
Controlling access is one of the biggest concerns with multi-cloud security. Identity-related security breaches remain a top concern in our hybrid, multi-cloud world. With assets distributed across on-premise and the cloud, IT struggles to secure them and provide admins, internal employees, contractors, and outsourced IT with secure remote access in a controlled fashion with unified…
Frequent readers of this blog know secrets refer to authentication credentials like passwords, API keys, SSH keys, certificates, tokens, and so on. Secrets management is then of course critical across the entire IT ecosystem and an essential part of the DevOps toolchain. However, lack of visibility into current and changing secrets or manual arduous secrets…
What happens when a user creates secrets and does not share them with anyone else, or if you are administrating Secret Server and need to re-organize your secrets? Secret Server’s “break the glass” feature, Unlimited Administration Mode, can help in those situations. The Unlimited Administrator Mode allows designated users to manage Secrets they would normally…
Whew, we made it. 2022. After a somewhat rocky 2021—and 2020 for that matter—what’s on your New Year’s Resolution list? Does your list include some of those perennial promises, like “get in shape” or “save money”? Or maybe you’ve got your sights set on some new ones like, “whittle down those streaming subscriptions,” or “use…
ThycoticCentrify’s latest release evolves our Privileged Access Management (PAM) solutions along two critical strategic paths. Firstly, we’re blending Thycotic and Centrify PAM products, so you benefit from the very best PAM capabilities from two of the industry’s market leaders. As an example, existing Secret Server customers will now be able to take advantage of flagship…
It takes a village to develop ThycoticCentrify’s industry-leading Privileged Access Management solutions. I spoke with Richard Wang, Senior Director of Product Management at ThycoticCentrify to discuss what it’s like to lead the product team, how we develop our product roadmap, and advice for those starting and continuing along their PAM journey. Sara: Hi Richard, thank…
No enterprise is alike in the way they organize privileged users or choose to connect IT systems. The latest release of Privilege Manager provides greater flexibility and choice by supporting diverse models for computer management and identity federation. For organizations that manage a variety of privileged users, business units, and connected technologies, Privilege Manager now…
Maybe it's happened to you. You deleted a service account because it didn’t seem like any processes were tied to it. And then something broke. Privilege management mistakes happen—but they don’t have to. Setting up an end-to-end workflow for privileged account governance decreases the risk of mistakenly pulling the plug on an important process. The…
DevOps is a world of machines. To access systems and data, secrets are exchanged between all types of machines, including databases and applications for software and infrastructure deployment, testing, orchestration, configuration, and Robotic Process Automation (RPA). The speed and scale of DevOps requires secrets to be created instantly, tracked incessantly, and eliminated when no longer…
You asked and we answered. We’ve been listening to questions Secret Server customers ask and working hard to make the industry’s top PAM solution even better. We’re excited to share a batch of updates to Secret Server that address your top concerns. 1. Is it possible to get rid of secrets and related data after…