MAR.19 - 21

臺北國際會議中心 & 世貿一館 2 樓



Thycotic 為全球發展最快的資安公司之一,成立於 1996 年,總部位於美國華盛頓 DC,全球員工逾 300 人,100% 專注於特權帳號管理技術之開發,廣受全球逾萬家企業組織青睞。


Thycotic 特權帳號管理解決方案彈性且架構單純、建置便捷,導入時程短且易維護,具備特權帳號代登、密碼自動變更、簽核流程控管、特權行為分析、支援雙因認證、內部稽核報表等功能,有效保護端點和應用系統之存取,以防止駭客或惡意取得特權帳號權限進行攻擊。

Privilege ManagementAuthenticationPassword Management

Thycotic 特權帳號管理解決方案

Thycotic 為特權帳號安全管理市場領導者,其PAM 解決方案包含:Thycotic Secret Server - 專事 Privileged Access & Password Management,以及 Thycotic Privilege Manager - 專事 Least Privilege & Application Control。Thycotic 系統架構單純、建置便捷、功能完整,管理介面直覺化,極適合台灣各類型客戶對於 PAM、PIM 之應用需求。


Thycotic 屢獲市場與國際大獎肯定,2017 年前 500 大資安解決方案公司名列 #13,PAM類別排名 No.1; 2018 年 The Forrester Wave™ 評選為市場領導者,Gartner Peer Insights: Customers’ Choice 獲 4.5 顆星,並獲得 Cyber Security Excellence Awards, Info Security Products Guide, Cyber Defense Global Awards, Astors American Security Today 四項大獎。


Thycotic Secret Server 具備特權帳號代登、密碼自動變更、簽核流程控管、特權行為分析、支援雙因認證、內部稽核報表等功能,有效保護端點和應用系統之存取,以防止駭客或惡意取得特權帳號權限進行攻擊,並提供快速偵查、盤點、監控、稽核、保護特權帳號登入與密碼管理之機制。


  1. 確保企業組織內特權帳號之安全性,降低違規行為或內部威脅所導致之風險。
  2. 預防、隔離或限制惡意程式利用特權帳號進行攻擊之可能性。
  3. 提升特權帳號管理及操作人員之作業效率。
  4. 降低違反法令遵循或稽核缺失之可能性 - 稽核人員對於特權帳號極為重視,法規亦強制要求企業組織必須針對特權帳號之存取留有完整稽核軌跡。
  5. 可針對使用特權帳號之約聘人員、廠商及其他服務提供有效且以角色為基礎之控管。
  6. 自動搜查特權帳號並可自動進行密碼變更,包括:微軟本機帳號及服務、應用系統、Unix、Linux 及雲端服務多種平台之帳號等。
  7. 內建多種稽核報告,符合內部遵循之需求。
  • Privileged Account Management for Dummies

    With so many recent high-profile breaches accomplished through the compromise of passwords on privileged accounts, it’s time all cyber security stakeholders got educated.

    This free, 24-page book, Privileged Account Management for Dummies, gives you, your IT staff, and business stakeholders a practical understanding of privileged account management and its security implications.

  • The Top 5 Privileged Account Security Reports CISOs Live For

    Hackers today are targeting your privileged account credentials for good reason. Once they gain access, they can advance from an initial breach, escalating their privileges and moving through your network to identify and compromise confidential information. Hijacking the privileged credentials of an authorized user, an attacker can easily blend in with legitimate traffic and be extremely difficult to detect.

  • Move Beyond GPO for Next-Level Privilege Management

    Group Policy Object offers a good starting point for privilege management. However, as your organization grows and your privilege management needs become more diverse, relying exclusively on GPO can be cumbersome.

  • Boost Your Endpoint Security with a Least Privilege Strategy

    By taking advantage of new options for implementing least privilege, including some of Microsoft’s built-in tools. This free white paper gives you a digestible overview of what it takes to create the most effective and enforceable endpoint security strategy when moving to Windows 10.

Introducing Secret Server Vault: Privileged Account Protection for Every Small and Medium-Sized Business

With the introduction of Secret Server Vault, Thycotic makes it possible for every SMB to move beyond typical personal password managers to implement an affordable, easy to deploy and maintain Privileged Account Management (PAM) solution. Thycotic product manager Dan Ritch will compare Secret Server Vault with common password manager tools using real-life examples to show how your organization can save time and gain improved security.

Introduction to Thycotic Privilege Manager

85% of data breaches start on user computers. Block Social Engineering Attacks, Malware, and Ransomware at the Gate.

WATCH this quick 2 minute overview of how Privilege Manager makes your least privilege project successful through application control -- giving you a solution that's easy for IT Support and seamless for business users.

Thycotic’s Privileged Access Management Tools for IT Security and IT Ops

Jacob Stucky, VP of Software Development at Thycotic, on enterprise-level privileged access management. How an attacker breaches networks today, what they are looking for, and the best steps to secure and prevent attacks.


Privilege ManagementAuthenticationPassword Management