+1-202-802-9399 (US)

Thycotic’s Cybersecurity Publication

FEATURED STORY:
Cyber criminals don’t want to be found

Once a hacker breaches your network the average dwell time before discovery is more than 200 days. So work on the assumption that you are already breached and should constantly hunt for cyber criminals within your network.

Filter by Tags: 

Breaking the Glass With Unlimited Administration Mode

May 28th, 2013

What happens when a user creates Secrets and does not share them with anyone else, or if you are administrating Secret Server and need to re-organize your Secrets? Secret Server’s “break the glass” feature, Unlimited Administration Mode, can help in those situations. The Unlimited Administrator Mode allows designated users to manage Secrets they would normally…


Customizing Roles For Your Company – Part One

May 10th, 2013

Secret Server uses Roles and Permissions to control access to various capabilities within the system. In this two part blog post we will review how to set up customized roles and permissions to meet your company’s security policy. Roles in Secret Server control what a user is allowed to do in the tool. Secret Server…


Restricting User Input for Launcher

May 3rd, 2013

A new feature in Secret Server is the ability to control which servers users are able to connect to using a Launcher. This can be done by specifying a list of machines or servers on a Secret in a notes field. This list can either be a whitelist or a blacklist of servers the Launcher…


Taking Web Password Filler On The Road

April 23rd, 2013

The same Web Password Filler that you use on your desktop browser is also available for your mobile devices. For iPhones and iPads, first you will want to create the Web Filler on Safari on your Mac desktop, then after using iCloud Bookmark sync with your iPhone the Web Password Filler will be ready for…


Integrated Windows Authentication and Two-Factor Authentication

April 11th, 2013

In Google Chrome and Internet Explorer with Integrated Windows Authentication, enabled users are automatically signed in to Secret Server when they visit the site using their Active Directory credentials. This feature reduces the number of passwords that a user has to type, and the possibility of a forgotten password. This also allows domain administrators to…


Secret Server Copy-To-Clipboard Add-On for Browsers Google Chrome and Mozilla Firefox

March 26th, 2013

The Mozilla Firefox add-on and the extension for Google Chrome enables values from Secret Server to be copied directly to the clipboard. This allows for ease of access when a user needs to apply information from Secret Server to other locations, however, clipboards generally do not clear the data that was copied. How do you…


SOX Compliance on external systems using PowerShell scripts in Secret Server

February 25th, 2013

A critical component of many compliance mandates such as SOX, HIPAA, and PCI is guaranteeing that user activity is audited. Secret Server maintains an internal audit trail for user actions and access to shared privileged accounts, but it doesn’t necessarily guarantee that external systems maintain their own audits. After several customer requests, Secret Server can…


Devolution’s Remote Desktop Manager integrates with Secret Server

February 20th, 2013

Thycotic Software would like to thank our technology partner, Devolutions, for recently integrating their Remote Desktop Manager with Secret Server. Remote Desktop Manager’s integration with Secret Server enables you to launch your remote access applications easily and securely without knowing the credentials. By using our publicly available Secret Server API, Remote Desktop Manager is able…


Launching Batch Files in Secret Server

January 18th, 2013

A feature that was introduced in Secret Server 8.0 was the ability for the launcher to launch a batch script that is stored in Secret Server. This is useful when a custom launcher needs to be able to start multiple processes. For example, to create a custom launcher that starts an SSH tunnel program then…


Sneak Preview: HSM Data Encryption with SafeNet

November 16th, 2012

We’re working with SafeNet, an industry leader in data protection, to bring hardware data encryption to Secret Server. We’re adding support for SafeNet’s Hardware Security Modules, or HSMs. Pictured: SafeNet LUNA PCI HSM SafeNet’s Luna PCI HSM (pictured) is FIPS 140-2 Level 2 and 3 compliant, bringing a new level of data protection to your…