Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:00 AM
Dark Reading
Dark Reading
Products and Releases

Enhanced Help Desk Support and Password Synchronization for Office 365 Added to Thycotic Password Reset Server

Self-service password reset tool for end-users now offers increased flexibility and ease-of-use for organizations of all sizes

October 13, 2015 – Washington, D.C. – Thycotic, a provider of smart and effective password reset solutions for global organizations, today announced the availability of the latest version of Thycotic Password Reset Server, a self-service password reset tool designed for end-users. The latest version of the tool will feature customizable role-based access control, password synchronization support for Microsoft Office 365, as well as a new help desk support portal.

Password Reset Server makes it easier than ever for non-technical end-users within an organization to reset their Active Directory passwords directly from the login screen or via a web browser for remote staff. The solution is designed to greatly minimize calls to organizations’ help desks by enabling employees to reset their own forgotten passwords through a series of secure questions and images, or through SMS pin code verification.

“While our customers have been benefiting from the reduced help desk costs that are made possible by Password Reset Server for years, we continually strive to provide them with tools that deliver better flexibility for password resets that work best for their environment,” said Jonathan Cogley, founder and CEO of Thycotic. “Through the addition of password synchronization for Office 365 and additional application support on the horizon, administrators of IT help desks will experience greater efficiency, which means reducing costs and freeing up time to focus on other important IT tasks.”

New features in Thycotic Password Reset Server include:

·  Password Synchronization for Office 365: When end-users have disparate passwords across multiple applications and login identities, such as Active Directory and Office 365 applications, the burden of manually resetting passwords in each location can be tiresome and potentially stall productivity. Password Reset Server allows end-users to synchronize Active Directory and Office 365 accounts during a password reset, saving hours of time and provides a secure console for managing one password across all of their major accounts.

·  Help Desk Support: A major update to the Password Reset Server portal provides help desk staff direct login access to the solution for troubleshooting scenarios if end-users have forgotten their security questions and cannot reset the password themselves. The portal also provides additional flexibility for help desk users to perform password resets from remote locations via the Web application.

·  Active Directory Attribute Integration: This integration allows IT administrators to preload answers for users during the setup process taken from user attributes in Active Directory, speeding up time to deploy the tool and reducing the enrollment effort for each end-user.


About Thycotic

Thycotic, a global leader in next-generation IT security solutions, delivers indispensable, comprehensive Privileged Account Management (PAM) and password reset solutions to protect your "keys to the kingdom" from cyber-attacks and increase infrastructure productivity. Unlike any other security offering, Thycotic assures the protection of privileged accounts and provides seamless password resets for end-users while being the fastest to deploy, easiest to use, scalable enterprise-class solution offered at a competitive price. Trusted by more than 3,500 organizations worldwide, including Fortune 500 enterprises, Thycotic is simply your best value for PAM protection and password management. For more information, please visit www.thycotic.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-07-29
Stored XSS can execute as administrator in quarantined email detail view in Sophos UTM before version 9.706.
PUBLISHED: 2021-07-29
An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the ...
PUBLISHED: 2021-07-29
A improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG and Worry-Free Business Security 10.0 SP1 allows a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privile...
PUBLISHED: 2021-07-29
The package glances before 3.2.1 are vulnerable to XML External Entity (XXE) Injection via the use of Fault to parse untrusted XML data, which is known to be vulnerable to XML attacks.
PUBLISHED: 2021-07-29
Dell EMC Avamar Server contains an open redirect vulnerability. A remote unauthenticated attacker may exploit this vulnerability to redirect application users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links.