+1-202-802-9399 (US)

Thycotic’s Cybersecurity Publication

FEATURED STORY:
Cyber criminals don’t want to be found

Once a hacker breaches your network the average dwell time before discovery is more than 200 days. So work on the assumption that you are already breached and should constantly hunt for cyber criminals within your network.

Filter by Tags: 

Introducing Secret Server 8.5 Pt. 1: Session Recording Retention and Session Monitoring

March 25th, 2014

Secret Server 8.5 adds a number of new features and functionality. These new features are pretty awesome, so we decided this release deserves a little extra showcasing. Check back each week through April to learn something new about 8.5 and how it will increase your team’s overall security and productivity. Today we are going to…


IT’s TIME: Update Those Security Settings with PowerShell

March 18th, 2014

Secret Server 8.4, released in January, included additional ways to update Secret security settings via the web services API. This week, we’ll show you how to use PowerShell to access the Secret Server web services API and configure security settings for Secrets. Web Service security settings: What’s available? The web services API can help you…


Bam! Thycotic now integrates with Tenable Security’s Log Correlation Engine

March 11th, 2014

In a continuation of our discussion around the strengths of combining secure privileged account management with SIEM capabilities, we’re excited to announce our new alliance with Tenable Network Security! Integrating Secret Server with Tenable’s log correlation engine, SecurityCenter Continuous View, will provide administrators with improved oversight of their organization’s security practices. What is Tenable SecurityCenter…


Streamline Compliance with your Internal Security Policy by using Secret Server

March 4th, 2014

Incorporating a new tool into your company’s overall security architecture can be a tricky and time-consuming process. Fortunately, Thycotic Secret Server has a several features that streamline the process of complying with your existing corporate requirements. In this post, we will take a look at a few ways Secret Server can work in conjunction with…


Is Your Hash Being Passed?

February 25th, 2014

A typical day in IT: It’s another day-in-the-life of an IT administrator and you have yet another 1,000 problems to solve. Around noon you receive a ticket saying Bob is having trouble with his computer’s performance. Instead of grabbing lunch, you RDP into his computer to figure out the problem. You need admin credentials to…


Password Reset Server User Interface REFRESH

February 18th, 2014

Face it, there will always be end-users that forget their passwords. Giving them the ability to reset their own password is key to saving time, money and unnecessary stress, both for the user and the help desk. The trick is to make the reset process as simple as possible. We kept this in mind with…


4 Steps to HIPAA Compliance with Privileged Identity Management

February 11th, 2014

HIPAA, or the Health Insurance Portability and Accountability Act, is meant to protect specific health information gathered and used by the healthcare industry. Many people are familiar with how HIPAA affects their privacy as individuals, but not everyone may know how HIPAA shapes an organization’s security practices. A recent breach at St. Joseph Health Center…


Thycotic Receives Perfect Score for Customer Satisfaction in the Latest Forrester PIM Wave

February 3rd, 2014

THANK YOU to all of our customers. We hope you know how much we value you every day, and it’s thanks to you that we received a perfect score from Forrester for customer satisfaction. You have given us your feedback on products, stopped by our booth at trade shows to chat, and shared your IT…


Don’t Just Store, Actively Manage Your Passwords! Create Custom Password Changers for All Devices

January 28th, 2014

  You just purchased a new network device or server and realized that Secret Server doesn’t contain a specific password changer for it. You figure the best you can do is store the static credentials in Secret Server, but there’s no way Secret Server could actively manage password changing, right? Think again! Secret Server has…


Take the Pain (and IT) Out of AD Group Management with Group Management Server

January 21st, 2014

Organizations that have many different departments inevitably have to spend time just to keep things organized, and IT teams become a critical part of this strategy. Often, their role is to help implement software that enhances each employee’s ability to do their job, but they also perform many back-end tasks to organize the network. Active…