We will be closed Monday, September 1st in observance of the U.S. Labor Day holiday. More info »

Thycotic Blog

Technical Product Updates and Industry Trends

  • Step-by-Step Guide: Getting Started with Secret Server

    You’ve taken the first step to securing your privileged account passwords by requesting a Secret Server trial. Now what? Don’t worry, the evaluation is simple and fast. To make your life even easier, we prepared a step-by-step guide so you know what to do and who to include in the process. We’ll offer these tips

    Read more →
  • Storing Physical Secrets in Secret Server: The Cipher Lock

    Cipher locks are still widely used today, but a major concern still exists and that’s how to manage and secure them. A cipher lock is a lock that is opened with a programmable keypad that is used to limit and control access to a highly sensitive area. Many organizations use cipher locks to control access

    Read more →
  • Define, Apply & Standardize Security Policies across Secret Server

    When managing sensitive, privileged accounts, the ability to dial down granular policies and controls is imperative for a strong security posture. Secret Server provides a wide landscape of customization for security policies on Secrets. Most configurations can be set at either the Template or the Secret level. This approach provides admins global and granular control

    Read more →
  • Don’t let your company’s social media get hacked: Deploy Secret Server to end-users

    An innocent action performed by an Austrian teen recently affected the Twitter handles of BBC News and CNN accounts. He was experimenting with HTML when he exploited an open vulnerability in TweetDeck, Twitter’s social media management platform. Over 10.1 million of BBC News’s followers received a self-retweeting hack, in just seconds damaging the reputation of

    Read more →
  • Real Time Security with Secret Server and BalaBit IT

    Since Thycotic started in 1996 as an IT consulting company we’ve kept to our roots by listening to customer feedback before implementation, new features and integrations. Based on this feedback, we’ve added many proactive security features to Secret Server over the last few years, things like custom reports and detailed auditing, role-based access, session recording,

    Read more →