• 25 MAR 14

Introducing Secret Server 8.5 Pt. 1: Session Recording Retention and Session Monitoring

Secret Server 8.5 adds a number of new features and functionality. These new features are pretty awesome, so we decided this release deserves a little extra showcasing. Check back each week through April to learn something new about 8.5 and how it will increase your team’s overall security and productivity. Today we are going to

  • 18 MAR 14

IT’s TIME: Update Those Security Settings with PowerShell

Secret Server 8.4, released in January, included additional ways to update Secret security settings via the web services API. This week, we’ll show you how to use PowerShell to access the Secret Server web services API and configure security settings for Secrets. Web Service security settings: What’s available? The web services API can help you

  • 11 MAR 14

Bam! Thycotic now integrates with Tenable Security’s Log Correlation Engine

In a continuation of our discussion around the strengths of combining secure privileged account management with SIEM capabilities, we’re excited to announce our new alliance with Tenable Network Security! Integrating Secret Server with Tenable’s log correlation engine, SecurityCenter Continuous View, will provide administrators with improved oversight of their organization’s security practices. What is Tenable SecurityCenter

  • 04 MAR 14

Streamline Compliance with your Internal Security Policy by using Secret Server

Incorporating a new tool into your company’s overall security architecture can be a tricky and time-consuming process. Fortunately, Thycotic Secret Server has a several features that streamline the process of complying with your existing corporate requirements. In this post, we will take a look at a few ways Secret Server can work in conjunction with

  • 25 FEB 14

Is Your Hash Being Passed?

  A typical day in IT: It’s another day-in-the-life of an IT administrator and you have yet another 1,000 problems to solve. Around noon you receive a ticket saying Bob is having trouble with his computer’s performance. Instead of grabbing lunch, you RDP into his computer to figure out the problem. You need admin credentials

  • 20 FEB 14

Sneak Peek: New Secret Server features only at RSA Conference 2014

2014 marks Thycotic’s 5th year exhibiting at the RSA cybersecurity conference. RSA is one of the largest gatherings of IT security professionals and analysts in North America. This year, the conference takes place February 24-28th 2014 at the Moscone Center. Thycotic to unveil new Secret Server features We’re excited to demonstrate not-yet-published Secret Server features

  • 04 FEB 14

SIEM Spotlight: Join us this week for our HP ArcSight Integration webinar

Yep, you guessed it. We’re going to talk about big data. You’ve probably heard the buzz term a million times this year, but here’s an important question for any IT administrator and management team: What role does big data play in making your organization more secure? Pairing security information and event management (SIEM) with strong

  • 14 JAN 14

Fasten Your Seat belts! Advancements to Web Services API Speed Up Remote Password Changing

If you are familiar with Secret Server’s web services API, you already know that it can be a convenient way to retrieve, create and update Secrets individually and in bulk, especially if you already use scripts to accomplish account-related tasks in your environment. Some of the most common use cases require only simple calls to

  • 07 JAN 14

Enable, Disable, or Mirror: A Deeper Look into User Administration

Controlling users is one of the most important facets of Secret Server password management administration. While Secret Server supports local users and groups, the easiest way to administer users is to use Active Directory (AD) integration. Secret Server can automatically pull in existing AD users and groups and create user accounts with the same permissions.

  • 31 DEC 13

2013: A Security Odyssey

What did 2013 hold for Thycotic Software? New partners, software releases, and other exciting milestones. Join us for our movie themed year-in-review. This year, in the wake of dozens of newsworthy data breaches, the landscape for IT security broadened with every headline. The importance of securing privileged credentials and managing identity went from a “nice