Thycotic will be closed Thursday and Friday, Nov. 26th and 27th for the Thanksgiving holiday. More info »

  • 16 NOV 15

5 Reasons you’ll love Thycotic’s Free Privileged Password Security Policy Template

Privileged accounts are a favorite target for hackers—it’s critical that your organization’s IT Admins have a password protection policy in place to prevent attacks. So Thycotic and Information Shield partnered to create an easy-to-use, free password security policy template for organizations that do not yet have an official privileged account management policy. Don’t have a

  • 20 OCT 15

Why Authenticated Scanning Matters, and How To Do It Right

Earlier this month, a few of us from Thycotic attended the Qualys Security Conference (QSC) and had the opportunity to speak at one of their spotlight sessions regarding authenticated scanning and how to do it right with Thycotic Secret Server. Amazingly, in speaking with several of the attendees there, we discovered that many of them

  • 09 OCT 15

Go from Last to First: Why Thycotic is the #1 Password Management Tool chosen by IT admins

It’s no surprise that passwords are the number one target for attackers to achieve success during any data breach. Password management has been a major discussion for IT professionals for years, and as the battle between efficiency and security rages on between security and operations teams, the idea of password management often becomes a point

  • 05 OCT 15

New Enterprise Ticketing System Integrations Available for BMC Software and ServiceNow in Secret Server

The ability to automatically respond to and track Secret Server privileged user activity in enterprise ticketing systems is a huge benefit for our customers, because it removes the manual burden of updating and closing out tickets based on what privileged users are doing within the solution. That’s why the latest update to Secret Server now

  • 26 AUG 15

What’s New in Secret Server 8.9?

Secret Server 8.9 looks to answer a few important discussion points that have been around the application for a while now. First, a popular customer request – more granularity of permissions. Next, scalability and efficiency of network operations – the birth of Distributed Engine. And finally, a level of security for RDP launchers to match

  • 14 JUL 15

Up, up and away: How Distributed Engine technology helps Thycotic scale privileged account management for large enterprises

Why Distributed Engine? When you run Discovery, Password Changing, or Heartbeat in Thycotic Secret Server, all the work is queued up inside the web application. This requires no additional configuration and works well out of box. We strive to make Secret Server easy to configure and get working quickly, but also powerful enough that when

  • 11 NOV 14

Qualys Security Conference 2014: Tension Between Security and IT Operations

In my previous post, ‘Vulnerability Scanning: Is Unauthenticated Scanning Enough?’ I discussed the differences between authenticated and unauthenticated scans, and how Qualys and Thycotic work together to find vulnerabilities for better security. When performing authenticated scans, Qualys uses credentials to find sensitive issues such as malware, patches, incorrect configuration, and other vulnerabilities. It then scans

  • 14 OCT 14

Vulnerability Scanning: Is Unauthenticated Scanning Enough?

Thousands of IT organizations across the world use vulnerability scanners to perform unauthenticated scans and find threats within their network. These scans find basic weaknesses and detect issues within operating systems, open network ports, services listening on open ports, and data leaked by services. This gives companies the ability to see their network from the

  • 19 AUG 14

VMworld Sneak Peek: ESX Discovery

With VMworld 2014 just a week away, we wanted to showcase a special VMware announcement this week. Introducing, advanced capabilities in VMware hypervisor environments coming with the Secret Server 8.7 release. This week’s post is a deep dive into the new ESX/ESXi discovery capabilities. Learn how your team can automatically discover and begin to manage

  • 05 AUG 14

Webinar Recap: What’s New in Secret Server 8.6?

Many of you joined us for our What’s New in Secret Server 8.6 webinar a couple of weeks ago. For customers who missed it, you can watch the recording here. Don’t have time for the full recording? Read on for the key takeaways. Security Polices Now whenever you create a Secret, you can automatically apply