• 09 OCT 15

Go from Last to First: Why Thycotic is the #1 Password Management Tool chosen by IT admins

It’s no surprise that passwords are the number one target for attackers to achieve success during any data breach. Password management has been a major discussion for IT professionals for years, and as the battle between efficiency and security rages on between security and operations teams, the idea of password management often becomes a point

  • 26 AUG 15

What’s New in Secret Server 8.9?

Secret Server 8.9 looks to answer a few important discussion points that have been around the application for a while now. First, a popular customer request – more granularity of permissions. Next, scalability and efficiency of network operations – the birth of Distributed Engine. And finally, a level of security for RDP launchers to match

  • 14 JUL 15

Up, up and away: How Distributed Engine technology helps Thycotic scale privileged account management for large enterprises

Why Distributed Engine? When you run Discovery, Password Changing, or Heartbeat in Thycotic Secret Server, all the work is queued up inside the web application. This requires no additional configuration and works well out of box. Something we strive for is to make Secret Server easy to configure and get working quickly, but also powerful

  • 24 MAR 15

Unlock the Secrets of Secret Server at UNLOCKED Conference

Do you love Secret Server as much as we do? If so, don’t miss your opportunity to join us for our first user conference, UNLOCKED, on Sunday, May 3rd. This is your chance to connect with other Secret Server power users and our privileged account management experts. I’ll let you in on a little secret-

  • 03 MAR 15

The Top Three Ways Personally Identifiable Information is Leaked in Healthcare

Personally identifiable information (PII) related to healthcare data is 50x more valuable on the black market than credit card data according to Alert Logic. Forty three percent of all identity thefts in the United States in 2013 were accounted to medical related identity theft (Logic, 2014). The healthcare industry knows they need to protect PII. It’s

  • 11 NOV 14

Qualys Security Conference 2014: Tension Between Security and IT Operations

In my previous post, ‘Vulnerability Scanning: Is Unauthenticated Scanning Enough?’ I discussed the differences between authenticated and unauthenticated scans, and how Qualys and Thycotic work together to find vulnerabilities for better security. When performing authenticated scans, Qualys uses credentials to find sensitive issues such as malware, patches, incorrect configuration, and other vulnerabilities. It then scans

  • 21 OCT 14

Predicting Potential Threat: Behavior Analytics & Threat Modeling

Wouldn’t it be nice to be able to identify a potential threat before it happens? Learn how Secret Server uses threat modeling and behavioral analytics to discover and take immediate action on a threat, stopping an attacker in their tracks. Threat Modeling The term “threat modeling” has become quite popular lately as an upcoming major

  • 14 OCT 14

Vulnerability Scanning: Is Unauthenticated Scanning Enough?

Thousands of IT organizations across the world use vulnerability scanners to perform unauthenticated scans and find threats within their network. These scans find basic weaknesses and detect issues within operating systems, open network ports, services listening on open ports, and data leaked by services. This gives companies the ability to see their network from the

  • 19 AUG 14

VMworld Sneak Peek: ESX Discovery

With VMworld 2014 just a week away, we wanted to showcase a special VMware announcement this week. Introducing, advanced capabilities in VMware hypervisor environments coming with the Secret Server 8.7 release. This week’s post is a deep dive into the new ESX/ESXi discovery capabilities. Learn how your team can automatically discover and begin to manage

  • 12 AUG 14

Secret Server: The Getting Started Guide for End-Users

In our recent blog post, Don’t let your company’s social media get hacked: Deploy Secret Server to end-users, you learned about our new Basic User Dashboard and how to administer Secret Server to your end users. We wanted to make getting started with Secret Server simple and straightforward for your end users. Share this blog