• 05 AUG 14

Webinar Recap: What’s New in Secret Server 8.6?

Many of you joined us for our What’s New in Secret Server 8.6 webinar a couple of weeks ago. For customers who missed it, you can watch the recording here. Don’t have time for the full recording? Read on for the key takeaways. Security Polices Now whenever you create a Secret, you can automatically apply

  • 15 JUL 14

Step-by-Step Guide: Getting Started with Secret Server

You’ve taken the first step to securing your privileged account passwords by requesting a Secret Server trial. Now what? Don’t worry, the evaluation is simple and fast. To make your life even easier, we prepared a step-by-step guide so you know what to do and who to include in the process. We’ll offer these tips

  • 10 JUL 14

Storing Physical Secrets in Secret Server: The Cipher Lock

Cipher locks are still widely used today, but a major concern still exists and that’s how to manage and secure them. A cipher lock is a lock that is opened with a programmable keypad that is used to limit and control access to a highly sensitive area. Many organizations use cipher locks to control access

  • 02 JUL 14

Define, Apply & Standardize Security Policies across Secret Server

When managing sensitive, privileged accounts, the ability to dial down granular policies and controls is imperative for a strong security posture. Secret Server provides a wide landscape of customization for security policies on Secrets. Most configurations can be set at either the Template or the Secret level. This approach provides admins global and granular control

  • 01 JUL 14

Don’t let your company’s social media get hacked: Deploy Secret Server to end-users

An innocent action performed by an Austrian teen recently affected the Twitter handles of BBC News and CNN accounts. He was experimenting with HTML when he exploited an open vulnerability in TweetDeck, Twitter’s social media management platform. Over 10.1 million of BBC News’s followers received a self-retweeting hack, in just seconds damaging the reputation of

  • 12 JUN 14

Real Time Security with Secret Server and BalaBit IT

Since Thycotic started in 1996 as an IT consulting company we’ve kept to our roots by listening to customer feedback before implementation, new features and integrations. Based on this feedback, we’ve added many proactive security features to Secret Server over the last few years, things like custom reports and detailed auditing, role-based access, session recording,

  • 10 JUN 14

Video How-to: Customizing Your Company’s Secret Server

If you follow our blog, you’ll know Secret Server version 8.6 includes a new user interface. This week, we’re bringing you a how-to video all about the theme roller. Jacob Stucky, UI Team Lead, walks you through the steps to customize Secret Server with your company’s theme. Theme Roller How-to  Basic Dashboard In addition to

  • 05 JUN 14

SSL: Beyond the Basics Part 4: Strict Transport Security

In our previous post, we discussed SSL certificates and new cryptographic functionality that can be used with modern SSL certificates. Next, we are going to look at how to make sure SSL is always used for web clients in a browser. SSL doesn’t do much for securing browsers if it isn’t used, which is why

  • 03 JUN 14

Secret Server 8.6 is here!

This past week, our team released Secret Server 8.6, complete with a brand new look and feel and assortment of new features. Whether you’ve already upgraded or are planning to do so, here’s an overview of the highlights to check out: UI Updates The most obvious update in version 8.6 is our UI. The look

  • 27 MAY 14

Upcoming webinar: Using authenticated scanning with QualysGuard to uncover hidden security vulnerabilities

This year, there’s been a record number of enterprise data breaches making mainstream media headlines. It’s essential that organizations ranging from small and medium sized businesses to the enterprise secure their most sensitive data. We invite you to join our webinar next week to take a look at the security benefits of performing authenticated vulnerability