Contact Us +1-202-802-9399 U.S. Headquarters

Posts Tagged ‘secret server’

Why Adobe Chose Thycotic Secret Server for their Application Build Environment

Tuesday, January 19th, 2016

Recently, Adobe worked with us here at Thycotic to publish a use case document on how they’ve implemented Secret Server within their application build environment. While the core message surrounding the ability to automate processes and remove the human error element is critical for Adobe and just about any other organization out there, I wanted […]

Thycotic Announces Secret Server Express: Free Privileged Account Management for IT Admins

Monday, December 7th, 2015

December 7, 2015 – Washington, D.C. – Thycotic, provider of privileged account management solutions for over 3,500 organizations world-wide, today announced that Secret Server Express is now being offered for free. The solution enables IT admins to secure privileged accounts quickly and easily in a centralized repository, and can downloaded directly from Thycotic’s website. Try […]

Go from Last to First: Why Thycotic is the #1 Password Management Tool chosen by IT admins

Friday, October 9th, 2015

It’s no surprise that passwords are the number one target for attackers to achieve success during any data breach. Password management has been a major discussion for IT professionals for years, and as the battle between efficiency and security rages on between security and operations teams, the idea of password management often becomes a point […]

What’s New in Secret Server 8.9?

Wednesday, August 26th, 2015

Secret Server 8.9 looks to answer a few important discussion points that have been around the application for a while now. First, a popular customer request – more granularity of permissions. Next, scalability and efficiency of network operations – the birth of Distributed Engine. And finally, a level of security for RDP launchers to match […]

Up, up and away: How Distributed Engine technology helps Thycotic scale privileged account management for large enterprises

Tuesday, July 14th, 2015

Why Distributed Engine? When you run Discovery, Password Changing, or Heartbeat in Thycotic Secret Server, all the work is queued up inside the web application. This requires no additional configuration and works well out of box. We strive to make Secret Server easy to configure and get working quickly, but also powerful enough that when […]

Unlock the Secrets of Secret Server at UNLOCKED Conference

Tuesday, March 24th, 2015

Do you love Secret Server as much as we do? If so, don’t miss your opportunity to join us for our first user conference, UNLOCKED, on Sunday, May 3rd. This is your chance to connect with other Secret Server power users and our privileged account management experts. I’ll let you in on a little secret- […]

The Top Three Ways Personally Identifiable Information is Leaked in Healthcare

Tuesday, March 3rd, 2015

Personally identifiable information (PII) related to healthcare data is 50x more valuable on the black market than credit card data according to Alert Logic. Forty three percent of all identity thefts in the United States in 2013 were accounted to medical related identity theft (Logic, 2014). The healthcare industry knows they need to protect PII. It’s […]

Qualys Security Conference 2014: Tension Between Security and IT Operations

Tuesday, November 11th, 2014

In my previous post, ‘Vulnerability Scanning: Is Unauthenticated Scanning Enough?’ I discussed the differences between authenticated and unauthenticated scans, and how Qualys and Thycotic work together to find vulnerabilities for better security. When performing authenticated scans, Qualys uses credentials to find sensitive issues such as malware, patches, incorrect configuration, and other vulnerabilities. It then scans […]

Predicting Potential Threat: Behavior Analytics & Threat Modeling

Tuesday, October 21st, 2014

Wouldn’t it be nice to be able to identify a potential threat before it happens? Learn how Secret Server uses threat modeling and behavioral analytics to discover and take immediate action on a threat, stopping an attacker in their tracks. Threat Modeling The term “threat modeling” has become quite popular lately as an upcoming major […]

Vulnerability Scanning: Is Unauthenticated Scanning Enough?

Tuesday, October 14th, 2014

Thousands of IT organizations across the world use vulnerability scanners to perform unauthenticated scans and find threats within their network. These scans find basic weaknesses and detect issues within operating systems, open network ports, services listening on open ports, and data leaked by services. This gives companies the ability to see their network from the […]

Try Secret Server FREE for 30 Days!