Story image

Thycotic’s cloud-based PAM offering now has full capabilities

21 Aug 2018

Thycotic has announced major updates to Secret Server Cloud, the company’s PAM-as-a-service offering, to now deliver all of the features and capabilities of its on-premises counterpart.

emt Distribution Asia Pacific chief marketing officer Scott Hagenus says that this is important news for local MSPs and MSSPs because cloud continues to have enormous growth potential.

“Australia’s Notifiable Data Breach Act has created a huge market opportunity among organisations that can no longer cover up the sort of security incidents that we now know are happening on a daily basis - with 242 notifications in the last quarter alone," says Hagenus.

“Today’s announcement is a real game changer for MSPs. Not only can they effectively manage the security of their clients’ passwords – plugging a security gap that some MSPs would rather not talk about – but they can jump on board the rapidly growing PAM market by offering it as a cloud service.”

It is available in three editions - Platinum, Professional and Vault – for organisations of varying sizes.

Thycotic regional channel sales director and international MSP sales director Kris Hansen says that the rising scale and scope of cyber threats targeting privileged accounts has lead to PAM becoming business-critical.

“With Secret Server Cloud, organisations of every size can now have all the features and capabilities of an enterprise-grade PAM solution, without the management burden or overhead of legacy on-premises tools,” Hansen adds.

“Since day one, a primary mission and design principle of Secret Server has been to empower security professionals to easily deploy and manage PAM across their organisation, and Secret Server Cloud is our latest effort in support of this mission.”

Secret Server Cloud is built on Microsoft Azure Cloud.

Feature breakdowns for each edition include:

Vault Edition

  • For small and medium-sized business as well as department-level teams
  • Automatically discovers, vaults, and manages privileged accounts across the organisation
  • Integrates with Active Directory and provides Secret Server mobile app to manage privileged access from anywhere

Professional Edition

  • Proactive privileged account management with automated password rotation and verification
  • Granular policy control across all devices and teams, and secure proxying to gate all privileged sessions
  • Integrates Secret Server Cloud with your CRM, SAML, VSI and AWS KMS (key management) solutions

Platinum Edition

  • Manages and protects service accounts, DevOps workflows, and Unix infrastructures
  • Delivers full-fidelity privileged session monitoring & recording
  • Provides advanced analytics and anomaly detection based on user behaviour and context

“PAM is one of the Australian Signals Directorate’s top four cyber mitigation strategies, but unlike operating system or application patching, many organisations don’t yet have solutions in place, and that’s something they are open to addressing ASAP,” says Hagenus.

Automation beginning to impact Aussie workforce
18% of those surveyed said automation has already impacted their job ‘significantly’, with their duties changing or their role becoming redundant.
OVH launches public cloud down under
OVH Public Cloud services is expanding to Australia out of two data centres - one in Sydney and one in Singapore.
Acer’s new programme and portal for partners
A simple and manageable programme designed to incentivise, recognise and reward commercial partner achievements.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
In ongoing cloud war, Google to acquire data migration specialist
Google is currently behind AWS and Microsoft in the cloud battle, and it would seem this play is an attempt to claw some ground back.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Why Aussie companies are struggling with data
The top culprits in poor data quality in Oz are human error, different data sources, lack of comms, inadequate strategy, and too much information.