Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

10/13/2015
09:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Enhanced Help Desk Support and Password Synchronization for Office 365 Added to Thycotic Password Reset Server

Self-service password reset tool for end-users now offers increased flexibility and ease-of-use for organizations of all sizes

October 13, 2015 – Washington, D.C. – Thycotic, a provider of smart and effective password reset solutions for global organizations, today announced the availability of the latest version of Thycotic Password Reset Server, a self-service password reset tool designed for end-users. The latest version of the tool will feature customizable role-based access control, password synchronization support for Microsoft Office 365, as well as a new help desk support portal.

Password Reset Server makes it easier than ever for non-technical end-users within an organization to reset their Active Directory passwords directly from the login screen or via a web browser for remote staff. The solution is designed to greatly minimize calls to organizations’ help desks by enabling employees to reset their own forgotten passwords through a series of secure questions and images, or through SMS pin code verification.

“While our customers have been benefiting from the reduced help desk costs that are made possible by Password Reset Server for years, we continually strive to provide them with tools that deliver better flexibility for password resets that work best for their environment,” said Jonathan Cogley, founder and CEO of Thycotic. “Through the addition of password synchronization for Office 365 and additional application support on the horizon, administrators of IT help desks will experience greater efficiency, which means reducing costs and freeing up time to focus on other important IT tasks.”

New features in Thycotic Password Reset Server include:

·  Password Synchronization for Office 365: When end-users have disparate passwords across multiple applications and login identities, such as Active Directory and Office 365 applications, the burden of manually resetting passwords in each location can be tiresome and potentially stall productivity. Password Reset Server allows end-users to synchronize Active Directory and Office 365 accounts during a password reset, saving hours of time and provides a secure console for managing one password across all of their major accounts.

·  Help Desk Support: A major update to the Password Reset Server portal provides help desk staff direct login access to the solution for troubleshooting scenarios if end-users have forgotten their security questions and cannot reset the password themselves. The portal also provides additional flexibility for help desk users to perform password resets from remote locations via the Web application.

·  Active Directory Attribute Integration: This integration allows IT administrators to preload answers for users during the setup process taken from user attributes in Active Directory, speeding up time to deploy the tool and reducing the enrollment effort for each end-user.

 

About Thycotic

Thycotic, a global leader in next-generation IT security solutions, delivers indispensable, comprehensive Privileged Account Management (PAM) and password reset solutions to protect your "keys to the kingdom" from cyber-attacks and increase infrastructure productivity. Unlike any other security offering, Thycotic assures the protection of privileged accounts and provides seamless password resets for end-users while being the fastest to deploy, easiest to use, scalable enterprise-class solution offered at a competitive price. Trusted by more than 3,500 organizations worldwide, including Fortune 500 enterprises, Thycotic is simply your best value for PAM protection and password management. For more information, please visit www.thycotic.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...