• 20 OCT 15

Why Authenticated Scanning Matters, and How To Do It Right

Earlier this month, a few of us from Thycotic attended the Qualys Security Conference (QSC) and had the opportunity to speak at one of their spotlight sessions regarding authenticated scanning and how to do it right with Thycotic Secret Server. Amazingly, in speaking with several of the attendees there, we discovered that many of them

  • 11 NOV 14

Qualys Security Conference 2014: Tension Between Security and IT Operations

In my previous post, ‘Vulnerability Scanning: Is Unauthenticated Scanning Enough?’ I discussed the differences between authenticated and unauthenticated scans, and how Qualys and Thycotic work together to find vulnerabilities for better security. When performing authenticated scans, Qualys uses credentials to find sensitive issues such as malware, patches, incorrect configuration, and other vulnerabilities. It then scans

  • 14 OCT 14

Vulnerability Scanning: Is Unauthenticated Scanning Enough?

Thousands of IT organizations across the world use vulnerability scanners to perform unauthenticated scans and find threats within their network. These scans find basic weaknesses and detect issues within operating systems, open network ports, services listening on open ports, and data leaked by services. This gives companies the ability to see their network from the

  • 05 NOV 13

Don’t miss our monthly webinars!

Every month, Thycotic hosts a webinar to explore new features, technical integrations and best practices. Last week we discussed a fairly new feature added to Secret Server version 8.3, which has expanded the list of web password changers. Secret Server can now change passwords on Windows Live, Google and Amazon accounts. This means you can