Contact Us +1-202-802-9399 U.S. Headquarters
Free Trial

Archive for the ‘Uncategorized’ Category

Step-by-Step Guide: Getting Started with Secret Server

Tuesday, July 15th, 2014

You’ve taken the first step to securing your privileged account passwords by requesting a Secret Server trial. Now what? Don’t worry, the evaluation is simple and fast. To make your life even easier, we prepared a step-by-step guide so you know what to do and who to include in the process. We’ll offer these tips […]

Storing Physical Secrets in Secret Server: The Cipher Lock

Thursday, July 10th, 2014

Cipher locks are still widely used today, but a major concern still exists and that’s how to manage and secure them. A cipher lock is a lock that is opened with a programmable keypad that is used to limit and control access to a highly sensitive area. Many organizations use cipher locks to control access […]

Define, Apply & Standardize Security Policies across Secret Server

Wednesday, July 2nd, 2014

When managing sensitive, privileged accounts, the ability to dial down granular policies and controls is imperative for a strong security posture. Secret Server provides a wide landscape of customization for security policies on Secrets. Most configurations can be set at either the Template or the Secret level. This approach provides admins global and granular control […]

Wham! IIS Application Pools & Scheduled Tasks available for Discovery

Tuesday, December 24th, 2013

Secret Server version 8.4.000000 boasts a number of exciting new features for Discovery, with a focus on expanded functionality for rules and service account dependencies. Discovery has always been a great tool for detecting and importing Windows local accounts and service accounts from the computers on your network. Now, in addition to Windows services, Discovery […]

Use Custom Reports as Your Secret Weapon

Tuesday, December 10th, 2013

Custom Reports While Secret Server contains a number of reports addressing Secrets, folders, users, activity and more, having the flexibility to create your own reports may be necessary to address your organization’s unique requirements. With the Custom Reports feature of Enterprise and Enterprise Plus editions (and a little knowledge of SQL), you can do just […]

Announcing Our Official Technology Alliance with Splunk

Tuesday, December 3rd, 2013

In the past we have discussed the benefits of using a security information and event management (SIEM) solution, not only as a compliance tool, but also for protecting against potential threats in real time. We are excited to announce our official technology alliance with Splunk to release Secret Server for Splunk Enterprise, giving administrators deep […]

Are You Using One Time Passwords?

Tuesday, November 26th, 2013

Secret Server can easily be configured so that end users do not have to see the password to make use of a resource, such as logging onto a remote server. Using Hide Launcher Password, Secret passwords can be hidden from users, forcing them to use a Launcher to access the machine or device. This makes […]

3 Ways Secret Server will Enhance your Identity Access Management Strategy

Tuesday, November 19th, 2013

It’s important to have an Identity Access Management (IAM) strategy, whether you are trying to meet a compliance standard such as PCI, SOXS or FIPS, or you just want accountability for what is going on throughout your network. Secret Server has many ways that it can help administrators accomplish this. In this article, we will […]

Create an Approval Workflow for Sensitive Secrets

Tuesday, October 15th, 2013

It’s important to understand how to properly create a workflow in Secret Server for secrets of a sensitive nature. For example, let’s say you have a Secret for the admin account on your production web server. You want to give all your web server administrators access to the Secret, but you only want them to […]

Customizing Roles For Your Company – Part One

Friday, May 10th, 2013

Secret Server uses Roles and Permissions to control access to various capabilities within the system. In this two part blog post we will review how to set up customized roles and permissions to meet your company’s security policy. Roles in Secret Server control what a user is allowed to do in the tool. Secret Server […]

Secret Server is the enterprise password management software that IT Admins and Security Pros love!

Try it FREE for 30 Days