dcsimg

Integrating Service Account Management Within Existing IT Workflows

IT service management providers have made strides replacing collections of legacy tools with a single unified IT service management platform. However, there are still many aspects of IT administration that must be done manually outside of such unified platforms. Service account management is one task that is commonly cumbersome to IT administrators and those in need of service accounts … [Read more...]

DevOps Secrets Vault Release Offers Out-of-the-Box Secret Server Integration and New Home Vault Feature

For DevOps teams, on-demand access to source code, tools, test servers, and production builds are necessary to administer systems and debug production issues. The focus for DevOps security should be automation It’s common to share private keys and credentials for immediate access, which increases the risk from both external and insider threats, either malicious or accidental. The focus for DevOps … [Read more...]

Privilege Manager 10.8: Simplifying endpoint privilege management through usable security

A powerful new interface and additional enhancements make Privilege Manager 10.8 an important release to ensure usable security.  Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Over the past year, our product teams and UX and human-computer interaction team … [Read more...]

Announcing Identity Bridge: Streamline authentication and authorization for Unix and Linux

I’ve been working in the identity and access management (IAM) field for more than 20 years. Unix and Linux user management has been a challenge throughout all those years. If you have a single Unix or Linux server and a manageable number of users, there’s no issue. But no one only has one server and a manageable user count. Many organizations have hundreds or thousands of servers and hundreds or … [Read more...]

Secret Server Product Update: Enhancements for the New Reality of Cloud and Remote Work

The modern IT environment is diverse and constantly changing. In the always-on, Internet-connected global marketplace, traditional perimeters are disappearing as most organizations rely more and more on cloud-based applications to conduct business. Now, you can simplify management of an IT environment that includes multiple cloud instances, remote workers, and 3rd-party contractors It’s … [Read more...]

Addressing emerging PAM use cases to protect access to SaaS applications, cloud infrastructure, and databases

With most of the global, white-collar workforce suddenly shifting to working remotely, cloud technology has emerged as a critical component to keep businesses up and running. These services are enabling people to collaborate with one another, and provide the tools they need to stay productive, enhance accessibility and create a mobile friendly environment while working remotely. While there has … [Read more...]

DevOps Secrets Vault and Dynamic Secrets in the Cloud

Back in July of 2019, Thycotic released DevOps Secrets Vault, a high-velocity vault for high-speed password and secret creation, archiving, and retrieval. Each month we roll out improvements to this cloud-based tool. In 2020, we’ve been focused on adding dynamic secrets for key cloud platforms. For infrastructure-as-a-service platforms dynamic secrets in DevOps Secrets Vault offer another layer … [Read more...]

The Landscape of PAM is Changing – Customers Want Mobile PAM

At Thycotic, we’re watching the landscape of our customers’ privileged access management needs evolve. PAM can no longer be simply a web application hosted on premise; our customers are telling us they need flexible deployment and access options. More day-to-day business operations need access to data, applications, and platforms Organizations are also acknowledging that PAM protection and … [Read more...]

ServiceNow Integration Removes Bottlenecks for Service Account Governance

Many IT operations teams are working hard to move beyond a reactive, service-desk approach. They are taking on broader responsibilities for proactive management and measuring the business impact of their efforts for employees and customers. For a comprehensive view of IT-related projects, many organizations rely on IT service management systems (ITSM) that account for all activities and results … [Read more...]

Secret Server Product Update: Increase Productivity with Secret Server 10.8

Doing more isn’t always doing better. No one knows this more than IT operations and security teams. Some days you’re slogging through tedious, repetitive work and jumping through hoops, all while fighting the ‘noise’ of alerts.  What’s more, fatigue, lag time between notification, human error and lack of oversight create potential vulnerabilities. New enhancements provide organizations with … [Read more...]