Thycotic Telephone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication


Filter by Tags: 

Articles in the ‘Product News’ Category

vRA and vRO integration with Thycotic Secret Server

December 22nd, 2015

Guest blog post by Scott Norris. When working with vRA—formally vCAC and vRO—it is integration with third-party systems or devices that makes vRA and vRO so flexible. The magic sauce of this integration is vRealize Orchestrator (vRO). There are plugins available, and in cases where there is no suitable plugin, there are options available to…

Breaking Bad Behavior

December 1st, 2015

Behavioral Analysis is becoming a huge buzzword in the IT and Information Security industries. With the idea that you can automatically determine whether or not what’s going on within your network is legitimate or not is a huge benefit to any organization. But, challenges exist. The sheer volume of data available makes finding attention-worthy events…

New HSM Integration: Secret Server and Thales e-Security

March 17th, 2015

Secret Server 8.8 includes nCipher integration and support for their Hardware Security Module (HSM). The nCipher integration brings an additional layer of protection to Secret Server by controlling the Secret Server encryption key within the HSM. What are HSMs? They are devices that manage and store the keys used to encrypt and decrypt data –…

VMworld Sneak Peek: ESX Discovery

August 19th, 2014

With VMworld 2014 just a week away, we wanted to showcase a special VMware announcement this week. Introducing, advanced capabilities in VMware hypervisor environments coming with the Secret Server 8.7 release. This week’s post is a deep dive into the new ESX/ESXi discovery capabilities. Learn how your team can automatically discover and begin to manage…

Importing Credentials into Secret Server Part Two of Two

September 3rd, 2013

In our last post we discussed importing secrets manually into Secret Server using our Migration Tool and built in CSV and XML import. This week we are going review how to automatically import credentials into Secret Server. Discovery in Secret Server Discovery is a major feature in Secret Server with two main functions: Scan your…

Customizing Roles For Your Company – Part Two

May 31st, 2013

In Part One of this two-part series we discussed setting custom Roles inside of Secret Server. In this section we will discuss the three ways to set Permissions on Secrets within Secret Server. Roles give a user the ability to perform actions inside Secret Server, whereas Permissions dictate the level of control a user has…