+1-202-802-9399 U.S. Headquarters

Thycotic’s Cybersecurity Publication

FEATURED STORY:
5 Shocking Insights into the Social Network Habits of Security Professionals 

Hacking social media accounts has never been easier. Attackers take advantage of poor password hygiene and usually hijack an account and hold it for ransom. It’s difficult to get the real picture, but according to Facebook, accounts are hacked 600,000 times a day. And even worse, 80% of all cyber security attacks involve a weak or stolen password.

Filter by Tags: 

Get Credentials out of Code with Secret Server API

July 16th, 2013

A few years back, our engineers decided to solve a new password problem: Network credentials are not only used by people. Sometimes other programs need credentials to interact with the network too. Secret Server was already providing full audits of each user’s credential usage, why not create an API so programs could also use Secret…


Conventions for Naming Secrets

July 9th, 2013

When first adding Secrets to your Secret Server account, one of your questions might be, “What should I name my Secrets?” This is a great question and one that we recommend thinking about for any new Secret Server customer. Secret names should be descriptive, but should not reveal any sensitive data. An option for Administrators…


Password Requirements in Secret Server

June 28th, 2013

An important part of account security is choosing a strong password to be used to protect the account. The biggest challenge for most users is designing a strong password – one that contains at least eight characters consisting of a mix of upper- and lower-case letters, numbers, and symbols. It can be tedious and time…


Integrating Your Ticketing System in Secret Server

June 14th, 2013

Secret Server can integrate with any web ticketing system. This allows you to tie specific Secret views to an item in your existing ticketing system. It does so by first validating that the ticket number given to Secret Server matches the pattern of your ticketing system. Secret Server will then use the ticket number to…


Customizing Roles For Your Company – Part Two

May 31st, 2013

In Part One of this two-part series we discussed setting custom Roles inside of Secret Server. In this section we will discuss the three ways to set Permissions on Secrets within Secret Server. Roles give a user the ability to perform actions inside Secret Server, whereas Permissions dictate the level of control a user has…


Breaking the Glass With Unlimited Administration Mode

May 28th, 2013

What happens when a user creates Secrets and does not share them with anyone else, or if you are administrating Secret Server and need to re-organize your Secrets? Secret Server’s “break the glass” feature, Unlimited Administration Mode, can help in those situations. The Unlimited Administrator Mode allows designated users to manage Secrets they would normally…


Customizing Roles For Your Company – Part One

May 10th, 2013

Secret Server uses Roles and Permissions to control access to various capabilities within the system. In this two part blog post we will review how to set up customized roles and permissions to meet your company’s security policy. Roles in Secret Server control what a user is allowed to do in the tool. Secret Server…


Restricting User Input for Launcher

May 3rd, 2013

A new feature in Secret Server is the ability to control which servers users are able to connect to using a Launcher. This can be done by specifying a list of machines or servers on a Secret in a notes field. This list can either be a whitelist or a blacklist of servers the Launcher…


Taking Web Password Filler On The Road

April 23rd, 2013

The same Web Password Filler that you use on your desktop browser is also available for your mobile devices. For iPhones and iPads, first you will want to create the Web Filler on Safari on your Mac desktop, then after using iCloud Bookmark sync with your iPhone the Web Password Filler will be ready for…


Integrated Windows Authentication and Two-Factor Authentication

April 11th, 2013

In Google Chrome and Internet Explorer with Integrated Windows Authentication, enabled users are automatically signed in to Secret Server when they visit the site using their Active Directory credentials. This feature reduces the number of passwords that a user has to type, and the possibility of a forgotten password. This also allows domain administrators to…