Storing Physical Secrets in Secret Server: The Cipher Lock
Cipher locks are still widely used today, but a major concern still exists and that’s how to manage and secure them. A cipher lock is a lock that is opened with a programmable keypad that is used to...
View ArticleStep-by-Step Guide: Getting Started with Secret Server
You’ve taken the first step to securing your privileged account passwords by requesting a Secret Server trial. Now what? Don’t worry, the evaluation is simple and fast. To make your life even easier,...
View ArticleWebinar Recap: What’s New in Secret Server 8.6?
Many of you joined us for our What’s New in Secret Server 8.6 webinar a couple of weeks ago. For customers who missed it, you can watch the recording here. Don’t have time for the full recording? Read...
View ArticleSecret Server: The Getting Started Guide for End-Users
In our recent blog post, Don’t let your company’s social media get hacked: Deploy Secret Server to end-users, you learned about our new Basic User Dashboard and how to administer Secret Server to your...
View ArticleVMworld Sneak Peek: ESX Discovery
With VMworld 2014 just a week away, we wanted to showcase a special VMware announcement this week. Introducing, advanced capabilities in VMware hypervisor environments coming with the Secret Server 8.7...
View ArticleVulnerability Scanning: Is Unauthenticated Scanning Enough?
Thousands of IT organizations across the world use vulnerability scanners to perform unauthenticated scans and find threats within their network. These scans find basic weaknesses and detect issues...
View ArticlePredicting Potential Threat: Behavior Analytics & Threat Modeling
Wouldn’t it be nice to be able to identify a potential threat before it happens? Learn how Secret Server uses threat modeling and behavioral analytics to discover and take immediate action on a threat,...
View ArticleQualys Security Conference 2014: Tension Between Security and IT Operations
In my previous post, ‘Vulnerability Scanning: Is Unauthenticated Scanning Enough?’ I discussed the differences between authenticated and unauthenticated scans, and how Qualys and Thycotic work together...
View ArticleThe Top Three Ways Personally Identifiable Information is Leaked in Healthcare
Personally identifiable information (PII) related to healthcare data is 50x more valuable on the black market than credit card data according to Alert Logic. Forty three percent of all identity thefts...
View ArticleUnlock the Secrets of Secret Server at UNLOCKED Conference
Do you love Secret Server as much as we do? If so, don’t miss your opportunity to join us for our first user conference, UNLOCKED, on Sunday, May 3rd. This is your chance to connect with other Secret...
View ArticleSneak Peek! New Secret Server user interface coming in version 8.6.
One more reason to follow our blog – you get to see product features before they are released! Our next release is coming later this month, and it includes a big change: a brand new UI that we think...
View ArticleSSL: Beyond the Basics Part 2: Ciphers
In our previous post, we discussed the different protocols for SSL and TLS, and how we can improve security by disabling older, less secure protocols and enabling newer, more secure ones. Today, we...
View ArticleDisaster Recovery 101: Part 2
So you’ve taken measures to protect and preserve your information – now how do you restore it in a disaster? Part 2 of our Disaster Recovery series explains how you can quickly restore a working copy...
View ArticleUpcoming webinar: Using authenticated scanning with QualysGuard to uncover...
This year, there’s been a record number of enterprise data breaches making mainstream media headlines. It’s essential that organizations ranging from small and medium sized businesses to the enterprise...
View ArticleSecret Server 8.6 is here!
This past week, our team released Secret Server 8.6, complete with a brand new look and feel and assortment of new features. Whether you’ve already upgraded or are planning to do so, here’s an overview...
View ArticleVideo How-to: Customizing Your Company’s Secret Server
If you follow our blog, you’ll know Secret Server version 8.6 includes a new user interface. This week, we’re bringing you a how-to video all about the theme roller. Jacob Stucky, UI Team Lead, walks...
View ArticleReal Time Security with Secret Server and BalaBit IT
Since Thycotic started in 1996 as an IT consulting company we’ve kept to our roots by listening to customer feedback before implementation, new features and integrations. Based on this feedback, we’ve...
View ArticleDefine, Apply & Standardize Security Policies across Secret Server
When managing sensitive, privileged accounts, the ability to dial down granular policies and controls is imperative for a strong security posture. Secret Server provides a wide landscape of...
View ArticleDon’t let your company’s social media get hacked: Deploy Secret Server to...
An innocent action performed by an Austrian teen recently affected the Twitter handles of BBC News and CNN accounts. He was experimenting with HTML when he exploited an open vulnerability in TweetDeck,...
View ArticleStoring Physical Secrets in Secret Server: The Cipher Lock
Cipher locks are still widely used today, but a major concern still exists and that’s how to manage and secure them. A cipher lock is a lock that is opened with a programmable keypad that is used to...
View Article