dcsimg

Privilege Manager 10.8: Simplifying endpoint privilege management through usable security

A powerful new interface and additional enhancements make Privilege Manager 10.8 an important release to ensure usable security.  Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Over the past year, our product teams and UX and human-computer interaction team … [Read more...]

Endpoint Security Demands a Defense-in-depth Strategy

Endpoints, the devices people use to access company resources, are a weak spot in corporate security. Compromised endpoints are a primary access point that cyber criminals use to infiltrate a network. Two-thirds of companies are compromised by exploits that originate with an endpoint. The volume of endpoint attacks is rising, as is the sophistication of attacks. There’s a marked spike in criminals … [Read more...]

Application Control Strategies Help You Prepare for the Unknown

One of the most significant challenges today within endpoint security via application control is the sometimes tedious task of application categorization to create whitelists, blacklists, and greylists. What is application control? Application control allows you to proactively manage and monitor all the applications running on your endpoints with policy-driven controls. Application control can be … [Read more...]

New Privilege Manager Release Extends Endpoint Protection for Macs

Apple products continue to grow in popularity. With strong iPhone X and 11 sales, Apple is boosting their smartphone market share. And it’s not just consumer products where we’re seeing growth. Enterprises are using Macs more and more and Thycotic is seeing significant growth in these devices and operating systems. Endpoints present a significant security risk: 85% of cyber attacks enter through … [Read more...]

Get Complete Application Control Management with CylancePROTECT and Privilege Manager

Thycotic customers are constantly requesting integrations with other products in their arsenal, especially other security products. Thycotic’s product team for Privilege Manager—our least privilege and application control product—is asked to work with CylancePROTECT® day after day. Our common customers are using both Thycotic and Cylance products on the endpoint to provide multiple layers of … [Read more...]

Seven reports you can share with auditors and execs to demonstrate proactive privilege management

All major compliance bodies recommend or require a least privilege policy to protect sensitive data. Removing local administrative access on user workstations is a fundamental strategy for endpoint security to protect against both internal and external threats. Auditors will see that you have implemented a proactive security strategy to prevent malicious activity and accidental data breaches By … [Read more...]

Microsoft’s Frankenstein Approach to Endpoint Protection

With Windows 10 Microsoft has embedded and enhanced a number of free tools it claims give IT and security teams the opportunity to close security gaps exposed in previous versions of Windows. One of the critical goals Microsoft aims to address is the principle of least privilege. Under a least privilege policy, administrative credentials are removed from workstations in order to block threat … [Read more...]

How to Protect Your Desktop Team When Moving to Least Privilege 

When companies yank local administrative privileges from business users without considering the downstream impact, their least privilege programs are doomed to fail. Suddenly unable to download applications, run programs, install printers or make other system changes, users will be confused and frustrated. Those frustrations are going to land squarely on the plate of the desktop support … [Read more...]

Top 10 Keys to Successful Least Privilege Adoption Via Application Control

Gone are the days when a security team could select a new tool, turn it on, and expect everyone in the organization to adjust. When security hinders the business, the business fights back. Users now have numerous ways they can work around security tools and policies to get their job done. Least privilege is a fundamental aspect of endpoint security, but it can’t be enforced without thoughtful … [Read more...]

Why is least privilege the place to start for endpoint security?

Because it will save you time and money.   Your end user’s computers are increasingly exploited as an attack vector used to attain accounts with local administrator rights on Windows or root access on Mac OS. There are a lot of solutions that promise malware detection and prevention. And you can buy more and more software to try to prevent these things from happening on the front lines. But … [Read more...]