dcsimg

Announcing Identity Bridge: Streamline authentication and authorization for Unix and Linux

I’ve been working in the identity and access management (IAM) field for more than 20 years. Unix and Linux user management has been a challenge throughout all those years. If you have a single Unix or Linux server and a manageable number of users, there’s no issue. But no one only has one server and a manageable user count. Many organizations have hundreds or thousands of servers and hundreds or … [Read more...]

Think Differently About Unix / Linux Privilege Management

Security models have struggled to match the evolution of Unix. Over its long history, Unix has evolved and changed in many different ways. What started in Bell Labs 40 years ago has spawned more than 150 variants of Unix in use today. Unlike the linear progression of Windows operating systems, in which most organizations use a single version until it is replaced, many flavors of Unix are in use at … [Read more...]

Application Control Strategies Help You Prepare for the Unknown

One of the most significant challenges today within endpoint security via application control is the sometimes tedious task of application categorization to create whitelists, blacklists, and greylists. What is application control? Application control allows you to proactively manage and monitor all the applications running on your endpoints with policy-driven controls. Application control can be … [Read more...]

ServiceNow Integration Removes Bottlenecks for Service Account Governance

Many IT operations teams are working hard to move beyond a reactive, service-desk approach. They are taking on broader responsibilities for proactive management and measuring the business impact of their efforts for employees and customers. For a comprehensive view of IT-related projects, many organizations rely on IT service management systems (ITSM) that account for all activities and results … [Read more...]

Usable Security and the Next Iteration of Privilege Manager

We focus on usable security. Here’s what that means for the next iteration of Privilege Manager It’s no secret that Thycotic is the usable security leader in the Privileged Access Management space. In the past year our UX team has been working on the entire product line to modernize and simplify the products’ experience. One of the biggest projects our team has been working on is the redesign of … [Read more...]

Cyber-criminals are targeting your Service Accounts, and Regulators are taking notice

For the past few months we’ve been highlighting the critical nature of service accounts  and the importance of governing service accounts appropriately.  Recently, a customer came to us following a Sarbanes-Oxley (Sox) audit they failed largely due to mismanaged service accounts. It’s a story we’re hearing more and more frequently. Regulators are finally catching on to what we already … [Read more...]

Thycotic Integrations provide opportunities to connect, control and secure

Privileged access management (PAM) is a critical piece of your security infrastructure. But we know it’s just one part of your infrastructure which also includes identity and access management platforms, multi-factor authentication systems, SIEM tools, IT ticketing systems, DevOps tools, and more. Just as single products that aren’t usable result in slow implementation and low adoption, solutions … [Read more...]

How to protect service accounts without losing your mind: Automated tools!

Here at Thycotic, we are always banging the drum on the importance of securing privileged access. Early in 2019, we got a glimpse of what can happen if you don’t when more than 100 million credit applications at Capital One were stolen by an individual in a security breach that involved a web service and compromised privileged account. The attacker apparently got into the network through a … [Read more...]

Newest Secret Server Release Enhances Performance, Flexibility and Control

Our customers are at the heart of everything we do.  So it’s been a busy year at Thycotic as we’ve rolled out a number of new solutions and enhancements to create an even more seamless experience for our Secret Server customers.  This drives PAM adoption to protect a large and diverse set of privileged accounts and help customers protect their ever-growing privileged account attack … [Read more...]

12 Days of Privileged Access Management Giveaways

The more things change, the more they stay the same. We pride ourselves on pushing the envelope, finding new ways to do things, and solving the next cyber puzzle. But when it comes to this time of year, we love our Thycotic traditions. The 12 Days of Thycotic is one of those annual rituals that gives us the warm fuzzies. Every December we spend 12 days thanking you—the PAM champion—for the hard … [Read more...]