+1-202-802-9399 U.S. Headquarters

Thycotic’s Cybersecurity Publication

FEATURED STORY:
5 Shocking Insights into the Social Network Habits of Security Professionals 

Hacking social media accounts has never been easier. Attackers take advantage of poor password hygiene and usually hijack an account and hold it for ransom. It’s difficult to get the real picture, but according to Facebook, accounts are hacked 600,000 times a day. And even worse, 80% of all cyber security attacks involve a weak or stolen password.

Filter by Tags: 

Sneak Preview: Bookmarklet 2.0

November 7th, 2012

Our team is working to make logging in to websites easier than ever with new bookmarklet functionality. The new bookmarklet is able to work on any web page, and automatically log you in. It is only required that the web page has a secret in the Secret Server, and that the user be logged in…


Get passwords out of batch files and scripts

September 28th, 2012

Secret Server Enterprise Plus Edition has an Application Server API that can be used to get passwords out of your configuration files and scripts.  The idea is to authorize the application server to access Secret Server (this is done by installing the Secret Server Application Server API on the application server) – there is then…


Using a Web Launcher with Logmein

September 14th, 2012

Have you ever been in the situation where you needed to provide a full desktop to someone outside your organization? One way you might accomplish this is by creating a Logmein.com account allowing users to login remotely. A caveat to this solution is it requires external access to your Secret Server instance. Follow these steps:…


Secret Server and DoubleLock

September 13th, 2012

Do you have a need for additional security when storing your most sensitive data? Where do you store the company’s banking account numbers and other critical financial data?  …top-level credentials for your customer database that contains Credit Card and Social Security numbers?  …credentials for classified system access? When you need that additional layer of security…


Sneak Preview: Secret Server Launcher for Mac

September 11th, 2012

The Thycotic Dev Team is hard at work with new functionality for Mac!  While I don’t have all the details, I do have a few items I can share.  Currently, we’re looking at an “end-of-Q4 2012” release date.  This date may slip, but it’s accurate for now. Details I can share: The Launcher will support…


Group Management Server Scales for Enterprise

September 5th, 2012

Wait, what is Group Management Server? Group Management Server is Thycotic Software’s brand new self service Active Directory group management tool.  IT Admins can designate Group Owners to control Active Directory Security Group and Distribution Group membership.  Reporting and full audit trails are maintained throughout the system on group management activities including adding, deleting, editing user…


Creating Custom Reports in Secret Server

August 30th, 2012

Secret Server contains robust reporting capabilities, as mentioned in on the Secret Server Report Features Page.  In addition to the default reports included with Secret Server (see Figure 1), additional reports are available for download in the Online Reports Gallery.  Beyond these options, users who aren’t familiar with SQL reporting, may also make a Custom…


How to Create a Custom Web Launcher in Secret Server

August 29th, 2012

Creating a custom Web Launcher in Secret Server is useful for several reasons. First, it allows your organization to share online accounts without revealing the password. Second, it saves time for Secret Server users. It allows users to use one click from Secret Server seamlessly pass the credentials directly to the destination’s login page. Used…


SSL Certificates, License Keys & More in Secret Server

August 27th, 2012

Do you have copies of your SSL Certificates, Licensing Data, and Support Documentation? Of course! Can you easily search for all of those files with a single term? Maybe. Is it well-organized, access-controlled, and verified? Maybe not. Secret Server supports the functionality above by simply building a Secret Template with the proper settings. For example:…


Using Secret Server Links to Securely Transmit Sensitive Data

August 24th, 2012

Having been a Systems Engineer, I’m familiar with the problem of sharing credentials.  My method for sharing login credentials with a colleague consisted of access to a spreadsheet with everything or a Post-it that would be shredded (hopefully).  However, with Secret Server, System Admins are easily able to share credentials with colleagues by sending them…