Delinea News > Thycotic Leads the Way for Cloud-based Privileged Access Management
Washington, D.C., February 12, 2020 — Thycotic, a provider of Privileged Access Management (PAM) solutions to more than 10,000 organizations, including 25 of the Fortune 100, today announced its 2019 accomplishments in cloud-based PAM. Successes this past year included award wins for its Secret Server cloud solution, customer adoption, new cloud-focused product releases, and more.
With more than 90 percent of the world’s data stored in the cloud, the adoption of a cloud-based PAM solution has been more important than ever. Thycotic’s Secret Server Cloud solution allows customers to benefit from infrastructure and platforms built to meet the requirements of the most security-sensitive organizations.
Thycotic was able to add an abundance of new customers to its cloud-PAM solution roster in 2019, a few of which included DXC Technology and Delta Dental of Colorado.
“Security is our top priority. We chose Secret Server Cloud because it perfectly meets our needs for enterprise Privileged Access Management. Plus, the ease of use for both admins and users is exceptional,” said Peter Loach, IT Manager – DXC Eclipse at DXC Technology.
“We chose Secret Server Cloud for our PAM requirements because it is easy to use and is a fully functional solution that meets all of our needs. The product is fantastic. It just works,” said Andy Blanton, System Administrator at Delta Dental of Colorado. “It’s not only simple but also complex in what it can do for us as an IT department.”
Thycotic’s additional 2019 cloud-based accomplishments include:
- Achieved a 405 percent YOY increase in cloud bookings in 2019
- Added upwards of 350 new PAM cloud customers in 2019, now accounting for more than 650 cloud customers overall
- Added a new cloud data center in Singapore, giving the company four PAM cloud data centers across multiple geographies across the United States, Germany, and Australia with plans to add more in 2020
- Launched two new PAM cloud products, Account Lifecycle Manager and DevOps Secrets Vault
- Launch of Privilege Manager Cloud 10.6, making all products within the company’s end-to-end PAM solution now available in the cloud with full enterprise-grade functionality
- Successful transition of Loyola University Maryland from Secret Server on-premise PAM solution to Secret Server Cloud
- Thycotic rated ahead of BeyondTrust and CyberArk for its cloud-based PAM solutions in Cyber Management Alliance’s (CM-Alliance) report entitled, “Securing Your Organization with Cloud-Based Privileged Access Management (PAM)”
- CEO James Legg named one of the Top 50 SaaS CEOs by The Software Report
- Secret Server Cloud was named a winner of the TMC 2019 Cloud Computing Product of the Year award, presented by Cloud Computing Magazine
- Publishing of two cloud-based reports and surveys:
- 2019 Global Research Report: “Security-as-a-Service on the Rise”
- 2019 RSA Conference Survey
“Migration of workloads to public cloud infrastructures, like AWS and Azure, has greatly increased the enterprise attack surface. We have been committed to delivering best-in-class PAM capabilities as SaaS, to ensure ROI through instant deployment, while extending our PAM controls to IaaS,” said Jai Dargan, vice president of Product Management at Thycotic. “2019 was a banner year for our cloud roadmap – and we will be delivering several new advanced solutions in the coming months.”
For more information on Thycotic and its cloud-based PAM solutions, visit the website.
Heading to RSA® Conference, February 24 – 28, 2020, in San Francisco? Visit Thycotic booth #655 in the South Hall and you could #DriveAwayFromRSA in the CEO’s Jeep! Not attending? Join the conversation virtually with Thycotic CISO, Terence Jackson, on Tuesday, February 25, 2020, at 10:30 a.m. (PT), as he participates in the live video panel, “The Changing Face of Compromise,” presented by BrightTALK.
FAQs
Thycotic enables you to discover, control, protect, and monitor privileged account access, and behavior, while minimizing privileged credential risk, limiting user privileges, and controlling applications on endpoints and servers.
How does thycotic work? ›
With Thycotic One, one user account can be granted access to multiple Delinea products, such as Secret Server, Privilege Manager, DevOps Secrets Vault, and Account Lifecycle Manager. Thycotic One enables login integration using the OpenID Connect protocol, an industry standard single-sign-on method.
What is the key advantage to privileged access management systems? ›
Privileged access management helps organizations make sure that that people have only the necessary levels of access to do their jobs. PAM also enables security teams to identify malicious activities linked to privilege abuse and take swift action to remediate risk.
What are the requirements for a Pam solution? ›
Your PAM solution must have capabilities to support the policies you establish (e.g., automated password management and multifactor authentication) and administrators should have the ability to automate the process of creating, amending, and deleting accounts.
What is cloud privileged access management? ›
Cloud Privileged Access Management (PAM) is a security framework designed for safeguarding critical data in cloud environments.
What does a thycotic agent do? ›
Thycotic Agent: The core agent is responsible for all reporting and monitoring communication on the endpoint. It can be considered the managing agent, while the Application Control and Local Security Agents are the worker agents.
How much does thycotic cost? ›
At a price starting at $5,000, this product is an excellent value for the money. The Thycotic Secret Server provides high functionality and high scalability at a reasonable starting price.
Who makes Thycotic? ›
Thycotic is now Delinea
Thycotic Products, Resources, Support and Pricing can still be accessed via the links below: Thycotic Products: Account Lifecycle Manager.
What are the benefits of secret Server? ›
- Secret Server. Discover, manage, protect and audit privileged account access.
- Account Lifecycle Manager. Discover, secure, provision, and decommission service accounts.
- Privileged Behavior Analytics. Detect anomalies in privileged account behavior.
How do you use privileged access management? ›
In the Microsoft 365 Admin Center
- Sign into the Microsoft 365 Admin Center using credentials for an admin account in your organization.
- In the admin center, go to Settings > Org Settings > Security & Privacy > Privileged access.
- Enable the Require approvals for privileged tasks control.
When a privileged user shares their credentials with another user, however well-trusted, it puts the account and the enterprise at risk. If users share credentials for even a few designated privileged accounts, it can lead to a massive data breach with lasting effects.
Who needs privileged access management? ›
PAM helps regulated industries like those in healthcare and finance adhere to compliance requirements for managing account access and adopting least privilege access principles. By using privileged access management, you can reduce your risk in an audit and more easily prove compliance.
How does Pam solution work? ›
PAM provides administrators with the functionality, automation and reporting they need to manage privileged accounts. In addition, it supports the principle of least privilege as it allows for the necessary management and oversight to mitigate the risk of accounts that have capabilities beyond the standard user.
How much does Pam solutions cost? ›
Subscription model - billed annually
Administrators and keys (no limit on users and resources) | License fee (billed annually) |
---|
100 administrators and 300 keys | $36,995/year $44,395/year |
150 administrators and 500 keys | $44,995/year $53,995/year |
200 administrators and 1000 keys | $49,995/year $59,995/year |
4 more rows
What are the 4 setup and operation steps for Pam? ›
PAM setup and operation has four steps. Prepare: Identify which groups in your existing forest have significant privileges. Recreate these groups without members in the bastion forest. Protect: Set up lifecycle and authentication protection for when users request just-in-time administration.
What is the meaning of privileged access management? ›
Privileged access management (PAM) consists of the cybersecurity strategies and technologies for exerting control over the elevated (“privileged”) access and permissions for identities, users, accounts, processes, and systems across an IT environment.
What is privileged access management Gartner? ›
Gartner defines privileged access management (PAM) as tools that administer or configure systems and applications to provide an elevated level of technical access through the management and protection of accounts, credentials and commands.
What is thycotic called now? ›
Thycotic is now Delinea
A privileged access management leader providing seamless security for modern, hybrid enterprises.
What is privileged identity management used for? ›
Privileged identity management (PIM) gives users the ability to control, manage, and monitor the access privileges that people have to crucial resources within an organization.