+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Author Articles

Streamline Compliance with your Internal Security Policy by using Secret Server

March 4th, 2014

Incorporating a new tool into your company’s overall security architecture can be a tricky and time-consuming process. Fortunately, Thycotic Secret Server has a several features that streamline the process of complying with your existing corporate requirements. In this post, we will take a look at a few ways Secret Server can work in conjunction with…


Is Your Hash Being Passed?

February 25th, 2014

A typical day in IT: It’s another day-in-the-life of an IT administrator and you have yet another 1,000 problems to solve. Around noon you receive a ticket saying Bob is having trouble with his computer’s performance. Instead of grabbing lunch, you RDP into his computer to figure out the problem. You need admin credentials to…


Password Reset Server User Interface REFRESH

February 18th, 2014

Face it, there will always be end-users that forget their passwords. Giving them the ability to reset their own password is key to saving time, money and unnecessary stress, both for the user and the help desk. The trick is to make the reset process as simple as possible. We kept this in mind with…


4 Steps to HIPAA Compliance with Privileged Identity Management

February 11th, 2014

HIPAA, or the Health Insurance Portability and Accountability Act, is meant to protect specific health information gathered and used by the healthcare industry. Many people are familiar with how HIPAA affects their privacy as individuals, but not everyone may know how HIPAA shapes an organization’s security practices. A recent breach at St. Joseph Health Center…


Using Secret Server to Help Maintain Compliance Mandates

September 24th, 2013

Secret Server is a powerful, flexible tool which can help your organization meet a variety of compliance mandates, such as SOX, PCI, HIPAA and more. In this article we are going to review several ways you can utilize Secret Server to maintain compliance by securely managing your privileged account credentials. Centralizing Your Sensitive Information Before…


Integration Spotlight – Secret Server and Devolutions Remote Desktop Manager

September 17th, 2013

  In this week’s webinar we will be diving into the integration of Devolutions Remote Desktop Manager and Secret Server. Since the software integration in 2011, users have been securing their credentials through Secret Server and remote connections using Remote Desktop Manager after several client requests. Since then, administrators have been able to use both…


Securing Web Browsers Through Group Policy

September 9th, 2013

When developing a workflow to manage shared credentials, it’s important to take into account certain environmental factors that may cache credentials on their own. These factors can decrease security around shared credentials. Here, we’ll focus on securing your web browsers through group policy. Disable Password Caching for IE Note: these instructions are specific to Windows…


Importing Credentials into Secret Server Part Two of Two

September 3rd, 2013

In our last post we discussed importing secrets manually into Secret Server using our Migration Tool and built in CSV and XML import. This week we are going review how to automatically import credentials into Secret Server. Discovery in Secret Server Discovery is a major feature in Secret Server with two main functions: Scan your…


Get Credentials out of Code with Secret Server API

July 16th, 2013

A few years back, our engineers decided to solve a new password problem: Network credentials are not only used by people. Sometimes other programs need credentials to interact with the network too. Secret Server was already providing full audits of each user’s credential usage, why not create an API so programs could also use Secret…


Conventions for Naming Secrets

July 9th, 2013

When first adding Secrets to your Secret Server account, one of your questions might be, “What should I name my Secrets?” This is a great question and one that we recommend thinking about for any new Secret Server customer. Secret names should be descriptive, but should not reveal any sensitive data. An option for Administrators…