sb-nz logo
Story image

Thycotic launches Secret Server update designed for cloud-first, remote world

Thycotic has released the latest version of its privileged access management (PAM) solution Secret Server with extended and added features and functionality.

New capabilities are designed to enable organisations to simplify security of modern IT environments that include multiple cloud instances, remote and third-party workers, and mobile users, the company states.

In addition, the new capabilities have been designed for the needs and requirements of businesses in the new reality of cloud and remote work.

At its heart, the company has focused on providing ‘a streamlined user experience’ that ‘makes oversight of privileged accounts and activities easier and more consistent’.

According to the company, more than 75% of organisations use multiple cloud platforms today.

In reference to this, in addition to Secret Server’s existing discovery capabilities for AWS, the latest version allows IT teams to manage Google Cloud and Azure with consistent PAM policies and practices.

Secret Server users can also now connect to Google Cloud infrastructure, detect running Windows and Linux machine instances, and discover and manage cloud identity access management (IAM) service accounts.

Furthermore, Secret Server synchronises its users and groups with users and groups in Azure AD, so IT admins can now manage groups from a single interface.

Managing a large-scale remote workforce is now an expected part of IT operations, Thycotic states. As such, the latest release provides flexible options for IT teams to meet productivity and security requirements of remote work.

To aid IT teams dealing with distributed environments with remote and third-party workers, Thycotic has released a clientless, agentless option for session recording.

In addition, the latest release extends task orchestration to include event types that automate repetitive, time-consuming tasks to relieve alert fatigue, and maintain productivity.

Finally, for DevOps integration and sync, Secret Server can now create secrets in Thycotic’s DevOps Secrets Vault solution and periodically push updates to those secrets.

Thycotic vice president of product management Jai Dargan says, “It’s challenging for IT admins and security teams to manage an increasingly diverse IT environment in a consistent way.

“Every part of this release is designed to help customers simplify management so their work is scalable, repeatable, and saves time.”

Thycotic is a global provider of cloud-ready privilege management solutions.

Thycotic's security tools are used by small businesses to large enterprises, to limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance. Thycotic puts a large emphasis on accessibility, simplicity and prioritising productivity, flexibility and control.

Story image
Financial malware activity dropped in 2020 as creators honed their wares
Cybercriminals used the time to plan more malicious propagation techniques, both new and evolved from previous methods.More
Story image
Hybrid IAM solutions are the way of the future, study states
“As this first-of-its-kind research shows, while IT leaders are faced with unique criteria and conditions that shape their IT strategy, hybrid IAM has emerged as a necessity."More
Story image
Infrastructure-as-code, and how it can secure the cloud
Bridgecrew recognised IaC early on as one of the best ways for modern teams to delegate security ownership to individual contributors while distributing it across existing frameworks within CI/CD pipelines. This attribute meant that IaC was invaluable in securing cloud-native environments.More
Story image
Kroll completes Redscan acquisition, expands cyber risk portfolio
With the addition of Redscan and its extended detection and response (XDR) enabled security operations centre (SOC) platform, Kroll expands its Kroll Responder capabilities to support a wider array of cloud and on-premise telemetry sources.More
Story image
ThreatQuotient hits $22.5m in new financing, continues growth streak
“Since we first invested in ThreatQuotient in 2017, their team has continued to prove to the market that there is a critical need for cybersecurity solutions aimed at security operations."More
Story image
Addressing the challenges of least privilege access
Enforcing the right privilege policies across the environment with the right visibility and observability will ensure that the policy mandates hold tight against any behaviour changes.More