Secret Server Break the Glass Mode 1

Breaking the Glass With Unlimited Administration Mode

What happens when a user creates secrets and does not share them with anyone else, or if you are administrating Secret Server and need to re-organize your secrets? Secret Server’s “break the glass” feature, Unlimited Administration Mode, can help in those situations. The Unlimited Administrator Mode allows designated users to ... Read More

Jumpstart Your 2022 Security Resolutions by Trying the Latest Version of Secret Server

Whew, we made it. 2022. After a somewhat rocky 2021—and 2020 for that matter—what’s on your New Year’s Resolution list? Does your list include some of those perennial promises, like “get in shape” or “save money”? Or maybe you’ve got your sights set on some new ones like, “whittle down ... Read More
The Password Spreadsheet: Why NOT to store your passwords in Excel

The Password Spreadsheet: Why NOT to store your passwords in Excel

Is your organization still using an Excel password spreadsheet to store and manage sensitive passwords—the keys to your kingdom? You’re not alone. But storing privileged account passwords and credentials in an Excel spreadsheet poses a serious security risk. Excel was never intended to be a password manager, so there’s no ... Read More
Privilege Manager Offers Increased Flexibility and Enterprise-Wide Security

Privilege Manager Offers Increased Flexibility and Enterprise-Wide Security

No enterprise is alike in the way they organize privileged users or choose to connect IT systems.  The latest release of Privilege Manager provides greater flexibility and choice by supporting diverse models for computer management and identity federation. For organizations that manage a variety of privileged users, business units, and ... Read More
Six Questions Secret Server Answers in the Latest Updates

Six Questions Secret Server Answers in the Latest Updates

You asked and we answered. We’ve been listening to questions Secret Server customers ask and working hard to make the industry’s top PAM solution even better. We’re excited to share a batch of updates to Secret Server that address your top concerns. 1. Is it possible to get rid of ... Read More
How to Vacation Safely, Without Increasing Your Cyber Security Risk

How to Vacation Safely, Without Increasing Your Cyber Security Risk

The combination of pandemic lockdowns and remote work has led to a stockpile of unspent PTO. With vaccination rates increasing and travel restrictions lifting, people are starting to use their vacation days in droves. But that doesn’t mean hackers — or their bots — are taking time off.  (Side note: Criminal hackers really ... Read More
Percentage of organizations compromised by at least one successful attack

Key Takeaways from the 2021 Cyberthreat Defense Report

The recently released Cyberthreat Defense Report (CDR) 2021 from CyberEdge Group is packed with information about the rapidly evolving cyber security universe in the wake of a global pandemic.  Now in its eighth year, the 2021 CDR assessed the views of 1,200 IT security professionals representing 17 countries and 19 ... Read More

Stronger Secrets Management in the Latest Version of Secret Server

Secrets management requires broader and deeper security controls than traditional enterprise PAM. The latest release of Thycotic Secret Server provides stronger secrets management than ever before. Usability, workflow, and reporting enhancements to Secret Server save you time and strengthen your attack surface. Remove roadblocks in the approval workflow  Secret Server’s ... Read More
Beazley Improves Security Compliance and Saves Time on Audits

Beazley Improves Security Compliance and Saves Time on Audits

Specialist insurer Beazley has exponentially more secrets than employees. The volume and variety of their privileged accounts made them difficult to manage and time-consuming to audit. An external security audit identified gaps in Beazley’s secrets management processes that opened the door to potential privileged account attacks. “The audit discovered privileged ... Read More
Privileged Identity Management (PIM) and Identity-Centric Security Controls

Privileged Identity Management (PIM) and Identity-Centric Security Controls

The number of identities in the enterprise is exploding. Gaining control of identities related to people as well as machines is a challenge for many organizations. You need to know who your users are and what they do. If you experience a security incident, you must be able to reverse ... Read More
Loading...