Contact Us +1-202-802-9399 U.S. Headquarters

Archive for the ‘Uncategorized’ Category

PAM Security Blog Series Part 4: 3 Privileged Account Management Security Benefits

Tuesday, August 4th, 2015

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. Part four of our video blog series continues as Dave and Marcus dive into the security benefits […]

New Active Directory Synchronization Upgrade to Password Reset Server

Tuesday, July 28th, 2015

You asked, and we listened! We are excited to release a highly requested customization feature—the ability to schedule what time Active Directory Synchronizations run, plus we added a few other enhancements we think you’re going to like. When Should Active Directory Synchronization Run? Administrators can now choose what time Active Directory Synchronization will run and […]

PAM Security Blog Series Part 3: How to secure your privileged credentials

Tuesday, July 21st, 2015

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. You’ve heard from the experts why privileged credentials are at the heart of most large-scale cyber-attacks, read […]

Up, up and away: How Distributed Engine technology helps Thycotic scale privileged account management for large enterprises

Tuesday, July 14th, 2015

Why Distributed Engine? When you run Discovery, Password Changing, or Heartbeat in Thycotic Secret Server, all the work is queued up inside the web application. This requires no additional configuration and works well out of box. We strive to make Secret Server easy to configure and get working quickly, but also powerful enough that when […]

PAM Security Video Series Part 2: Why Privileged Credentials Are At The Heart of Most Large-Scale Cyber Attacks

Tuesday, July 7th, 2015

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. In our first video post for this series we debunked the common myth that passwords are dead. […]

Investment from Insight Venture Partners!

Wednesday, July 1st, 2015

2014 was a very exciting year for us at Thycotic. We experienced huge growth and we are looking ahead to an even bigger year. We’ve had over 141% year-over-year growth since 2011 and amassed a customer base of more than 3,000 companies world-wide. At this pivotal time in our growth as a company, we’re positioned […]

Hacking Communities in the Deep Web, Part 2

Tuesday, June 16th, 2015

Editor’s Note: Black Hat 2015 may be over 3 months away, but we always have hacking on our minds. This year marks Black Hat’s 18th anniversary with even more training sessions, briefings, and information sharing opportunities with the top information security experts from across the globe. We’ve partnered with the InfoSec Institute author Pierluigi Paganini to offer a two […]

Why do employees choose to become insider threats?

Tuesday, June 9th, 2015

A company went out of business. A person was marked as deceased in a large government database. A company’s domain name was added to anti-spam blacklists. All of these are outcomes of insider threat cases documented in The CERT Guide to Insider Threats, and could easily happen to any business today that does not have the […]

NSA Surveillance Strong as Ever Since Snowden Revelations, According to RSA Security Pros

Tuesday, June 2nd, 2015

Security professionals from across the world ventured to San Francisco this April for RSA Conference’s 26th annual information security conference. This year broke a record for the largest attendance of all time with 33,000 in attendance. RSA Conference’s theme this year was ‘Where the World Talks Security’. We thought what better place than RSA to […]

Hacking Communities in the Deep Web, Part 1

Wednesday, May 27th, 2015

Editor’s Note: Black Hat 2015 may be over 3 months away, but we always have hacking on our minds. This year marks Black Hat’s 18th anniversary with even more training sessions, briefings, and information sharing opportunities with the top information security experts from across the globe. We’ve partnered with the InfoSec Institute author Pierluigi Paganini to offer a two […]

Secret Server is the enterprise password management software that IT Admins and Security Pros love!

Try it FREE for 30 Days