Thycotic Blog

Technical Product Updates and Industry Trends

  • Disaster Recovery 101: Part 2

    So you’ve taken measures to protect and preserve your information – now how do you restore it in a disaster? Part 2 of our Disaster Recovery series explains how you can quickly restore a working copy of Secret Server in the case that your primary instance of Secret Server fails. Note that the following steps

    Read more →
  • SSL: Beyond the Basics Part 2: Ciphers

    In our previous post, we discussed the different protocols for SSL and TLS, and how we can improve security by disabling older, less secure protocols and enabling newer, more secure ones. Today, we will talk about ciphers, which is one of the key pieces to making these protocols work. Here’s a quick refresher from last

    Read more →
  • Sneak Peek! New Secret Server user interface coming in version 8.6.

    One more reason to follow our blog – you get to see product features before they are released!  Our next release is coming later this month, and it includes a big change: a brand new UI that we think you’re going to love. If you’re lucky to be at Microsoft TechEd in Houston this week,

    Read more →
  • SSL: Beyond the Basics

    Part 1: Protocol Selection Here at Thycotic we have a wide range of recommended security best practices for our customers, and one of the first things we recommend is setting up SSL, or Secure Socket Layer, for Secret Server. Setting up SSL is fairly trivial once an SSL certificate is obtained. Once it’s set up,

    Read more →
  • Thycotic Webinar: Proactive Security Strategies for IT Teams

    Get ready Houston, TechEd North America is coming to town! With Microsoft’s premier technology conference kicking off in less than a week we wanted to do something special to get everyone ready for one of the biggest IT events of the year. That’s why we invited our special guest, veteran TechEd session leader and Microsoft

    Read more →
  • Don’t be the next target! Insider Threat Webinar: Tuesday, May 6 2014

    What is the biggest threat to your sensitive information? The security breaches at Shionogi Pharmaceuticals, South Carolina Department of Revenue and the United Way weren’t caused by external threats – they were initiated by an insider; a seemingly trustworthy employee or ex-employee of the company that had privileged account credentials allowing access to the organization’s

    Read more →