SecurityBrief Australia logo
Australia's leading source of cybersecurity and cyber-attack news

Thycotic news stories

Story image
Privileged Access Management / PAM
Thycotic named Gartner Peer Insights customers’ choice for Privileged Access Management
Centrify was also listed as an Established PAM provider based on user interest and adoption. 
Story image
Privileged Access Management / PAM
Be a “PAMbassador” and help your workmates be cyber smart
Right now, with the threat of ransomware and risks associated with hybrid working top of mind, there is no shortage of ways to put PAMbassadorial skills to good use!
Story image
Privileged Access Management / PAM
ThycoticCentrify adds features to PAM solution
ThycoticCentrify has announced new features for its privileged access management solution, Thycotic Secret Server.
Story image
Privileged Access Management / PAM
ThycoticCentrify updates PAM capabilities across Secret Server & DevOps Secrets Vault
"To stay ahead of the threat curve, security and ITops teams are looking for ways to adopt and update security best practices, like PAM, in the most convenient way.”
Story image
Identity and Access Management
Uptick in cloud-based identity and access management in enterprises - survey
The popularity of cloud-based identity and access management (IAM) adoption in enterprises is on the rise.
Story image
Cybersecurity
Protecting endpoints (and users) that have left the office
To access work emails, it may suffice to use with multi-factor authentication. But if users want to access customer data, that security control isn’t enough.
Story image
Privileged Access Management / PAM
Thycotic and Centrify complete merger, target PAM market
The combined company has now begun integrations and will operate under the temporary name ThycoticCentrify.
Story image
Cybersecurity
Thycotic releases new integrations to bolster account governance
“Service accounts are often left defenceless, even by enterprises with established programs for privileged user security."
Story image
Cybersecurity
How do you make cybersecurity tech buying decisions? Here’s what your peers say
Global research commissioned by Thycotic takes a close look at how IT and security professionals make technology buying decisions, and what influences boards to invest in cybersecurity.
Story image
Channel partners
Ingram Micro becomes Thycotic's primary distributor in Singapore
As part of the partnership, Ingram Micro will leverage its position within the distribution sector and, its global infrastructure and its go-to-market (GTM) expertise, to deliver a joint GTM strategy in Singapore with Thycotic.
Story image
Privileged Access Management / PAM
Forrester names Thycotic a Leader in privileged access management
Thycotic received the highest possible score in 11 of the 24 criteria in the study, including SaaS/cloud, innovation roadmap, and integrations, deployment, supporting products and services, commercial model, and PIM installed base.
Story image
Cybersecurity
Post-COVID-19, every user should be treated as privileged
Privilege is about what data a person can access, or actions a person can perform. It is about people, not just about accounts that unlock access to said data or elevated actions, writes Thycotic security engineer for Asia-Pacific Daniel Comarmond.
Story image
Compliance
Report reveals relationship between boardroom and cybersecurity investments
“While boards are definitely listening and stepping up with increased budget for cybersecurity, they tend to view any investment as a cost rather than adding business value."
Story image
Reseller
Thycotic appoints 3 new execs in APAC hiring spree
The extensive management shakeup in the region comes after the recent establishment of the company’s Singapore office.
Story image
Remote Working
Thycotic launches Secret Server update designed for cloud-first, remote world
“Every part of this release is designed to help customers simplify management so their work is scalable, repeatable, and saves time.”
Story image
Privileged Access Management / PAM
Thycotic rolls out SCIM Connector for expanded user access integration
SCIM Connector 2.0 allows organisations to set up workflows to synchronise, provision or modify entitlements in Secret Server directly within their IGA platform. 
Story image
Threat intelligence
Cyber threat intelligence reaching maturity in organisations worldwide
Cyber threat intelligence is reaching a state of maturity and integration in organisations across the globe, according to a survey by the SANS Institute and ThreatQuotient.
Story image
Network Security
Thycotic acquires Onion ID, launches new access management products
Thycotic has acquired Onion ID, a privileged access management (PAM) solutions provider, and has added new products to its PAM portfolio to protect enterprise cloud apps and better enable remote workers.
Story image
DevOps
Thycotic launches DevOps Secrets Vault solution for greater cloud security
“DevOps Secrets Vault is a cloud-based vault that balances the security and velocity that DevOps teams require for this growing part of the enterprise attack surface."
Story image
ServiceNow
Thycotic rolls out ServiceNow integration for privileged service accounts
The integration aims to resolve workflow approvals, which is a common bottleneck for IT teams that manage privileged service accounts.
Story image
Privileged Access Management / PAM
Thycotic rounds out 2019 with 'banner year' for cloud roadmap
Privileged access management solutions provider Thycotic has published key highlights from 2019 for its work in cloud-based PAM.
Story image
Managed Services
Thycotic reports 67% rise in revenue
The company's sales were also up by 35% year on year, with staff numbers also rising by 50%.
Story image
Application Performance Monitoring / APM
Business security performance impacting bottom line - Thycotic
When cybersecurity teams do not meet their targets, it impacts the CEO with longer hours, job insecurity, shareholder pushback, and bonus reductions.
Story image
Privileged Access Management / PAM
Thycotic introduces certification programme to A/NZ
The programme enables cybersecurity service companies to provide technical support and professional services using Thycotic PAM solutions.