+1-202-802-9399 U.S. Headquarters
Free Trial

Archive for the ‘Secret Server’ Category

Top 3 New Features in Secret Server 10.1

Wednesday, January 18th, 2017

Secret Server 10.1 ushers in some powerful features to not only improve upon its pre-existing repertoire of capabilities but to add to them as well. First, a new level of control over SSH environments – SSH Key Rotation. Second, introducing the brand new ability to manage password changing and heartbeat for IBM z/OS RACF accounts […]

The Password Spreadsheet: why you must NOT store enterprise passwords in Excel

Tuesday, December 6th, 2016

Is your organization still using an Excel password spreadsheet to store and manage sensitive passwords—the keys to your kingdom? You’re not alone. But storing privileged account passwords and credentials in a spreadsheet poses a serious security risk. There should be no such thing as a ‘password spreadsheet’ Excel was never intended to be a password […]

The Mission of Secret Server Free

Tuesday, November 29th, 2016

The Threat Not only do privileged accounts exist on every network, but they exist on nearly every aspect of it. The router has an administrative login, the database has one, and every workstation has either a local or domain administrator account that can be accessed from it. The reality is that these accounts, if compromised, […]

How to meet FISMA Compliance in 9 Steps

Wednesday, November 16th, 2016

Any organization that maintains a computer network is vulnerable to outside attacks.  Even if it is a single computer in someone’s home, break-in attempts are constant with hackers automatically pinging addresses (including your home router) looking for cracks they can sneak through.  At home, it’s bad enough that the exposure is your personal data including […]

Everything you need to know about Secret Server’s New Add-on Modules

Thursday, November 3rd, 2016

It’s time to boost your Secret Server productivity with our new add-on modules created to give you the customization and features your organization needs. Save time and effort while increasing your security when you enhance your Thycotic Secret Server solution with any of these integrated add-on modules. Choose which edition you currently use or are […]

Top 5 Reasons for Privileged Account Management in the Cloud

Tuesday, August 16th, 2016

The wait is almost over. We couldn’t be more thrilled to announce Secret Server Cloud and to give you the option to exercise freedom of choice in Privileged Account Management security. Immediately get the privileged account protection your organization needs without the costs of heavy upfront expenses around new hardware and software licenses. Secret Server […]

Integration Spotlight: Enhanced Security with Credentialed Vulnerability Assessments with Tenable

Thursday, July 7th, 2016
Organizations today are only barely scratching the surface when it comes to vulnerability assessments with unauthenticated scans. Unauthenticated scans still leave many unknowns that leave your organization vulnerable to attack. Credentialed Vulnerability Assessments Made Easy We are excited to announce our partnership and integration between Nessus® Cloud and Nessus® Manager with Thycotic Secret Server. The [...]

Using Secret Server as Proactive Security Defense at Saab

Tuesday, June 21st, 2016
As vice president and CIO at Saab Defense and Security USA LLC, Per Hammarin manages a 10 member IT team in Washington, DC which is part of a parent organization based in Sweden.  Over more than 30 years and progressive positions within the civil aircraft and defense subsidiary of the company known for its iconic [...]

Privileged Passwords and PCI-Compliance

Thursday, June 2nd, 2016
Guest post from Alpha Generation a Thycotic certified partner who specializes in IT distribution with a focus on proactive security in the UK. Anyone that handles payment card data is affected, so most of us have heard of the Payment Card Industry Data Security Standard (PCI-DSS). It establishes key expectations for protecting cardholder data, whether you’re handling [...]

How Security Can Make IT More Productive

Tuesday, May 31st, 2016
Recently, IDC posed the question “Can Security Make IT More Productive”? In their Technology Spotlight, IDC examined issues around security and the undergoing transformation from negative to positive and from obstructionist to an enablement role. The paper also highlighted how Thycotic solutions play in addressing associated challenges. According to IDC, Privileged Access Management (PAM) is [...]