sb-as logo
Story image

emt Distribution inks deal for Thycotic enterprise password management solution

Emt Distribution has inked a deal with United States privileged account management solution vendor Thycotic which sees it become the company’s master distributor for Asia Pacific.

The deal will see the distributor, which has its Asia Pacific headquarters in Adelaide, providing Thycotic’s privileged account management solution exclusively through resellers, managed services providers, systems integrators, security and compliance consultants and outsourcing companies, across Asia Pacific.

Thycotic says it has more than 7,500 customers worldwide, with a customer base that includes Fortune 500 enterprises.

Emt says it has added five new sales and support members, including pre-sales engineers, based in Australia and dedicated to Thycotic, to meet demand.

Simon Azzopardi, Thycotic international vice president, says privileged account management is one of the top four mitigation strategies used to meet the needs of the Australian Signals Directorate’s Top 4 Strategies to mitigate targeted cyber intrusions, alongside application whitelisting, patching applications, patching operating systems.

Combined, the four solutions mitigate more than 85% of intrusion techniques the Australian Cyber Security Centre responds to.

“It is the perfect opportunity for our channel partners in the region to be seen as trusted advisors,” Azzopardi says.

Scott Hagenus, emt chief marketing officer, says demand for privileged account management solutions is growing rapidly among government and enterprise organisations, with SMBs and mid-tier enterprises not far behind.

“Organisations are waking up to the fact that traditional cyber security defences like firewalls and anti-malware are struggling to combat the rising tide of targeted attacks,” Hagenus says.

“Privileged accounts are the keys to the kingdom. Organisations need to know how many human and non-human privileged accounts they have, who has access to them, restrict that access and lock down the passwords that protect them.

“Putting it in plain terms, you can have the best locks in the world, but they won’t help if you leave the keys under the doormat.”

Story image
Zscaler and CrowdStrike release integrations for end-to-end security
This collaboration between the two cloud-native security companies provides joint customers with adaptive, risk-based access control to private applications.More
Story image
New wormable Android malware discovered through auto-replies in WhatsApp
Check Point Research has discovered new malware on Google’s Play Store that could spread through WhatsApp messages. More
Story image
Kroll completes Redscan acquisition, expands cyber risk portfolio
With the addition of Redscan and its extended detection and response (XDR) enabled security operations centre (SOC) platform, Kroll expands its Kroll Responder capabilities to support a wider array of cloud and on-premise telemetry sources.More
Story image
Mobile devices biggest enterprise security threat - report
Businesses have left themselves vulnerable and open to cyber criminals in the rush to ensure their workforce could operate remotely during the Covid-19 pandemic.More
Story image
Video: 10 Minute IT Jams - Radware VP on the challenges of cloud security
In this interview, Techday speaks to Radware vice president of technologies Yaniv Hoffman, who discusses the primary challenges facing IT organisations in terms of their cloud security apparatus.More
Story image
IT leaders prioritising automation, Zero Trust and API-based security investments
"The study shows that a cocktail of multiplying threats, the proliferation of hybrid and cloud architectures, blended with a pandemic-fuelled explosion in distributed and remote work has created a perfect storm for network security teams."More