Predict your next investment

Thycotic Software company logo
COMPUTER HARDWARE & SERVICES | IT Services / Data Storage & Security

See what CB Insights has to offer

Founded Year



Merger | Alive

Total Raised


About Thycotic Software

Thycotic deploys smart, reliable, IT security solutions that empower companies to control and monitor privileged account credentials and identity access for administrators and end-users. Thycotic IT security and password management solutions empower companies to remove the complexities associated with proper access control and management of privileged accounts.On April 13th, 2021, Thycotic Software merged with Centrify.

Thycotic Software Headquarter Location

1101 17th Street NW Suite 1102

Washington, DC, 20036,

United States


Latest Thycotic Software News

2021 State of Ransomware Report Reveals 83% of Victims Paid to Get Data Restored

Oct 19, 2021

Research by ThycoticCentrify shows a majority of organizations experienced a ransomware attack, while 93% are allocating special budget to fight growing threats REDWOOD CITY, Calif. and WASHINGTON, DC — Oct. 19, 2021 — ThycoticCentrify, a leading provider of cloud identity security solutions formed by the merger of privileged access management (PAM) leaders Thycotic and Centrify, today released new research confirming that ransomware has become a preferred method for cyberattacks, with nearly two out of three companies (64%) surveyed admitting to be victims of a ransomware attack in the last 12 months. The report, titled “2021 State of Ransomware Survey & Report: Preventing and Mitigating the Skyrocketing Costs and Impacts of Ransomware Attacks,” is based on survey responses from 300 U.S. based IT business decision makers. It further reveals that more than four out of five  (83%) ransomware attack victims felt they had no choice but to pay ransom demands to restore their data. The report highlights how organizations are responding to the growing threats from ransomware attacks, including: 72% have seen cybersecurity budgets increase due to ransomware threats 93% are allocating special budget to fight ransomware threats 50% said they experienced loss of revenue and reputational damage from an attack 42% indicated they had lost customers as a result of an attack “Our research shows ransomware is a threat to organizations of all sizes and levels of sophistication,” said Art Gilliland, CEO at ThycoticCentrify. “The first line of defense should be solutions that secure privileged access, including multi-factor authentication (MFA) and other methods of enforcing Zero Trust, to keep would-be cyber criminals contained and limit the damage they can inflict.” The report features three main takeaways with recommendations and resources to help mitigate damage from an attack. With so many organizations victimized by ransomware attacks, it is more important than ever that organizations prioritize creating an incident response plan to avoid being added to the growing list that have paid the ransom demand. While increasing cybersecurity budgets for network and cloud security solutions, organizations must also understand and prioritize the requirements for preventing exploit escalation with PAM security that enforces least privileged access. Preventing ransomware attacks by practicing basic cybersecurity hygiene such as regular backups, timely patching, MFA, and password protection is essential. However, PAM policies that make least privileged access a priority enable security teams to identify the attack entry point, understand what happened, help remediate, and ultimately protect restored data. A complimentary copy of the full 14-page report can be downloaded at . Follow ThycoticCentrify on Twitter and LinkedIn to learn more. About the 2021 State of Ransomware Survey & Report The report is based on responses from 300 IT Business Decision Makers in the U.S. to a survey conducted in July 2021 by Censuswide, a global research company. About ThycoticCentrify   ThycoticCentrify is a leading cloud identity security vendor, enabling digital transformation at scale. ThycoticCentrify’s industry-leading privileged access management (PAM) solutions reduce risk, complexity, and cost while securing organizations’ data, devices, and code across cloud, on-premises, and hybrid environments. ThycoticCentrify is trusted by over 14,000 leading organizations around the globe including over half of the Fortune 100, and customers include the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies. © Thycotic Software, LLC and Centrify Corporation 2021. ®Centrify and ®Thycotic are registered trademarks of Centrify Corporation and Thycotic Software, LLC respectively. All other trademarks are property of their respective owners. Contacts Email*

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Expert Collections containing Thycotic Software

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Thycotic Software is included in 1 Expert Collection, including Cybersecurity.



4,767 items

Thycotic Software Web Traffic

Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

Thycotic Software Rank

CB Insights uses Cookies

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.