Solution: PAM (Privilege Account Manager) technology. Securing password, endpoints protection and access control
Locations: Washington, D.C., London, Adelaide, Madrid, Manila, Hong Kong, Singapore, Mexico City and São Paulo
CEO: James Legg
Thycotic protects companies from cyber-attacks by developing innovative technologies that secure privileged accounts across the modern enterprise. Their easy-to-use tools eliminate the burden of privilege management and give you direct access to customize. With Thycotic, enterprise-level privilege management is finally possible for companies of all sizes, with any type of deployment. They're the only company that gives you the same privilege management capabilities and high availability both on-premises and in the cloud, meaning you get to have it all, and have it your way.
Of all Privileged Account Management (PAM) options, Thycotic provides the greatest impact in the shortest amount of time.
Discover privileged accounts, vault credentials, govern service accounts, delegate access, monitor and record sessions. Easiest to use and fastest to deploy enterprise-grade privileged access management & governance for organizations of all sizes, with on premise or cloud deployment.
All-in-one solution for least privilege management, threat intelligence, and application whitelisting, greylisting, and blacklisting. Seamless adoption for security teams, help desk support, and business users, because productivity is never impacted.
High velocity vault for high-speed secrets creation, archiving, retrieval, and rotation. Reduce privilege account sprawl, harden privileged attack surface and reduce risk of successful attack without sacrificing DevOps speed, agility or productivity.
The solution manages service accounts – non-human privileged accounts – that access services, applications, data, and network resources. By discovering hidden service accounts and understanding their purpose, you can mitigate the risk of breaches, service interruptions and human error.
Manage and interact with multiple remote sessions from a single screen, for both Remote Desktop Protocol (RDP) and SSH in a unified environment. When configuring remote sessions, you must navigate complex networks, cloud services, and user needs. With multiple sessions active at once, using different connection protocols and a variety of privileged accounts - managing and securing them becomers a challenge. Available on Windows and Mac OS.
The solution simplifies and automates the management of remote employees and third parties accessing the IT resources they need to be productive and secure. It gives teams the next level of granularity for secure remote access to enforce policies, including the use of multi factor authentication and session recording, without requiring any software or browser extension to be installed. You can keep your remote workers productive, your network secure, and virtually eliminate the need for VPN.
Embrace third-party vendors, partners and other remote workers and layer the right amount of security and privilege management on certain temporary accounts. IT and security teams can specify which partners or providers have access to what type of applications, servers and accounts and for how long –all centralized in an automated manner. With Remote Access Controller, IT and security teams are also able to ensure partners are not in violation of any existing third-party policy.
Thycotic Cloud Access Controller ensures every IaaS and SaaS user has the necessary privileges required for their role. Role Based Access Controls can be precisely defined to control what each user can click, read, or modify within any web application. Separation of roles and duties is easily enforcable on standard accounts and shared accounts for web applications. Administrators have a dashboard of activity that clearly displays activity, for tighter cloud app security, uninterrupted productivity and streamlined compliance.
Databases are an essential resource for organizations and contain valuable and sensitive information that needs to be protected. Monitoring and controlling access to databases is a critical priority for security teams primarily because of this sensitive information. Privileged access, in particular, should require multi-factor authentication, and sessions should be monitored, recorded, and regularly reviewed.
Thycotic Database Access Controller enables enterprises to adopt modern cloud databases from AWS (RDS), Google, Azure, Oracle, Redis, and others, while still enforcing appropriate access levels, multi factor authentication, and complete reporting and auditing workflows. Now customers can record entire database access sessions, provide time-based access, report and log actions, generate alerts and cut off connections automatically.