...
Thycotic Software Ltd.     Thycotic Software Ltd.
1101 17th St. NW, Suite 1102 • 20036 Washington, DC
Phone: +1 202 600 2646
Fax: +1 202 315 3315
Internet: http://www.thycotic.com

Thycotic IT security and password management solutions empower companies to remove the complexities associated with proper access control and management of privileged accounts. An Inc. 5000 company, Thycotic is recognized as the fastest growing, privately held privileged management provider in the USA. Secret Server privileged account management vaults, manages and audits privileged accounts across a company’s entire IT infrastructure. Thycotic also provides end-user password management and self-service AD group management tools. Rated #1 in customer satisfaction and trusted by more than 3,000 organizations worldwide – including members of the Fortune 500, enterprises, government agencies, technology firms, universities, non-profits, and managed service providers.

Congress: European Identity & Cloud Conference 2015 05.05. – 08.05.2015 , Munich, Germany
European Identity & Cloud Conference 2015 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Congress: European Identity & Cloud Conference 2014 13.05. – 16.05.2014 , Munich, Germany
European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Webinar: How to stop the Insider Threat: Protect yourself from Privileged Users 06.05.2014 , 4:00pm CET, 10:00am EDT, 7:00am PDT
The attack landscape is changing. Targeted, advanced and persistent external attacks are increasing. However, despite all discussions about external threats, one thing is clear: The biggest threat is internal, and comes from your own users. Whether these are malicious or just human errors, the risk for your sensitive information is immense.
Congress: European Identity & Cloud Conference 2013 14.05. – 17.05.2013 , Munich/Germany
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Vendor Report: Thycotic – 7111204.06.2014Martin Kuppinger €495.00
Thycotic is one of the newer vendors in the market segment of Privilege Management. Previously they had been a vendor of various point solutions for system management. Aside from their core product Secret Server, Thycotic still develops and sells two other products which focus on specific administrative tasks. In contrast to several other vendors, all research, product development, and support is based in the US. The licensing model is fairly simple and based on the number of named users and edition, not the systems or credentials managed…

Order the report

Snapshot: Thycotic Secret Server – 7063316.01.2013Martin Kuppinger €190.00
Thycotic Software is one of the vendors in the emerging Privilege Management market. Their core product is called Secret Server and supports managing secrets, especially, but not limited to, administrative and service account passwords. In contrast to other vendors in that segment, Thycotic as of now focuses not on delivering a complete Privilege Management infrastructure covering all use cases in that space but focuses on the core area of managing passwords. Secret Server is a web application which can be accessed by different users in multiple ways to request passwords for a multitude of systems.

Order the report

How to Stop the Insider Threat: Protect Yourself from Privileged Users06.05.2014
The attack landscape is changing. Targeted, advanced and persistent external attacks are increasing. However, despite all discussions about external threats, one thing is clear: The biggest threat is internal, and comes from your own users. Whether these are malicious or just human errors, the risk for your sensitive information is immense. Watch
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.