Contact Us +1-202-802-9399 U.S. Headquarters
Free Trial

Archive for the ‘Security’ Category

Vulnerability Scanning: Is Unauthenticated Scanning Enough?

Tuesday, October 14th, 2014

Thousands of IT organizations across the world use vulnerability scanners to perform unauthenticated scans and find threats within their network. These scans find basic weaknesses and detect issues within operating systems, open network ports, services listening on open ports, and data leaked by services. This gives companies the ability to see their network from the […]

Why we surveyed a bunch of hackers

Tuesday, September 30th, 2014

At this year’s Black Hat USA, we conducted a survey of 127 self-identified “black hat” hackers. Why’d we do it? Because it’s not every day that you can get an insider perspective on the thought process and motivation behind today’s black hat hacker. Black Hat vs White Hat vs Awesome Programmers We have to caveat […]

(Video) Are You Following Password Best Practices?

Tuesday, September 23rd, 2014

As an IT professional you juggle over 100 tasks a day, making sure everyone’s computers are up and running, no disasters are occurring, all while maintaining your entire network’s security. All of your daily responsibilities revolve around passwords and as an administrator you and your team are the keepers of ‘the keys to the kingdom.’ […]

Infamous Heartbleed Bug Responsible for Over 4.5 Million Patient Records Leaked

Tuesday, September 9th, 2014

Heartbleed continues to haunt the organizations as patch efforts remain ignored. In April we notified our customers that our solutions remained unaffected, but unfortunately for millions that was not the case. Over six months later a data breach at Community Health Systems is the result of the infamous Heartbleed vulnerability that several versions of OpenSSL […]

VMworld Sneak Peek: ESX Discovery

Tuesday, August 19th, 2014

With VMworld 2014 just a week away, we wanted to showcase a special VMware announcement this week. Introducing, advanced capabilities in VMware hypervisor environments coming with the Secret Server 8.7 release. This week’s post is a deep dive into the new ESX/ESXi discovery capabilities. Learn how your team can automatically discover and begin to manage […]

Secret Server: The Getting Started Guide for End-Users

Tuesday, August 12th, 2014

In our recent blog post, Don’t let your company’s social media get hacked: Deploy Secret Server to end-users, you learned about our new Basic User Dashboard and how to administer Secret Server to your end users. We wanted to make getting started with Secret Server simple and straightforward for your end users. Share this blog […]

Step-by-Step Guide: Getting Started with Secret Server

Tuesday, July 15th, 2014

You’ve taken the first step to securing your privileged account passwords by requesting a Secret Server trial. Now what? Don’t worry, the evaluation is simple and fast. To make your life even easier, we prepared a step-by-step guide so you know what to do and who to include in the process. We’ll offer these tips […]

Storing Physical Secrets in Secret Server: The Cipher Lock

Thursday, July 10th, 2014

Cipher locks are still widely used today, but a major concern still exists and that’s how to manage and secure them. A cipher lock is a lock that is opened with a programmable keypad that is used to limit and control access to a highly sensitive area. Many organizations use cipher locks to control access […]

Define, Apply & Standardize Security Policies across Secret Server

Wednesday, July 2nd, 2014

When managing sensitive, privileged accounts, the ability to dial down granular policies and controls is imperative for a strong security posture. Secret Server provides a wide landscape of customization for security policies on Secrets. Most configurations can be set at either the Template or the Secret level. This approach provides admins global and granular control […]

Wham! IIS Application Pools & Scheduled Tasks available for Discovery

Tuesday, December 24th, 2013

Secret Server version 8.4.000000 boasts a number of exciting new features for Discovery, with a focus on expanded functionality for rules and service account dependencies. Discovery has always been a great tool for detecting and importing Windows local accounts and service accounts from the computers on your network. Now, in addition to Windows services, Discovery […]

Secret Server is the enterprise password management software that IT Admins and Security Pros love!

Try it FREE for 30 Days