Download presentation
Presentation is loading. Please wait.
Published byHarry Junge Modified over 6 years ago
1
We are a global leader of next-generation IT security solutions that protect organizations against cyber-attacks that use privileged accounts to strike at the core of the enterprise. We are a global leader of next-generation IT security solutions that protect organizations against cyber-attacks that use privileged accounts to strike at the core of the enterprise. Our software solution protects privileged accounts, which have become a critical target of today’s cyber-attacks. Privileged accounts are pervasive and act as the “keys to the IT kingdom,” providing complete access to, and control of, the IT infrastructure, core systems and applications, as well as critical business data. In the hands of an external attacker or malicious insider, privileged accounts allow attackers to take control of and disrupt an organization’s IT infrastructures, steal confidential information, intellectual property and commit financial fraud.
2
Why Thycotic The Best Value
FASTEST Time to Value EASIEST To Use EASIEST To Customize RATED #1 Customer Satisfaction AWARD-WINNING Enterprise-class PAM FASTEST GROWING 247% 3-Year CAGR #1 ADOPTION RATE | CUSTOMERS | 180,000+ IT ADMINS In a relatively short time, our company has achieved great success. I’d like to quickly summarize for you the reasons behind that success: We make great products – Our award winning, enterprise-class PAM, Thycotic Secret Server, has been recognized by the top product awards in the industry: SC Magazine Awards, SC Awards Europe, Info Security Products Guide, Best of VMworld and more. Fastest Time to value: in the industry - Immediate deployments: you're installed, configured and running on day 1- value is evident out-of-the-box. Super Easy to use – Intuitive, powerful interface doesn’t get in the way of getting the job done and is flexible so that power users, administrators and end users will feel at home within the user interface. Easy to Customize– Thycotic Secret Server was designed for IT admins. This means you can easily customize our technology via scripts and configuration settings - without expensive consultants Best in class support - Rated #1 in customer satisfaction, as validated by Thycotic customer satisfaction survey. #1 User Adoption – Thycotic boasts the highest adoption rate for PAM software in the industry, with over 180,000 IT admins who are using our software every day Fastest growing provider of PAM - Thycotic has been honored as an Inc Fastest Growing Company 3 years in a row – we’ve grown 247% over 3 years and have had 8 consecutive quarters of record revenue growth
3
Easiest to use enterprise-class PAM
What customers Tell us Easiest to use enterprise-class PAM Fastest to deploy Affordability + + While those are the reasons behind our success, I’d like to concisely summarize for you why our customers love us: Thycotic delivers the best value you will find in the marketplace: The fastest to deploy + Easiest to use & most customizable enterprise class PAM solution + delivered for substantially less money = The best value Great product & great support & delivered at a great value – This is what sets us apart! = Superior Value
4
Preferred CHOICE 3000+ CUSTOMERS the
This is why we have over 3,500 amazing customers around the globe. We serve customers across all industries and can support the global needs of Fortune 500 companies as well as the specific needs of middle market businesses
5
Privileged Accounts What is a privileged account?
Non-human accounts used by IT staff which often have unfettered access to critical data and systems i.e. Domain Admin, root. Exist everywhere in nearly every connected device, server, hypervisor, OS, DB, or application: on-premises & cloud. Represent one of the most vulnerable aspects of an organization’s IT infrastructure. So lets turn to our PAM solutions… And to do this, lets start by making sure we are aligned around the definition of a privileged account. Privileged accounts are high-access, non-human accounts (such as Domain Admin or root) used by IT admins, developers, services and applications which often provide unfettered access to data, infrastructure and systems Privileged accounts exist in nearly every connected device, server, virtualization platform, operating system, database and applications throughout your datacenters, whether on-prem or hosted in the cloud Additionally, privileged accounts extend beyond your organization’s traditional IT infrastructure to include social media accounts, which can be misused to cause significant reputational damage and other harm to an enterprise. With the increasing complexity of IT infrastructures, the number of privileged accounts has grown exponentially - . In fact, Organizations typically have two to three times more privileged accounts than employees Privileged accounts consistently remain one of the most vulnerable and and most heavily targeted assets in your IT infrastructure by hackers, rogue employees and malicious software
6
PAM solutions Why PAM Solutions are Required
62%+ of breaches resulted from privileged account abuse - IANS Exploiting privileged accounts is the most common target of any cyber-attack Malicious insiders continue to be a significant risk. Traditional threat protection, focused on the perimeter, is not sufficient to protect privileged accounts Requires active management of privileged end-points Identity is the new perimeter Why are privileged accounts so vulnerable? Exploiting privileged accounts is the most common target of any cyber attack – This is confirmed by the Security Research From IANS – where in a recent study the found that 62% of breaches result from privileged account abuse Hijacking privileged accounts gives attackers the ability to access and download an organization’s most sensitive data, disrupt business operations, create additional user and privileged accounts, distribute malware, bypass existing security controls, perform other sensitive operations, and erase audit trails to hide their activity. Hackers, malicious insiders or even careless users pose a significant threat to organizations when they gain access to privileged accounts. Today’s cyber-attacks are typically designed to evade traditional threat prevention technologies that are focused on protecting the perimeter from outside breach. Once inside a network, attackers typically attempt to advance from the initial breach, escalating their privileges and moving through the network to identify, access and compromise valuable targets and confidential information. Once an attacker has hijacked the privileged credentials of an authorized user, its activities blend in with legitimate traffic and is therefore much more difficult to detect. Attackers can therefore operate undetected inside an organization for long periods of time. In fact, according a recent analyst report, the median length of time that attackers are on an organization’s network before being detected is approximately 240 days. Malicious insiders have historically been responsible for some of the most significant security breaches and continue to pose a large risk to organizations. Insiders are generally trusted users such as employees, contractors and business partners who commonly have privileged credentials and knowledge of the organization. These trusted insiders can therefore be extremely dangerous if they decide to exploit their position to steal confidential information, commit financial fraud, etc.. And, as more organizations do business in the cloud, whether hosting services in cloud-based platforms, utilizing a remote workforce or working with 3rd parties to accomplish their business needs, the traditional perimeter is simply not sufficient to protect against the current way business is done. All of this points to the fact that “Identity is becoming the new perimeter”
7
VULNERABLE? Privileged accounts are often IS YOUR COMPANY UNKNOWN
UNMANAGED UNPROTECTED Why is it so hard to protect your company’s privileged accounts? It really comes down to 3 reasons: Privileged accounts are often unknown Do you know how many privileged accounts you have and where they are? Privileged accounts are often unmanaged Do you have all of your privileged accounts locked in a password vault? Can you easily access, manage and change these passwords across the enterprise according to best practice policies? Is the process of managing privileged accounts a nightmare for IT admins due to the manual, time-consuming nature of the process? Privileged accounts are often unprotected Do you have a simple and secure UI for setting up and enforcing policies to protect privileged accounts? Can you easily produce compliance reports?
8
Privileged account management Secret Server
A fundamental security layer to protect against cyber-attacks that use privileged accounts to strike at the core of the enterprise – managed from a single console. Thycotic’s PAM solution is called Secret Server Secret Server introduces a fundamental security layer to protect against cyber-attacks that use privileged accounts to strike at the core of the enterprise – and it enables you to manage your enterprises privileged accounts from a single, easy to use console
9
Secret Server How it works Secret Server solves the unknown
Automatically identify and securely store privileged accounts. Easily detect all privileged accounts and store them in our secure vault Accomplishes in minutes what would take countless IT hours For the 3 key privileged account challenges: Unknown Unmanaged Unprotected Lets discuss our primary capabilities as well as how you’ll benefit: Secret Server enables you to solve the problem that privileged accounts are unknown by helping you: Automatically discover and securely store privileged accounts. Here’s what we do: Our solution automatically identifies & discovers privileged accounts wherever they reside – such as local accounts, root accounts and hypervisor accounts, as well as wherever they are being used, including in services, scheduled tasks and more, anywhere across the entire enterprise. Then it takes control of those credentials, and securely stores them in our password vault. This enables you to immediately visualize the resulting compliance gaps and security vulnerabilities of unmanaged accounts. It also helps quickly change passwords – if your organization were under attack How you’ll benefit: Our automated account discovery process reduces the time-consuming and error-prone task of manually tracking and updating privileged credentials, wherever they are used in the environment, thereby decreasing IT operational costs and increasing security on these accounts.– think about what you go through every time a new privileged account is provisioned… This enhanced discovery visibility significantly improves the security posture of our customers and facilitates adherence to rigorous audit and compliance standards.
10
Secret Server + How it works Secret Server solves the unmanaged
Audit, analyze, and manage privileged user and account activity. Automatic password rotation to manage the keys to the kingdom Alerts you to abnormal use of credentials Dramatically improves your security posture Facilitate adherence to compliance standards Secret Server enables you to solve the problem that privileged accounts are unmanaged by helping you: Audit, analyze and Manage privileged activity. What we do: Our solution enables you to effectively manage individual privileged session activity down to every mouse click and keystroke. Session recordings also provide a full forensics record of privileged user activity to facilitate a more rapid and precise response to malicious and anomalous behaviors, as well as to support potential disaster recovery efforts should a privileged user do something damaging during a recorded session.. Our software seamlessly integrates with SEIM solutions to provide a full view of your security posture to SOC personnel Because we provide highly secure storage of privileged session recordings and robust search capabilities on proxied SSH sessions, we will automatically help you adhere to audit and compliance requirements All of this enables you to easily manage your enterprise’s privileged accounts through the most intuitive user interface in the industry How you’ll benefit: Because our software was built by IT admins with deep security expertise, our management capabilities dramatically reduce the inefficient overhead of manually tracking, updating, rotating and managing privileged credentials, thereby decreasing costs while simultaneously increasing the security posture of your organization.
11
Secret Server + How it works Secret Server handles the unprotected
Collect, record, monitor, and manage privileged activity. Know how your privileged accounts are being used and deter abuse Provide full view to SOC with SIEM integration of privileged activities Non-repudiation evidence for auditors through active recording & monitoring Secret Server enables you to solve the problem that privileged accounts are unprotected by helping you: Monitor and Detect all activity within Secret Server to quickly respond to malicious activity in order to secure your privileged accounts Our software analyzes individual privileged user activity within Secret Server without impacting the privileged account session and creates prioritized alerts in real-time when abnormal activity is detected. These alerts allow your incident response team to investigate and prioritize threatening activity and quickly respond In addition, industry standard best practices are built into our feature set, such as separation of roles, securing passwords in an encrypted vault & enforcing strong passwords How you’ll benefit: We enable your incident response teams to significantly reduce risk by enabling them to quickly investigate and prioritize threatening activity - dramatically improving your security posture, as well as helping to meet compliance standards and requirements.
12
Key capabilities SCALABLE Supports large-scale
distributed environments SECURE Multi-layered security, role-based access control, military-grade encryption AVAILABLE DB clustering, load balancing, unlimited admin mode CUSTOMIZABLE Easy-to-customize, no expensive consultants SIMPLE Installs in minutes, easy-to-use and flexible AUDIT Out-of-the-box and custom security reports We deliver all this capability and so much more…Our solutions are: Scalable Supports large-scale distributed environments, - major OS, DB, apps, hypervisors, network devices and security appliances, for on-premises & cloud Secure Multiple layers of security - access management for IT admins, robust segregation of role-based duties and military-grade AES 256 bit encryption. Available High availability disaster recovery options are supported using your existing platforms, including load-balanced front-end application support, database clustering and our unique unlimited admin mode for break the glass scenarios Customizable: Easy to customize without any need to hire expensive consultants Simple: Software Installs in minutes, is easy to use & flexible so you can get tasks done with minimal effort Audit: Out-of-the-box & custom reports to satisfy security regulations
13
CUSTOMERS SAY What our customers say What our
Our IT admins were able to get up to speed within minutes and control over privileged accounts improved immediately. Because Secret Server helps us manage sensitive credentials across privileged accounts, we no longer face the inefficiencies and security risks that can plague an organization as big as ours.” “Secret Server is a full-fledged privileged account management platform ready for global enterprises. This has earned them a place as a leader in innovation.” Martin Kuppinger, Founder – KuppingerCole Michael Boeglin, Director of Global Infrastructure – International Rescue Committee As I mentioned, we have over 3000 customers – If you came to our user conference, this is what you would hear: Michael Boeglin, Director of Global Infrastructure – International Rescue Committee Our IT admins were able to get up to speed within minutes and our control over privileged accounts improved immediately. Because Secret Server helps us manage sensitive credentials across privileged accounts, we no longer face the inefficiencies and security risks that can plague an organization as big as ours.”
14
Password Reset Server PASSWORD MANAGEMENT SOLUTIONS
Simple, end user self-service password management Frees up IT help desk staff from one of its most time-consuming and inefficient processes Improve the speed of the business We also offer two additional solutions as part of our product portfolio: Password Reset Server: Provides a simple, self-service password management solution. What we do: Password Reset Server allows end users to reset their password either via a web service portal or through an integrated Windows Logon function. It also allows IT admins to customize end user password security policies including how many and what type of questions must be answered for a user to validate their identity. How you benefit: This frees up IT help desk staff from one of its most time-consuming and inefficient processes, allowing them to provide a better experience to the business end users – saving them time and providing a higher value service to your organization.
15
Group Management Server
AD Group MANAGEMENT SOLUTIONS Group Management Server Empowers non-IT personnel to securely manage their department's AD Groups without AD tools or special privilege access. Provides auditors complete visibility around access control, attestation, membership expiration and privilege changes. We also offer an Active Directory group management solution called, Group Management Server It Empowers non-IT personnel to securely manage their department's Active Directory Groups – which offers simple, easy management of associated group policies, roles, & permissions How you’ll benefit: It frees up IT staff from routine Active Directory group management tasks, while providing a more secure, more simple way for non-IT staff to make the business decision around AD groups without providing AD tools (ADUC) or needing special tools and training. Provide all the reports and controls necessary to auditors showing that access control and AD groups are effectively managed, attestations are happening and systems are secure.
16
Questions/Next Steps Further qualify Go to demo
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.