Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

12/1/2015
10:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Thycotic Teams Up with Adobe to Bring Enhanced Privileged Account Security to Build Environments for Cloud Applications

Global Leader in Digital Media and Digital Marketing Solutions Leverages Thycotic Secret Server in Bleeding Edge Security Automation Practices

December 1, 2015 – Washington, D.C. – Thycotic, a leading provider of enterprise privileged account management solutions for more than 3,500 global organizations, today announced that Adobe, a global leader in digital marketing and digital media solutions, has deployed Thycotic Secret Server in build environments for its products and cloud services to reduce risk and enforce strong privileged credential management as part of its innovative security automation practices.

Adobe is changing the world through digital experiences. They help their customers create, deliver and optimize content and applications.

Adobe products and cloud service are used on and accessed by billions of devices across the world. To harden its security posture, Adobe’s cloud operations team has selected Thycotic as a security partner to provide enhanced privileged credential management in its build environments to safeguard shared credentials on build machines and enforce strong management of privileged technical users who need build access daily. 

“Privileged account security is one of the many components of our security strategy because the weakest link in any security story is often the human,” says Liz McQuarrie, Principal Scientist and Director of Security Operations for the Cloud Operations team at Adobe. “Select people at Adobe have access to privileged credentials because of their roles. By leveraging Thycotic in our security automation strategy, we’ve been able to remove the human element when managing these credentials.”

Product teams that focus on building applications need the ability to provision computing capabilities automatically without human interaction in order to maintain compliance of Adobe’s security guidelines for those build environments. To help with that process, Adobe searched for a dedicated, enterprise class privileged credential management offering that would adhere to their security standards and needs. Ultimately, Thycotic was chosen because of its integration capabilities, fast deployment, enterprise feature sets and ease of use across teams.

“What we’ve found with Thycotic is not only do we get this ease of integration, but beyond that we get the security of the credentials,” says Eric Robinson, Security Tools Architect at Adobe. “Privileged credential management gives us the same ability to enforce the same level or greater protection on these build machines as we would have on other individual machines.”

By automating its build environments, Adobe is innovating its security automation practices to ensure its applications and clouds services are built and delivered to the customer successfully and safely. Development teams have worked closely with Thycotic to build custom features that help support Adobe’s efforts in security automation.

“Thycotic tech support is very responsive,” notes Nay Doummar, Cloud Operations Engineer at Adobe. “We’ve been fortunate to collaborate with a highly responsive support team that guided us from the initial implementation to the final adoption of Secret Server. Even after implementation they have been helping us and guiding us and successfully integrating specific feature requests into their solution.”

Moving forward, Adobe plans to continue working closely with Thycotic to implement innovative solutions for security automation and considers Thycotic a valuable partner in security.

“We found the features of Thycotic to be comprehensive, but most of all when we ask for things and want to try something new, they’ve been very responsive,” says McQuarrie. “I’ve been very happy with our relationship with Thycotic. They’ve been a great partner for us in responding to our questions and product requests, and a valuable collaborator.”

Thycotic and Adobe will be co-presenting their security automation case study this year at the Gartner Identity and Access Management (IAM) Summit on Tuesday, December 8th 2015 in Las Vegas, Nevada.  

 

About Thycotic

Thycotic, a global leader in next-generation IT security solutions, delivers an indispensable, comprehensive Privileged Account Management (PAM) solution to protect your "keys to the kingdom" from cyber-attacks and insider threats.  Unlike any other security offering, Thycotic Secret Server assures the protection of privileged accounts while being the fastest to deploy, easiest to use, exceptionally scalable enterprise-class solution offered at a competitive price. Already securing privileged account access for more than 3,500 organizations worldwide, including Fortune 500 enterprises, Thycotic Secret Server is simply your best value for PAM protection. For more information, please visit www.thycotic.com.

 

About Adobe Systems Incorporated

Adobe is changing the world through digital experiences. For more information, visit www.adobe.com.

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-22879
PUBLISHED: 2021-04-14
Nextcloud Desktop Client prior to 3.1.3 is vulnerable to resource injection by way of missing validation of URLs, allowing a malicious server to execute remote commands. User interaction is needed for exploitation.
CVE-2021-27989
PUBLISHED: 2021-04-14
Appspace 6.2.4 is vulnerable to stored cross-site scripting (XSS) in multiple parameters within /medianet/sgcontentset.aspx.
CVE-2021-25316
PUBLISHED: 2021-04-14
A Insecure Temporary File vulnerability in s390-tools of SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-SP2 allows local attackers to prevent VM live migrations This issue affects: SUSE Linux Enterprise Server 12-SP5 s390-tools versions prior to 2.1.0-18.29.1. SUSE Linux Enterp...
CVE-2021-28797
PUBLISHED: 2021-04-14
A stack-based buffer overflow vulnerability has been reported to affect QNAP NAS devices running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. QNAP have already fixed this vulnerability in the following versions: Surveillance Station 5.1.5.4.3 (an...
CVE-2020-36323
PUBLISHED: 2021-04-14
In the standard library in Rust before 1.50.3, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.