. That’s because your password would be … [Read more...]