dcsimg

Every system is a privileged system: Incorporating Unix/Linux in your privilege management strategy

Lately we’ve been banging the drum that “every user is a privileged user,” meaning privileged users aren’t limited to system administrators but also include business users with access to applications and endpoints linked to critical business data and functions. The second verse to that refrain is that “every system is a privileged system.” Within your IT environment, laptops, servers, databases, … [Read more...]

How to Expedite Discovery of Service Accounts for Onboarding into Service Account Governance

Service accounts, by their nature, can take on a life of their own. They’re rarely tied to a human owner if managed at all, so service account sprawl takes over and organizations’ privileged account attack surfaces can expand almost beyond measure. And with almost all medium to large organizations unable to pull service accounts into a standardized governance cycle, there’s a ton of risk, too. The … [Read more...]

Ensuring Database Security in the DevOps Pipeline with Dynamic Secrets

The traditional “vault-and-forward” method for secrets management means a user or application authenticates to the vault and then gets access to the secrets they need. The fundamental problem is once those secrets are out of the vault, it is extremely difficult to ensure their safety. In the case of an application, the ways Secrets can be leaked is almost infinite. There is the code your team … [Read more...]

Integrating Service Account Management Within Existing IT Workflows

IT service management providers have made strides replacing collections of legacy tools with a single unified IT service management platform. However, there are still many aspects of IT administration that must be done manually outside of such unified platforms. Service account management is one task that is commonly cumbersome to IT administrators and those in need of service accounts … [Read more...]

Thycotic shifts the language used in products and materials to promote inclusivity

This moment in 2020 is a flashpoint in time. We hear calls for a number of changes to address the current political and cultural climate.  As a security software company, our engineers have seen a lot of discussion around the use of terminology in technology that may be perceived as racist. Is it appropriate to use the terms master and slave? Is it appropriate to say blacklisting and whitelisting? … [Read more...]

Announcing Identity Bridge: Streamline authentication and authorization for Unix and Linux

I’ve been working in the identity and access management (IAM) field for more than 20 years. Unix and Linux user management has been a challenge throughout all those years. If you have a single Unix or Linux server and a manageable number of users, there’s no issue. But no one only has one server and a manageable user count. Many organizations have hundreds or thousands of servers and hundreds or … [Read more...]

Think Differently About Unix / Linux Privilege Management

Security models have struggled to match the evolution of Unix. Over its long history, Unix has evolved and changed in many different ways. What started in Bell Labs 40 years ago has spawned more than 150 variants of Unix in use today. Unlike the linear progression of Windows operating systems, in which most organizations use a single version until it is replaced, many flavors of Unix are in use at … [Read more...]

Application Control Strategies Help You Prepare for the Unknown

One of the most significant challenges today within endpoint security via application control is the sometimes tedious task of application categorization to create whitelists, blacklists, and greylists. What is application control? Application control allows you to proactively manage and monitor all the applications running on your endpoints with policy-driven controls. Application control can be … [Read more...]

ServiceNow Integration Removes Bottlenecks for Service Account Governance

Many IT operations teams are working hard to move beyond a reactive, service-desk approach. They are taking on broader responsibilities for proactive management and measuring the business impact of their efforts for employees and customers. For a comprehensive view of IT-related projects, many organizations rely on IT service management systems (ITSM) that account for all activities and results … [Read more...]

Usable Security and the Next Iteration of Privilege Manager

We focus on usable security. Here’s what that means for the next iteration of Privilege Manager It’s no secret that Thycotic is the usable security leader in the Privileged Access Management space. In the past year our UX team has been working on the entire product line to modernize and simplify the products’ experience. One of the biggest projects our team has been working on is the redesign of … [Read more...]