Promote this Nomination

Share on FacebookTweet about this on TwitterShare on LinkedIn
Thycotic Company Logo
Desktop Bulk Operation_SS CloudCloud - Provisioning Portal_SS Cloud
  • Company (that provides the nominated product / solution / service): Thycotic
  • Website: https://thycotic.com/
  • Company size (employees): 51-200
  • Product Version Number: 1.0
  • Type of solution: Software
  • Year this product or service was first introduced to the market: 2016
  • Year the current version of this product or service has been released: 2016
  • Approximate number of users worldwide: 750

In 3 bullets, summarize why this product or service deserves recognition:

• Enables you to discover, store distribute, change and audit passwords in a secure environment
• Allows organizations to focus on managing their privileged accounts, while offloading the tool management to the cloud provider
• Manages and secures privileged passwords in minutes with delivering power and affordability of the cloud

In less than 300 words, summarize the most important features and benefits of this product or service

Secret Server Cloud is a simple, easy and secure privileged account management powered by the cloud. It maintains to keep organizations’ most valued assets in the cloud secure by allowing enterprises to discover, manage and protect their privileged accounts.

With Secret Server Cloud, Thycotic manages the PAM infrastructure for companies. Technical benefits from Secret Server Cloud include:
• Hardware: Servers, Load Balancers, etc.
• Software: IIS Web Server, SQL Databases
• Updates and Maintenance

Securing your passwords is only half the battle – what you don’t know, CAN hurt you. Secret Server helps discover vulnerabilities and protects your organization by:
• Discovering Windows local admin accounts, application accounts, UNIX/ Linux accounts, and more.
• Locking down sensitive account passwords.
• Integrating with Active Directory.
• Providing full audit reports for compliance mandates.
• Automating privileged account discovery and password changing.
• Providing secure access to systems without disclosing privileged passwords to users.
• Enforcing least privilege policies for super user accounts.
• Discovering and taking back control of unknown privileged accounts.
• Rotating every password an employee has seen, automatically, once they leave the company.
•“Heartbeat” functionality monitors passwords on all machines to ensure they haven’t been changed outside of secret server – a potential warning sign that a machine has been compromised.

cybersecurity_awards_finalist

Leave a Comment.

You need to be a registered member to comment on this nomination.Please register

Sign Up for
Cybersecurity Excellence Awards Updates

Sign up for your award updates! Join thousands of cybersecurity marketers and professionals to receive the latest news about the upcoming Cybersecurity Excellence Awards.

Sign Up for
Cybersecurity Excellence Awards Updates

Sign up for your award updates! Join thousands of cybersecurity marketers and professionals to receive the latest news about the upcoming Cybersecurity Excellence Awards.