News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

ThycoticCentrify improves Secret Server usability
B2B Cyber ​​Security ShortNews

Improved Secret Server usability through automated and simplified secret management: With new security controls, automation features and design updates, the new version of the Secret Server offers companies more protection and greater productivity when managing secrets. ThycoticCentrify, a leading provider of cloud identity security solutions formed from the merger of two leaders in privileged access management (PAM), Thycotic and Centrify, is expanding the capabilities of its award-winning PAM solution, Secret Server. With new security controls, automation features, and design updates, Secret Server builds on its industry-leading secret management capabilities and ease of use to provide more protection...

Read more

Account lifecycle governance on multi-cloud environments
B2B Cyber ​​Security ShortNews

With Account Lifecycle Manager, it is now possible to discover, provision and manage service accounts for all major cloud providers - Microsoft Azure, Amazon Web Services and Google Cloud Platform - from a central, policy-based solution. ThycoticCentrify, a leading provider of cloud identity security solutions formed from the merger of two leaders in Privileged Access Management (PAM), Thycotic and Centrify, announces an extension of its industry-leading Account Lifecycle Manager (ALM) service account governance solution. This release enables organizations to take control of their growing number of privileged service accounts and provides full lifecycle management in…

Read more

Over 50 percent: Security incidents in DevOps environments 
Over 50 percent: Security incidents in DevOps environments

A Forrester survey shows that centralizing secrets and using unified tools is key to securing DevOps innovation. 57 percent of companies have suffered security incidents with disclosed secrets in DevOps. ThycoticCentrify, a leading provider of cloud identity security solutions, born from the merger of two market leaders in Privileged Access Management (PAM), Thycotic and Centrify, commissioned a survey from Forrester to examine the paradox of security innovation in DevOps environments. The study shows that more than half of companies have had security incidents related to ...

Read more

Insider risk: prevent misuse of access

The enemy inside: Insider threats through misuse of privileged authorizations. If there is a lack of measures to control and restrict the access rights of employees in a granular way, this represents a considerable risk for company security. The solution: the implementation of a least privilege approach. Cracking the code, defeating a boss, or discovering a lost key - these are all ways to level up in video games. Then players get access to new tools, powers or other components that will ultimately help them to victory. In many ways, the network infrastructure is similar to a video game. Employees have access to ...

Read more

Management of privileged access to cloud platforms
Management of privileged access to cloud platforms

New ThycoticCentrify solution for control and management of privileged access to cloud platforms. Companies are increasingly relocating their internal applications to the cloud. ThycoticCentrify, a leading provider of cloud identity security solutions that emerged from the merger of the leading Privileged Access Management (PAM) providers Thycotic and Centrify, enables AWS billing accounts and IAM accounts with its new cloud provider solution (Identity and Access Management) and AWS EC2 instances centrally and in real time. Internal applications are more in the cloud Companies are increasingly relocating their internal applications to the cloud. They often choose a "lift-and-shift" approach to virtual machines ...

Read more

Zero Trust against identity fraud

Due to increased remote work, IT administrators, security teams and regular employees are currently heavily dependent on remote access to corporate systems, DevOps environments and applications. This means that threat actors have a much larger attack surface at their disposal: identity fraud. Digital identities have proven to be the weapon of choice for cyber criminals. If privileged users of a company routinely use shared privileged accounts for access - especially remotely via a VPN - any attacker who compromises these credentials has, in the worst case scenario, extensive access to company-critical data and resources. In addition, not only are ...

Read more

Theft of access data: every 2nd company affected
Theft of access data: every 2nd company affected

Over half of the companies are affected by the theft of privileged access data and insider threats. ThycoticCentrify study: 77 percent use the zero trust approach in response to increased attacks on critical systems and data. Over half of companies struggled with privileged login theft (53 percent) and insider threats (52 percent) in the past twelve months. This is shown by a new study by ThycoticCentrify, a leading provider of cloud identity security solutions. In 85 percent of the cases in which cybercriminals stole privileged credentials, they were able to access critical systems and / or data. In addition, 66 percent of insider threats resulted in ...

Read more

Companies rely on IAM and PAM in the cloud

Identity security in the cloud: 89 percent of companies rely on IAM and PAM in the cloud. ThycoticCentrify Study: Protecting Digital Identities from Risks from Increasing Identity Sprawl. Companies are increasingly relying on cloud-based identity and access management (IAM): 89 percent have implemented best-of-breed solutions for IAM and / or privileged access management (PAM) in cloud environments, which are increasingly hybrid or multi-cloud . This is the result of a new study by ThycoticCentrify, a leading provider of cloud identity security solutions, which emerged from the merger of the leading providers of Privileged Access Management (PAM) Thycotic and Centrify. 150 IT decision-makers were asked for the study ...

Read more

Security risk from identity sprawl

Security risk from identity sprawl. As companies increasingly use new technologies such as the cloud, big data, DevOps, containers or microservices, this growing complexity also poses new challenges for identity and access management. With these emerging technologies, workloads and data volumes grow and increasingly reside in the cloud. This increases the number of human and machine identities exponentially. In order to contain these new attack surfaces, it is therefore essential to centralize fragmented identities across a hybrid company infrastructure and to enforce a consistent security model for privileged access. Identity Sprawl: The Dangers of Identity Sprawl With Identity Sprawl ...

Read more