Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

The 7 Deadly Privileged Accounts You MUST Discover, Manage, and Secure

Gain an understanding of the privileged accounts that put your organization at risk if not secured.

7 Types of Privileged Accounts

Filter by Tags: 

Using the PuTTY launcher on custom ports

November 23rd, 2011

Do you use custom ports for accessing your systems through SSH or telnet?  If you do, you’ll find that the launcher is configured for standard ports.  Configuring these ports requires the creation of a custom launcher and a few other steps. This can be a useful tool for Secret Server users, especially in those situations…


Inheriting Permissions Based on Folders

July 29th, 2011

Inheriting Permissions based on Folders It is possible for Secrets in Secret Server to inherit permissions from the folder where they are placed. For example, if you install a new managed switch in your network, instead of setting an Active Directory group or users for every network-based Secret, you set the Active Directory group or…