• 11 NOV 14

Qualys Security Conference 2014: Tension Between Security and IT Operations

In my previous post, ‘Vulnerability Scanning: Is Unauthenticated Scanning Enough?’ I discussed the differences between authenticated and unauthenticated scans, and how Qualys and Thycotic work together to find vulnerabilities for better security. When performing authenticated scans, Qualys uses credentials to find sensitive issues such as malware, patches, incorrect configuration, and other vulnerabilities. It then scans

  • 14 OCT 14

Vulnerability Scanning: Is Unauthenticated Scanning Enough?

Thousands of IT organizations across the world use vulnerability scanners to perform unauthenticated scans and find threats within their network. These scans find basic weaknesses and detect issues within operating systems, open network ports, services listening on open ports, and data leaked by services. This gives companies the ability to see their network from the

  • 27 MAY 14

Upcoming webinar: Using authenticated scanning with QualysGuard to uncover hidden security vulnerabilities

This year, there’s been a record number of enterprise data breaches making mainstream media headlines. It’s essential that organizations ranging from small and medium sized businesses to the enterprise secure their most sensitive data. We invite you to join our webinar next week to take a look at the security benefits of performing authenticated vulnerability

  • 05 NOV 13

Don’t miss our monthly webinars!

Every month, Thycotic hosts a webinar to explore new features, technical integrations and best practices. Last week we discussed a fairly new feature added to Secret Server version 8.3, which has expanded the list of web password changers. Secret Server can now change passwords on Windows Live, Google and Amazon accounts. This means you can