Contact Us +1-202-802-9399 U.S. Headquarters
Free Trial

Archive for the ‘Secret Server’ Category

New Enterprise Ticketing System Integrations Available for BMC Software and ServiceNow in Secret Server

Monday, October 5th, 2015

The ability to automatically respond to and track Secret Server privileged user activity in enterprise ticketing systems is a huge benefit for our customers, because it removes the manual burden of updating and closing out tickets based on what privileged users are doing within the solution. That’s why the latest update to Secret Server now […]

What’s New in Secret Server 8.9?

Wednesday, August 26th, 2015

Secret Server 8.9 looks to answer a few important discussion points that have been around the application for a while now. First, a popular customer request – more granularity of permissions. Next, scalability and efficiency of network operations – the birth of Distributed Engine. And finally, a level of security for RDP launchers to match […]

Up, up and away: How Distributed Engine technology helps Thycotic scale privileged account management for large enterprises

Tuesday, July 14th, 2015

Why Distributed Engine? When you run Discovery, Password Changing, or Heartbeat in Thycotic Secret Server, all the work is queued up inside the web application. This requires no additional configuration and works well out of box. We strive to make Secret Server easy to configure and get working quickly, but also powerful enough that when […]

New HSM Integration: Secret Server and Thales e-Security

Tuesday, March 17th, 2015

Secret Server 8.8 includes Thales integration and support for their Hardware Security Module (HSM). The Thales integration brings an additional layer of protection to Secret Server by controlling the Secret Server encryption key within the HSM. What are HSMs? They are devices that manage and store the keys used to encrypt and decrypt data – […]

Universities under Attack—Securing student, faculty, and staff’s personal information

Tuesday, February 10th, 2015

Understanding the Size of the Education Industry Sometimes, businesses find out about a data breach the hard way – this was the case for Butler University in May 2013. Police investigating a case of identity theft in California discovered a flash drive on one of their suspects that contained the personally identifiable information (PII) of […]

5 Reasons Why You Should Attend Thycotic’s UNLOCKED Conference

Tuesday, January 27th, 2015

We’re excited to announce our first user conference on Sunday, May 3, 2015, in Chicago! The one-day conference includes opportunities to connect one-to-one with Thycotic experts and your peers. Attend technical deep dive sessions to learn security best practices and build your 2015 password management plan. Here are the top 5 reasons you should attend […]

Find out what’s new in Thycotic Secret Server 8.8! (Hint, it’s got some pretty cool new security features)

Tuesday, January 20th, 2015

Thycotic Secret Server 8.8 is coming out later this month. Check out some of its new features. HSM INTEGRATON FOR ADDED SECURITY Are you a user of a hardware security module (HSM) who wishes you could integrate it with Secret Server to protect your encryption.config file? It’s your lucky day, because Secret Server 8.8 supports […]

PRIVILEGED USERS AND DATA BREACHES: A MATCH MADE IN HEAVEN?

Tuesday, December 2nd, 2014

With data breaches on the rise, more evidence is constantly being discovered to support the link between privileged accounts in organizations and network breaches. Thycotic and IANS recently conducted a survey of 100 experienced security and IT operations professionals regarding their recent data breaches and privileged account misuse, and the results show there is indeed […]

Qualys Security Conference 2014: Tension Between Security and IT Operations

Tuesday, November 11th, 2014

In my previous post, ‘Vulnerability Scanning: Is Unauthenticated Scanning Enough?’ I discussed the differences between authenticated and unauthenticated scans, and how Qualys and Thycotic work together to find vulnerabilities for better security. When performing authenticated scans, Qualys uses credentials to find sensitive issues such as malware, patches, incorrect configuration, and other vulnerabilities. It then scans […]

Predicting Potential Threat: Behavior Analytics & Threat Modeling

Tuesday, October 21st, 2014

Wouldn’t it be nice to be able to identify a potential threat before it happens? Learn how Secret Server uses threat modeling and behavioral analytics to discover and take immediate action on a threat, stopping an attacker in their tracks. Threat Modeling The term “threat modeling” has become quite popular lately as an upcoming major […]

Secret Server is the enterprise password management software that IT Admins and Security Pros love!

Try it FREE for 30 Days