sb-nz logo
Story image

Thycotic launches Secret Server update designed for cloud-first, remote world

Thycotic has released the latest version of its privileged access management (PAM) solution Secret Server with extended and added features and functionality.

New capabilities are designed to enable organisations to simplify security of modern IT environments that include multiple cloud instances, remote and third-party workers, and mobile users, the company states.

In addition, the new capabilities have been designed for the needs and requirements of businesses in the new reality of cloud and remote work.

At its heart, the company has focused on providing ‘a streamlined user experience’ that ‘makes oversight of privileged accounts and activities easier and more consistent’.

According to the company, more than 75% of organisations use multiple cloud platforms today.

In reference to this, in addition to Secret Server’s existing discovery capabilities for AWS, the latest version allows IT teams to manage Google Cloud and Azure with consistent PAM policies and practices.

Secret Server users can also now connect to Google Cloud infrastructure, detect running Windows and Linux machine instances, and discover and manage cloud identity access management (IAM) service accounts.

Furthermore, Secret Server synchronises its users and groups with users and groups in Azure AD, so IT admins can now manage groups from a single interface.

Managing a large-scale remote workforce is now an expected part of IT operations, Thycotic states. As such, the latest release provides flexible options for IT teams to meet productivity and security requirements of remote work.

To aid IT teams dealing with distributed environments with remote and third-party workers, Thycotic has released a clientless, agentless option for session recording.

In addition, the latest release extends task orchestration to include event types that automate repetitive, time-consuming tasks to relieve alert fatigue, and maintain productivity.

Finally, for DevOps integration and sync, Secret Server can now create secrets in Thycotic’s DevOps Secrets Vault solution and periodically push updates to those secrets.

Thycotic vice president of product management Jai Dargan says, “It’s challenging for IT admins and security teams to manage an increasingly diverse IT environment in a consistent way.

“Every part of this release is designed to help customers simplify management so their work is scalable, repeatable, and saves time.”

Thycotic is a global provider of cloud-ready privilege management solutions.

Thycotic's security tools are used by small businesses to large enterprises, to limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance. Thycotic puts a large emphasis on accessibility, simplicity and prioritising productivity, flexibility and control.

Story image
Cisco report: Remote working is here to stay, making cybersecurity a top priority
"With this new way of working here to stay and organisations looking to increase their investment in cybersecurity, there’s a unique opportunity to transform the way we approach security as an industry to better meet the needs of our customers and end-users.”More
Story image
COVID-related email subjects biggest threat in phishing scams
Coronavirus-related email subjects remain the biggest threat in phishing scams, a new study has found.More
Story image
Microsoft is most imitated brand for phishing attacks in Q3
Popular phishing tactics using the Microsoft brand used email campaigns to steal credentials of Microsoft accounts, luring victims to click on malicious links which redirect them to a fraudulent Microsoft login page. More
Link image
The importance of data resilience in the current cybersecurity climate
Protecting an organisation's data is one of the most crucial functions of any CISO. Strategies should be in place where data is stored securely and cost-effectively.More
Story image
IBM Security completes industry first with updates to Cloud Pak for Security solution
"With these updates, we will be the first in the industry to bring together external threat intelligence and threat management alongside data security and identity."More
Story image
Why zero trust could fail due to lack of understanding​, not technology
Security architects are being forced to re-examine the concept of identity, with many turning to a zero trust security model to provide a better architecture for protecting their sensitive resources.More