+1-202-802-9399 (US)

Thycotic’s Cybersecurity Publication

FEATURED STORY:
Cyber criminals don’t want to be found

Once a hacker breaches your network the average dwell time before discovery is more than 200 days. So work on the assumption that you are already breached and should constantly hunt for cyber criminals within your network.

Filter by Tags: 

Thycotic Receives Perfect Score for Customer Satisfaction in the Latest Forrester PIM Wave

February 3rd, 2014

THANK YOU to all of our customers. We hope you know how much we value you every day, and it’s thanks to you that we received a perfect score from Forrester for customer satisfaction. You have given us your feedback on products, stopped by our booth at trade shows to chat, and shared your IT…


Don’t Just Store, Actively Manage Your Passwords! Create Custom Password Changers for All Devices

January 28th, 2014

  You just purchased a new network device or server and realized that Secret Server doesn’t contain a specific password changer for it. You figure the best you can do is store the static credentials in Secret Server, but there’s no way Secret Server could actively manage password changing, right? Think again! Secret Server has…


Take the Pain (and IT) Out of AD Group Management with Group Management Server

January 21st, 2014

Organizations that have many different departments inevitably have to spend time just to keep things organized, and IT teams become a critical part of this strategy. Often, their role is to help implement software that enhances each employee’s ability to do their job, but they also perform many back-end tasks to organize the network. Active…


Fasten Your Seat belts! Advancements to Web Services API Speed Up Remote Password Changing

January 14th, 2014

If you are familiar with Secret Server’s web services API, you already know that it can be a convenient way to retrieve, create and update Secrets individually and in bulk, especially if you already use scripts to accomplish account-related tasks in your environment. Some of the most common use cases require only simple calls to…


Enable, Disable, or Mirror: A Deeper Look into User Administration

January 7th, 2014

Controlling users is one of the most important facets of Secret Server password management administration. While Secret Server supports local users and groups, the easiest way to administer users is to use Active Directory (AD) integration. Secret Server can automatically pull in existing AD users and groups and create user accounts with the same permissions.…


Wham! IIS Application Pools & Scheduled Tasks available for Discovery

December 24th, 2013

Secret Server version 8.4.000000 boasts a number of exciting new features for Discovery, with a focus on expanded functionality for rules and service account dependencies. Discovery has always been a great tool for detecting and importing Windows local accounts and service accounts from the computers on your network. Now, in addition to Windows services, Discovery…


Launch Away-Multiple Launcher Sneak Peek

December 17th, 2013

One of the most popular features in Secret Server is the Launcher. With one click, Secret Server can launch and authenticate to RDP, PuTTY or a website. You can also launch a custom executable with Secret Server and pass in command-line arguments that reference Secret values. Additionally, the Windows Form Filler can be used to…


Use Custom Reports as Your Secret Weapon

December 10th, 2013

Custom Reports While Secret Server contains a number of reports addressing Secrets, folders, users, activity and more, having the flexibility to create your own reports may be necessary to address your organization’s unique requirements. With some editions of Secret Server (and a little knowledge of SQL), you can do just that. When creating a custom…


Announcing Our Official Technology Alliance with Splunk

December 3rd, 2013

In the past we have discussed the benefits of using a security information and event management (SIEM) solution, not only as a compliance tool, but also for protecting against potential threats in real time. We are excited to announce our official technology alliance with Splunk to release Secret Server for Splunk Enterprise, giving administrators deep…


Password Reset Server: Remind Your Users to Enroll With a Logon Script

November 27th, 2013

Being a self-service password reset tool, Password Reset Server needs its end-users to enroll in the product by answering security questions. This can become a challenge if you want your users to begin changing their password immediately or if you are having difficulty getting users to respond to the enrollment reminders. Password Reset Server offers…