Thycotic Blog

Technical Product Updates and Industry Trends

  • Real Time Security with Secret Server and BalaBit IT

    Since Thycotic started in 1996 as an IT consulting company we’ve kept to our roots by listening to customer feedback before implementation, new features and integrations. Based on this feedback, we’ve added many proactive security features to Secret Server over the last few years, things like custom reports and detailed auditing, role-based access, session recording,

    Read more →
  • Video How-to: Customizing Your Company’s Secret Server

    If you follow our blog, you’ll know Secret Server version 8.6 includes a new user interface. This week, we’re bringing you a how-to video all about the theme roller. Jacob Stucky, UI Team Lead, walks you through the steps to customize Secret Server with your company’s theme. Theme Roller How-to  Basic Dashboard In addition to

    Read more →
  • SSL: Beyond the Basics Part 4: Strict Transport Security

    In our previous post, we discussed SSL certificates and new cryptographic functionality that can be used with modern SSL certificates. Next, we are going to look at how to make sure SSL is always used for web clients in a browser. SSL doesn’t do much for securing browsers if it isn’t used, which is why

    Read more →
  • Secret Server 8.6 is here!

    Secret Server 8.6 is here!

    This past week, our team released Secret Server 8.6, complete with a brand new look and feel and assortment of new features. Whether you’ve already upgraded or are planning to do so, here’s an overview of the highlights to check out: UI Updates The most obvious update in version 8.6 is our UI. The look

    Read more →
  • Upcoming webinar: Using authenticated scanning with QualysGuard to uncover hidden security vulnerabilities

    This year, there’s been a record number of enterprise data breaches making mainstream media headlines. It’s essential that organizations ranging from small and medium sized businesses to the enterprise secure their most sensitive data. We invite you to join our webinar next week to take a look at the security benefits of performing authenticated vulnerability

    Read more →