Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

12/1/2015
10:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Thycotic Teams Up with Adobe to Bring Enhanced Privileged Account Security to Build Environments for Cloud Applications

Global Leader in Digital Media and Digital Marketing Solutions Leverages Thycotic Secret Server in Bleeding Edge Security Automation Practices

December 1, 2015 – Washington, D.C. – Thycotic, a leading provider of enterprise privileged account management solutions for more than 3,500 global organizations, today announced that Adobe, a global leader in digital marketing and digital media solutions, has deployed Thycotic Secret Server in build environments for its products and cloud services to reduce risk and enforce strong privileged credential management as part of its innovative security automation practices.

Adobe is changing the world through digital experiences. They help their customers create, deliver and optimize content and applications.

Adobe products and cloud service are used on and accessed by billions of devices across the world. To harden its security posture, Adobe’s cloud operations team has selected Thycotic as a security partner to provide enhanced privileged credential management in its build environments to safeguard shared credentials on build machines and enforce strong management of privileged technical users who need build access daily. 

“Privileged account security is one of the many components of our security strategy because the weakest link in any security story is often the human,” says Liz McQuarrie, Principal Scientist and Director of Security Operations for the Cloud Operations team at Adobe. “Select people at Adobe have access to privileged credentials because of their roles. By leveraging Thycotic in our security automation strategy, we’ve been able to remove the human element when managing these credentials.”

Product teams that focus on building applications need the ability to provision computing capabilities automatically without human interaction in order to maintain compliance of Adobe’s security guidelines for those build environments. To help with that process, Adobe searched for a dedicated, enterprise class privileged credential management offering that would adhere to their security standards and needs. Ultimately, Thycotic was chosen because of its integration capabilities, fast deployment, enterprise feature sets and ease of use across teams.

“What we’ve found with Thycotic is not only do we get this ease of integration, but beyond that we get the security of the credentials,” says Eric Robinson, Security Tools Architect at Adobe. “Privileged credential management gives us the same ability to enforce the same level or greater protection on these build machines as we would have on other individual machines.”

By automating its build environments, Adobe is innovating its security automation practices to ensure its applications and clouds services are built and delivered to the customer successfully and safely. Development teams have worked closely with Thycotic to build custom features that help support Adobe’s efforts in security automation.

“Thycotic tech support is very responsive,” notes Nay Doummar, Cloud Operations Engineer at Adobe. “We’ve been fortunate to collaborate with a highly responsive support team that guided us from the initial implementation to the final adoption of Secret Server. Even after implementation they have been helping us and guiding us and successfully integrating specific feature requests into their solution.”

Moving forward, Adobe plans to continue working closely with Thycotic to implement innovative solutions for security automation and considers Thycotic a valuable partner in security.

“We found the features of Thycotic to be comprehensive, but most of all when we ask for things and want to try something new, they’ve been very responsive,” says McQuarrie. “I’ve been very happy with our relationship with Thycotic. They’ve been a great partner for us in responding to our questions and product requests, and a valuable collaborator.”

Thycotic and Adobe will be co-presenting their security automation case study this year at the Gartner Identity and Access Management (IAM) Summit on Tuesday, December 8th 2015 in Las Vegas, Nevada.  

 

About Thycotic

Thycotic, a global leader in next-generation IT security solutions, delivers an indispensable, comprehensive Privileged Account Management (PAM) solution to protect your "keys to the kingdom" from cyber-attacks and insider threats.  Unlike any other security offering, Thycotic Secret Server assures the protection of privileged accounts while being the fastest to deploy, easiest to use, exceptionally scalable enterprise-class solution offered at a competitive price. Already securing privileged account access for more than 3,500 organizations worldwide, including Fortune 500 enterprises, Thycotic Secret Server is simply your best value for PAM protection. For more information, please visit www.thycotic.com.

 

About Adobe Systems Incorporated

Adobe is changing the world through digital experiences. For more information, visit www.adobe.com.

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17475
PUBLISHED: 2020-08-14
Lack of authentication in the network relays used in MEGVII Koala 2.9.1-c3s allows attackers to grant physical access to anyone by sending packet data to UDP port 5000.
CVE-2020-0255
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-10751. Reason: This candidate is a duplicate of CVE-2020-10751. Notes: All CVE users should reference CVE-2020-10751 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-14353
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-17464
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2020-17473
PUBLISHED: 2020-08-14
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.