
Thycotic’s Cyber Security Blog
FEATURED STORY:
How to Remove Admin Rights Without Reducing Productivity
Mitigate risks related to over-privileged users to secure your endpoints and ensure compliance
Filter by Tags:

Secret Server and DoubleLock
September 13th, 2012
Do you have a need for additional security when storing your most sensitive data? Where do you store the company’s banking account numbers and other critical financial data? …top-level credentials for your customer database that contains Credit Card and Social Security numbers? …credentials for classified system access? When you need that additional layer of security…

Creating Custom Reports in Secret Server
August 30th, 2012
Updated December 2020 This blog post was originally written in 2012. For the most up to date information on Secret Server’s Reporting capabilities, please visit: Secret Server Features Page: Our features are among the reasons so many IT Admins and IT Security pros consider Secret Server the best Privileged Access Management software in the market.…

How to Create a Custom Web Launcher in Secret Server
August 29th, 2012
Creating a custom Web Launcher in Secret Server is useful for several reasons. First, it allows your organization to share online accounts without revealing the password. Second, it saves time for Secret Server users. It allows users to use one click from Secret Server seamlessly pass the credentials directly to the destination’s login page. Used…

Manage SSL Certificates, License Keys, and more in Secret Server
August 27th, 2012
Updated: December 16th, 2020 Do you have copies of your SSL certificates, license keys, network documentation and APIs? Of course! Can you easily search for all of those in one place? Maybe. Is your repository well-organized, access-controlled, and encrypted? Probably not. In addition to passwords and secrets, Secret Server helps you secure sensitive technical information…

Using Secret Server Links to Securely Transmit Sensitive Data
August 24th, 2012
Having been a Systems Engineer, I’m familiar with the problem of sharing credentials. My method for sharing login credentials with a colleague consisted of access to a spreadsheet with everything or a Post-it that would be shredded (hopefully). However, with Secret Server, System Admins are easily able to share credentials with colleagues by sending them…

Secret Server and Secure LDAP
July 23rd, 2012
This blog post was originally written in 2012. For the most up to date information on Secret Server and Secure LDAP, please visit: Secret Server Features Page: Our features are among the reasons so many IT Admins and IT Security pros consider Secret Server the best Privileged Access Management software in the market. Find information…

Using the PuTTY launcher on custom ports
November 23rd, 2011
Do you use custom ports for accessing your systems through SSH or telnet? If you do, you’ll find that the launcher is configured for standard ports. Configuring these ports requires the creation of a custom launcher and a few other steps. This can be a useful tool for Secret Server users, especially in those situations…

Inheriting Permissions Based on Folders
July 29th, 2011
Inheriting Permissions based on Folders It is possible for Secrets in Secret Server to inherit permissions from the folder where they are placed. For example, if you install a new managed switch in your network, instead of setting an Active Directory group or users for every network-based Secret, you set the Active Directory group or…