Thycotic Blog

Technical Product Updates and Industry Trends

  • Create an Approval Workflow for Sensitive Secrets

    It’s important to understand how to properly create a workflow in Secret Server for secrets of a sensitive nature. For example, let’s say you have a Secret for the admin account on your production web server. You want to give all your web server administrators access to the Secret, but you only want them to

    Read more →
  • Secret Server iOS 7 Mobile App Upgrade

    As iOS users may have noticed, our Secret Server app received an upgrade with the recent release of iOS 7. The most noticeable sign the app was upgraded is a fresh user interface. However, there are a few other aspects of the latest update that are worth highlighting. View & Edit Restricted Secrets Previously, users

    Read more →
  • The Value of SIEM and How to Integrate with Secret Server

    What is a SIEM tool and why should I use one? SIEM (System Information and Event Management) tools are a type of software that pulls in log and audit information from multiple sources across your network. This can include access logs for building entry, computers, servers, network devices, databases and applications. SIEM tools can aggregate

    Read more →
  • Using Secret Server to Help Maintain Compliance Mandates

    Secret Server is a powerful, flexible tool which can help your organization meet a variety of compliance mandates, such as SOX, PCI, HIPAA and more. In this article we are going to review several ways you can utilize Secret Server to maintain compliance by securely managing your privileged account credentials. Centralizing Your Sensitive Information Before

    Read more →
  • Integration Spotlight – Secret Server and Devolutions Remote Desktop Manager

      In this week’s webinar we will be diving into the integration of Devolutions Remote Desktop Manager and Secret Server. Since the software integration in 2011, users have been securing their credentials through Secret Server and remote connections using Remote Desktop Manager after several client requests. Since then, administrators have been able to use both

    Read more →
  • Securing Web Browsers Through Group Policy

    When developing a workflow to manage shared credentials, it’s important to take into account certain environmental factors that may cache credentials on their own. These factors can decrease security around shared credentials. This week, we’ll focus on securing your web browsers through group policy. Disable Password Caching for IE Note: these instructions are specific to

    Read more →