Thycotic Blog

Technical Product Updates and Industry Trends

  • Webinar Recap: What’s New in Secret Server 8.6?

    Many of you joined us for our What’s New in Secret Server 8.6 webinar a couple of weeks ago. For customers who missed it, you can watch the recording here. Don’t have time for the full recording? Read on for the key takeaways. Security Polices Now whenever you create a Secret, you can automatically apply

    Read more →
  • VMworld 2014 Customer Party Details

    This is the blog post you’ve been waiting for… the VMworld party details! This year we wanted to really show our appreciation to you as customers by taking over San Francisco’s only organic brewery, ThirstyBear Brewing Co., and giving you a night of endless food and beer. The Location Just one block from Moscone Convention

    Read more →
  • It’s Here! New Thycotic Website

    Noticed anything different about Thycotic.com? Yes, the website has gone through a complete transformation. Our marketing team has been diligently working to create a user-friendly navigation experience and fresh new look. If you’ve seen us on the road this year, you probably noticed our new look, which we debuted in February at RSA. We continued

    Read more →
  • Step-by-Step Guide: Getting Started with Secret Server

    You’ve taken the first step to securing your privileged account passwords by requesting a Secret Server trial. Now what? Don’t worry, the evaluation is simple and fast. To make your life even easier, we prepared a step-by-step guide so you know what to do and who to include in the process. We’ll offer these tips

    Read more →
  • Storing Physical Secrets in Secret Server: The Cipher Lock

    Cipher locks are still widely used today, but a major concern still exists and that’s how to manage and secure them. A cipher lock is a lock that is opened with a programmable keypad that is used to limit and control access to a highly sensitive area. Many organizations use cipher locks to control access

    Read more →
  • Define, Apply & Standardize Security Policies across Secret Server

    When managing sensitive, privileged accounts, the ability to dial down granular policies and controls is imperative for a strong security posture. Secret Server provides a wide landscape of customization for security policies on Secrets. Most configurations can be set at either the Template or the Secret level. This approach provides admins global and granular control

    Read more →