+1-202-802-9399 U.S. Headquarters
Free Trial

Archive for the ‘Secret Server’ Category

vRA and vRO integration with Thycotic Secret Server

Tuesday, December 22nd, 2015

Guest blog post by Scott Norris. When working with vRA—formally vCAC and vRO—it is integration with third-party systems or devices that makes vRA and vRO so flexible. The magic sauce of this integration is vRealize Orchestrator (vRO). There are plugins available, and in cases where there is no suitable plugin, there are options available to […]

Thycotic Announces Secret Server Express: Free Privileged Account Management for IT Admins

Monday, December 7th, 2015

December 7, 2015 – Washington, D.C. – Thycotic, provider of privileged account management solutions for over 3,500 organizations world-wide, today announced that Secret Server Express is now being offered for free. The solution enables IT admins to secure privileged accounts quickly and easily in a centralized repository, and can downloaded directly from Thycotic’s website. Try […]

Thycotic Ranks as a Top Provider of Privileged Account Management on the Cybersecurity 500

Tuesday, November 10th, 2015

This year, we’re pleased to announce that Thycotic has been ranked #72 on the 2015 Cybersecurity 500, a list of the world’s hottest and most innovative cybersecurity companies. After a thorough review of Thycotic and our technology, the editors at Cybersecurity Ventures recently published an analyst report recognizing Thycotic as one of the most innovative […]

Why Authenticated Scanning Matters, and How To Do It Right

Tuesday, October 20th, 2015

Earlier this month, a few of us from Thycotic attended the Qualys Security Conference (QSC) and had the opportunity to speak at one of their spotlight sessions regarding authenticated scanning and how to do it right with Thycotic Secret Server. Amazingly, in speaking with several of the attendees there, we discovered that many of them […]

Go from Last to First: Why Thycotic is the #1 Password Management Tool chosen by IT admins

Friday, October 9th, 2015

It’s no surprise that passwords are the number one target for attackers to achieve success during any data breach. Password management has been a major discussion for IT professionals for years, and as the battle between efficiency and security rages on between security and operations teams, the idea of password management often becomes a point […]

New Enterprise Ticketing System Integrations Available for BMC Software and ServiceNow in Secret Server

Monday, October 5th, 2015

The ability to automatically respond to and track Secret Server privileged user activity in enterprise ticketing systems is a huge benefit for our customers, because it removes the manual burden of updating and closing out tickets based on what privileged users are doing within the solution. That’s why the latest update to Secret Server now […]

What’s New in Secret Server 8.9?

Wednesday, August 26th, 2015

Secret Server 8.9 looks to answer a few important discussion points that have been around the application for a while now. First, a popular customer request – more granularity of permissions. Next, scalability and efficiency of network operations – the birth of Distributed Engine. And finally, a level of security for RDP launchers to match […]

Up, up and away: How Distributed Engine technology helps Thycotic scale privileged account management for large enterprises

Tuesday, July 14th, 2015

Why Distributed Engine? When you run Discovery, Password Changing, or Heartbeat in Thycotic Secret Server, all the work is queued up inside the web application. This requires no additional configuration and works well out of box. We strive to make Secret Server easy to configure and get working quickly, but also powerful enough that when […]

New HSM Integration: Secret Server and Thales e-Security

Tuesday, March 17th, 2015

Secret Server 8.8 includes Thales integration and support for their Hardware Security Module (HSM). The Thales integration brings an additional layer of protection to Secret Server by controlling the Secret Server encryption key within the HSM. What are HSMs? They are devices that manage and store the keys used to encrypt and decrypt data – […]

Universities under Attack—Securing student, faculty, and staff’s personal information

Tuesday, February 10th, 2015

Understanding the Size of the Education Industry Sometimes, businesses find out about a data breach the hard way – this was the case for Butler University in May 2013. Police investigating a case of identity theft in California discovered a flash drive on one of their suspects that contained the personally identifiable information (PII) of […]