+1-202-802-9399 U.S. Headquarters

Thycotic’s Cybersecurity Publication

FEATURED STORY:
Ransomware goes into stealth mode: 7 things you can do to protect yourself

Ransomware is a destructive variant of malicious malware. It makes critical systems and sensitive information inaccessible until a ransom is paid. Ransom is typically demanded in bitcoin with a 72 hour window to pay before the key is deleted and data is irreversibly lost. Now, it has evolved. Here’s how you protect your organization from the losses suffered in a ransomware attack.

Filter by Tags: 

Taking Web Password Filler On The Road

April 23rd, 2013

The same Web Password Filler that you use on your desktop browser is also available for your mobile devices. For iPhones and iPads, first you will want to create the Web Filler on Safari on your Mac desktop, then after using iCloud Bookmark sync with your iPhone the Web Password Filler will be ready for


Integrated Windows Authentication and Two-Factor Authentication

April 11th, 2013

In Google Chrome and Internet Explorer with Integrated Windows Authentication, enabled users are automatically signed in to Secret Server when they visit the site using their Active Directory credentials. This feature reduces the number of passwords that a user has to type, and the possibility of a forgotten password. This also allows domain administrators to


Secret Server Copy-To-Clipboard for Google Chrome and Mozilla Firefox

March 26th, 2013

The Mozilla Firefox add-on and the extension for Google Chrome allows values from Secret Server to be copied directly to the clipboard. This allows for ease of access when a user needs to apply information from Secret Server to other locations, however, clipboards generally do not clear the data that was copied. How do you


SOX Compliance on external systems using PowerShell scripts in Secret Server

February 25th, 2013

A critical component of many compliance mandates such as SOX, HIPAA, and PCI is guaranteeing that user activity is audited. Secret Server maintains an internal audit trail for user actions and access to shared privileged accounts, but it doesn’t necessarily guarantee that external systems maintain their own audits. After several customer requests, Secret Server can


Devolution’s Remote Desktop Manager integrates with Secret Server

February 20th, 2013

Thycotic Software would like to thank our technology partner, Devolutions, for recently integrating their Remote Desktop Manager with Secret Server. Remote Desktop Manager’s integration with Secret Server enables you to launch your remote access applications easily and securely without knowing the credentials. By using our publicly available Secret Server API, Remote Desktop Manager is able


Launching Batch Files in Secret Server

January 18th, 2013

A feature that was introduced in Secret Server 8.0 was the ability for the launcher to launch a batch script that is stored in Secret Server. This is useful when a custom launcher needs to be able to start multiple processes. For example, to create a custom launcher that starts an SSH tunnel program then


Sneak Preview: HSM Data Encryption with SafeNet

November 16th, 2012

We’re working with SafeNet, an industry leader in data protection, to bring hardware data encryption to Secret Server. We’re adding support for SafeNet’s Hardware Security Modules, or HSMs. Pictured: SafeNet LUNA PCI HSM SafeNet’s Luna PCI HSM (pictured) is FIPS 140-2 Level 2 and 3 compliant, bringing a new level of data protection to your


Sneak Preview: Bookmarklet 2.0

November 7th, 2012

Our team is working to make logging in to websites easier than ever with new bookmarklet functionality. The new bookmarklet is able to work on any web page, and automatically log you in. It is only required that the web page has a secret in the Secret Server, and that the user be logged in


Get passwords out of batch files and scripts

September 28th, 2012

Secret Server Enterprise Plus Edition has an Application Server API that can be used to get passwords out of your configuration files and scripts.  The idea is to authorize the application server to access Secret Server (this is done by installing the Secret Server Application Server API on the application server) – there is then


Using a Web Launcher with Logmein

September 14th, 2012

Have you ever been in the situation where you needed to provide a full desktop to someone outside your organization? One way you might accomplish this is by creating a Logmein.com account allowing users to login remotely. A caveat to this solution is it requires external access to your Secret Server instance. Follow these steps: