Beyond Security Blog
world globe news press release concept with blue gradation vector

beSECURE Partners With Thycotic to Simplify Credentialed Scanning and Privileged Password Management

beSECURE has partnered with Thycotic Secret Server to offer both credentialed scanning and PAM solutions.

This article was originally published on EIN Presswire on October 21, 2019.

SACRAMENTO, CALIFORNIA, UNITED STATES, October 21, 2019 /EINPresswire.com/ — Beyond Security, a pioneer in automated penetration testing and vulnerability scanning, announced today that it has partnered with Thycotic, a global leader in Privileged Account Management (PAM) solutions. The partnership offers a seamless integration between Beyond Security’s beSECURE customers and Thycotic Secret Server to simplify credentialed scanning and privileged account security.

“We’re happy to partner with Thycotic, a comprehensive yet easy-to-use privileged account management (PAM) solution,” said Aviram Jenik, Beyond Security co-founder and CEO. “Thycotic Secret Server and beSECURE both share the “easy-to-deploy and easy-to-use” philosophy for secure, effective and immediate policy-based security testing on entire networks.”

For large enterprise environments, “authenticated scans” can be difficult to configure since credentials need to be provided for the scan to work well. Gaining these credentials may be difficult or slow as many enterprises are now using zero trust architecture with multiple levels of access or have constantly changing usernames and passwords.“ The integration with Thycotic will provide our users with a central place for storing usernames, passwords and SSH certificates,” added Noam Rathaus, Beyond Security co-founder and CTO. “This allows security administrators to rotate passwords and/or certificates used for login without needing to update beSECURE with the updated credentials – which improves their security posture.”

Beyond Security’s beSECURE customers will now have easy access to the Secret Server vault every time they need to retrieve passwords for credentialed scanning. This will increase both efficiency and security when using privileged accounts for vulnerability assessments. This type of “authenticated scan” is more in-depth and can detect policy violations, missing patches and other security issues not detectable via a regular scan.

Beyond Security

Beyond Security is a global leader in automated vulnerability assessment and compliance solutions – enabling businesses and governments to accurately assess and manage security weaknesses in their networks, applications, industrial systems and networked software at a fraction of the cost of human-based penetration testing.

Contact Us
Want to learn more? Fill out the form below and we'll be in touch shortly.
By clicking Submit, I agree to the use of my personal data in accordance with the Beyond Security Privacy Policy. Beyond Security will not sell, trade, lease, or rent your personal data to third parties.
Vector image of purple colored handshake icon

Affected by Covid-19? Get free vulnerability scanning.

Before You go

Take a second to book a demo. Learn how to secure your networks & applications.

We'll be in touch!

We now have the ability to scan at any time...like having sonar on our own network. We always know what is going on around us.”

man-img

Mike Gutknecht, Spectrum Brands