+1-202-802-9399 (US)

Thycotic’s Cybersecurity Publication

FEATURED STORY:
Cyber Security Responsibilities: Who owns your organization’s PAM Policy Template? 

Who is responsible for creating, implementing and overseeing your organization’s Privileged Account Management Policy template? And what is at risk if no individuals or departments are named to ensure that your users and systems are in compliance with your PAM Policy?

Filter by Tags: 

Launch Away-Multiple Launcher Sneak Peek

December 17th, 2013

One of the most popular features in Secret Server is the Launcher. With one click, Secret Server can launch and authenticate to RDP, PuTTY or a website. You can also launch a custom executable with Secret Server and pass in command-line arguments that reference Secret values. Additionally, the Windows Form Filler can be used to…


Use Custom Reports as Your Secret Weapon

December 10th, 2013

Custom Reports While Secret Server contains a number of reports addressing Secrets, folders, users, activity and more, having the flexibility to create your own reports may be necessary to address your organization’s unique requirements. With the Custom Reports feature of Enterprise and Enterprise Plus editions (and a little knowledge of SQL), you can do just…


Announcing Our Official Technology Alliance with Splunk

December 3rd, 2013

In the past we have discussed the benefits of using a security information and event management (SIEM) solution, not only as a compliance tool, but also for protecting against potential threats in real time. We are excited to announce our official technology alliance with Splunk to release Secret Server for Splunk Enterprise, giving administrators deep…


Password Reset Server: Remind Your Users to Enroll With a Logon Script

November 27th, 2013

Being a self-service password reset tool, Password Reset Server needs its end-users to enroll in the product by answering security questions. This can become a challenge if you want your users to begin changing their password immediately or if you are having difficulty getting users to respond to the enrollment reminders. Password Reset Server offers…


Are You Using One Time Passwords?

November 26th, 2013

Secret Server password management software can easily be configured so that end users do not have to see the password to make use of a resource, such as logging onto a remote server. Using Hide Launcher Password, Secret passwords can be hidden from users, forcing them to use a Launcher to access the machine or…


Windows 8.1 Security Improvements Helps Protect Against Pass the Hash Attacks

October 21st, 2013

This cyber security month, we’d like to congratulate and thank Microsoft on their efforts to block Pass the Hash Attacks. Known by Microsoft as “one of the most popular types of credential theft and reuse attacks,” Pass the Hash attacks are known for their ability to infiltrate full networks within minutes, making a major mess along…


Create an Approval Workflow for Sensitive Secrets

October 15th, 2013

It’s important to understand how to properly create a workflow in Secret Server for secrets of a sensitive nature. For example, let’s say you have a Secret for the admin account on your production web server. You want to give all your web server administrators access to the Secret, but you only want them to…


The Value of SIEM and How to Integrate with Secret Server

October 1st, 2013

What is a SIEM tool and why should I use one? SIEM (System Information and Event Management) tools are a type of software that pulls in log and audit information from multiple sources across your network. This can include access logs for building entry, computers, servers, network devices, databases and applications. SIEM tools can aggregate…


Using Secret Server to Help Maintain Compliance Mandates

September 24th, 2013

Secret Server is a powerful, flexible tool which can help your organization meet a variety of compliance mandates, such as SOX, PCI, HIPAA and more. In this article we are going to review several ways you can utilize Secret Server to maintain compliance by securely managing your privileged account credentials. Centralizing Your Sensitive Information Before…


Integration Spotlight – Secret Server and Devolutions Remote Desktop Manager

September 17th, 2013

  In this week’s webinar we will be diving into the integration of Devolutions Remote Desktop Manager and Secret Server. Since the software integration in 2011, users have been securing their credentials through Secret Server and remote connections using Remote Desktop Manager after several client requests. Since then, administrators have been able to use both…