Alpha Generation Distribution Ltd is a 4SEC Group Company
Follow us on Twitter Follow us on LinkedIn
Call us on: 01777 852222

Browsing Category "Blog"

Keeping Technology Secure

Published:

4 Tough Realities About Keeping your Technology Secure

We live in an imperfect world. It’s a place where cyber criminals target unsuspecting businesses to steal data, disrupt services and even extort money. A place where your technology is always under attack and risk is ever-present. Why, then, would anyone expect cyber security to be perfect?


Least Privilege Adoption

Published:

The fundamentals of successful least privilege adoption

Avoid the common pitfalls that get in the way of Least Privilege Adoption with Thycotic’s latest eBook. You’ll get a complete guide to what constitutes best practice and where even the best-intentioned programmes fall apart. Now is the time to make your least privilege implementation a success.


Real Time DDoS

Published:

Why every business needs real time DDoS protection

When a business slows you down, or can’t deliver at the speed you want, frustration levels soar. The repercussions in terms of customer experience and lost business can be huge. And the same rules apply in the digital world, whenever your employees or customers need to interact with your technology.


Incident Response

Published:

Why You Need a Response Plan for Privileged Account Incidents

In the average organisation, you probably have very clear plans and processes for a range of worst-case scenarios. From fire to natural disaster, there’s a structured response in place – a strategy for keeping your people safe and getting back to business faster.


Sustainable SAM

Published:

How to Achieve Sustainable SAM

The dynamic, ever-changing nature of most software inventories makes effective SAM hard to maintain. Using the ISO 19970-1:2017 ITAM model, the specialists at Astute Licensing have developed a model for sustainable SAM which reduces risk consistently and continually.


Tackling Licence Overspend

Published:

Five Strategies for Tackling Licence Overspend

Like every area of business, IT is always about balancing outcomes against costs. From your applications to your network hardware, every expense needs to be justifiable and deliver real value to the business. But that’s harder to achieve than it sounds.


User Access Control - PAM

Published:

PAM Isn’t Just About User Access Control

From regulations to best-practice schemes like Cyber Essentials, there’s a lot of pressure for businesses to improve their cyber security posture. Thycotic’s report explores the major Cyber Essentials requirements and how better PAM plays an important role in achieving certification.


Two Sides SAM

Published:

The Two Sides of Software Asset Management

When you think about Software Asset Management, there’s a good chance you’re thinking of tools designed to find software, check against licenses, and maintain your compliance. But that’s just part of the picture.


Good Security Secret

Published:

Why Good Security Is About More Than Strength

In security, we’re always looking for ways to make our layers of protection stronger. The biggest challenges for IT managers isn’t finding good security that works, it’s getting users to follow correct processes to make good use of the protection you’re providing.


Storing Passwords

Published:

Why Storing Passwords in Excel is Risky Business

Using Excel as a means of storage and password sharing creates an entirely new risk to your data and systems. In effect you’re creating a useful centralised source of all your account credentials you’d rather keep secret.


SAM - Reactive Approach to Software Leaves You Exposed

Published:

How a Reactive Approach to Software Leaves You Exposed

While SAM and ITAM tools are valuable, they’re incomplete. The only way to eliminate the risk of a costly true-up is to proactively eliminate non-compliance at the source.

Find out more about Astute Licensing and how you can reduce your software licencing risk.


Privileged Account Hack

Published:

How Attackers Use Your Privileged Accounts

With attackers spending up to 90% of their time analysing your network, your business and your employees, here’s how protecting your privileged accounts must be your number one priority.

Find out more about how privileged account hacks work – and what you can do to lower your risk.


Privileged Password Security Certification Training Course

Published:

Why Knowledge is Power In PAM

Privileged accounts remain the number one target for hackers and malicious insiders alike. Keeping them secure is all about knowledge and understanding.

Responsible for protecting IT security? Get PAM certified in 60 minutes with Thycotic’s Privileged Password Security Training Course.


Privileged Account Management 2018 Report

Published:

Where Privileged Account Management is Really Failing

70% of organisations don’t know about all their privileged accounts, and 40% do nothing at all to discover these accounts.

Read Thycotic’s 2018 Global State of PAM Risk & Compliance Report to see where your password security is weakest – and what you need to do about it.


Memcached Kill Switch

Published:

Corero Discovers Memcached DDoS Kill Switch

With the Corero SmartWall Network Threat Defense System, Corero customers have been benefitting from real-time Memcached attack protection since the very first attacks. In less than two seconds, Smartwall can detect and deflect malicious traffic.


Changing Perceptions of Cybersecurity in the Workplace

Published:

Changing Perceptions of Cybersecurity in the Workplace

For too long, cybersecurity has been perceived as a problem that can easily be solved with the right information and technology. However, as attacks become more widespread and more sophisticated, that perception needs to change, especially in the workplace.


How PAM Supports Your GDPR Compliance

Published:

How PAM Supports Your GDPR Compliance

The clock is ticking for GDPR. If you haven’t already, now is the time to look at your business and see how you can keep personal data safe.

Here’s how having Privileged Account Management will help you understand your current position and what needs changing.


Who's Really Responsible For Cybersecurity

Published:

Who’s Really Responsible for Cybersecurity?

With so many of us eager to pass responsibility when it comes to cybersecurity, the truth is that only one person is responsible. That’s you.

Thycotic have created a free eBook, Cybersecurity for dummies that explains everything you need to know and do to stay secure.


Tell Us What Added Value Should Really Look Like

Published:

Tell Us What Added Value Should Really Look Like

Have your say in our Channel Survey – From sharing product expertise and marketing to forging closer relationships with our resellers, we think it’s that collaborative approach that really sets us apart. And, in the spirit of collaboration, our Channel Survey will help us find out what resellers need from the people that know best.


BlackHat 2017 Report: What has Changed

Published:

Black Hat Report 2017: What has Changed?

Thycotic’s annual Black Hat Survey Report captures the opinions of hackers at the Black Hat Conference. Celebrating its 20th anniversary this year, the event is a hub for security experts and hackers – and a valuable source of intelligence on today’s biggest threats and how businesses can defend themselves.


5 Privileged Account Management Tips from your Attackers

Published:

5 Privileged Account Management Tips from your Attackers

Who is your go-to source of advice on cyber security? Some of us turn to Google. Many of us keep up with the latest industry news. But there’s one group that knows more than anyone about the latest attacks and what makes an attacker’s life difficult: the attackers themselves.


Passwords Need Better Management, Not Replacement

Published:

Passwords Need Better Management, Not Replacement

What is the real impact of innovations like biometrics on the old-fashioned password? Are we really heading to a biometrics-led future and, if so, why should anyone be investing in better password and privileged account security now?


Wanna Cry Monitor

Published:

Ransomware – Don’t Become the Next Victim. #WannaCry

Ransomware has become a major threat and high risk to many individuals and organisations worldwide. It is a very destructive variant of malicious malware that impacts systems and makes critical files and sensitive information inaccessible until a ransom is paid.


Vulnerability Review 2017: At a Glance

Published:

Vulnerability Review 2017: The Facts At A Glance

An insight into the Flexera Software Vulnerability Review 2017 put together by the experts at Secunia Research team. The report analyses a representative portfolio of the 50 most common applications found on endpoints, including both Microsoft and non-Microsoft software.


Closing the Gaps in End-User IT Security

Published:

Closing the Gaps in End-User IT Security

As an IT security reseller, you do much more than take a portfolio of products to your customers. You’re a source of expertise – a trusted advisor who understands the challenges businesses face and the best strategies to overcome them.


How Four Eyes Fits with Cyber Security

Published:

How Four Eyes Fits with Cyber Security

In Privileged Account Management, your goal is to allow administrative access wherever it is required, without losing your overall governance and visibility. And the four eyes principle is, with the right technology, the perfect fit.


What GDPR Means For You Post-Brexit

Published:

What GDPR Means For You Post-Brexit

As we move to our EU exit, it’s tempting to wonder if one of the biggest challenges for IT security – the General Data Protection Regulation, or GDPR – has conveniently disappeared.


A PCI-Compliant Approach to Privileged Passwords

Published:

Privileged Passwords and PCI-Compliance

Network perimeter security is just one part of being PCI compliant. It also covers how to handle accounts and privileged passwords, and their auditability.

How does Thycotic fit in?


The Evolution of DDoS

Published:

DDoS Mitigation. Evolved.

DDoS attacks have evolved. The way we use technology has evolved.

It’s time for DDoS mitigation to change in the same way. It’s time for DDoS Mitigation 3.0


15,000 vulnerabilities in 2014

Published:

15,000 vulnerabilities in 2014

How many affected you? Vulnerabilities are a real threat to your security. Get the best vulnerability intelligence with Flexera Software’s Vulnerability Review 2015