Contact Us +1-202-802-9399 U.S. Headquarters

Archive for the ‘SS Features’ Category

The Triple A’s of Privileged Account Protection- A Customer Case Study

Tuesday, January 26th, 2016

Founded in 1993, Community IT Innovators provides a variety of managed IT services to over 150 organizations in the United States. As they grew, they quickly realized that their homegrown privileged account management solution needed to be replaced with a more scalable and secure solution that would also be capable of auditing credential usage and […]

Why Adobe Chose Thycotic Secret Server for their Application Build Environment

Tuesday, January 19th, 2016

Recently, Adobe worked with us here at Thycotic to publish a use case document on how they’ve implemented Secret Server within their application build environment. While the core message surrounding the ability to automate processes and remove the human error element is critical for Adobe and just about any other organization out there, I wanted […]

Sneak Peek at the Top Enhancements with Secret Server 8.9.3!

Tuesday, January 12th, 2016

When Secret Server released Distributed Engine it increased scalability to password changing and Discovery. It also simplified connection issues with Discovery for remote networks and firewall rules. Secret Server 8.9.3 adds support for another feature to distributed engine. Active Directory synchronization and authentication now can route through Engines. When is AD Sync through Engine Needed? There […]

vRA and vRO integration with Thycotic Secret Server

Tuesday, December 22nd, 2015

Guest blog post by Scott Norris. Hello all, I have a number of posts on the go and thought I would get this one out first. When working with vRA formally vCAC and vRO, integration with third-party systems or devices is what makes vRA and vRO so flexible. The magic sauce of this integration is […]

Breaking Bad Behavior

Tuesday, December 1st, 2015

Behavioral Analysis is becoming a huge buzzword in the IT and Information Security industries. With the idea that you can automatically determine whether or not what’s going on within your network is legitimate or not is a huge benefit to any organization. But, challenges exist. The sheer volume of data available makes finding attention-worthy events […]

5 Reasons you’ll love Thycotic’s Free Privileged Password Security Policy Template

Monday, November 16th, 2015

Privileged accounts are a favorite target for hackers—it’s critical that your organization’s IT Admins have a password protection policy in place to prevent attacks. So Thycotic and Information Shield partnered to create an easy-to-use, free password security policy template for organizations that do not yet have an official privileged account management policy. Don’t have a […]

Why Authenticated Scanning Matters, and How To Do It Right

Tuesday, October 20th, 2015

Earlier this month, a few of us from Thycotic attended the Qualys Security Conference (QSC) and had the opportunity to speak at one of their spotlight sessions regarding authenticated scanning and how to do it right with Thycotic Secret Server. Amazingly, in speaking with several of the attendees there, we discovered that many of them […]

Go from Last to First: Why Thycotic is the #1 Password Management Tool chosen by IT admins

Friday, October 9th, 2015

It’s no surprise that passwords are the number one target for attackers to achieve success during any data breach. Password management has been a major discussion for IT professionals for years, and as the battle between efficiency and security rages on between security and operations teams, the idea of password management often becomes a point […]

New Enterprise Ticketing System Integrations Available for BMC Software and ServiceNow in Secret Server

Monday, October 5th, 2015

The ability to automatically respond to and track Secret Server privileged user activity in enterprise ticketing systems is a huge benefit for our customers, because it removes the manual burden of updating and closing out tickets based on what privileged users are doing within the solution. That’s why the latest update to Secret Server now […]

What’s New in Secret Server 8.9?

Wednesday, August 26th, 2015

Secret Server 8.9 looks to answer a few important discussion points that have been around the application for a while now. First, a popular customer request – more granularity of permissions. Next, scalability and efficiency of network operations – the birth of Distributed Engine. And finally, a level of security for RDP launchers to match […]

Try Secret Server FREE for 30 Days!