ThycoticCentrify improves Secret Server usability

B2B Cyber ​​Security ShortNews

Share post

Improved Secret Server usability through automated and simplified secret management: With new security controls, automation features and design updates, the new version of the Secret Server offers companies more protection and greater productivity when managing secrets.

ThycoticCentrify, a leading provider of cloud identity security solutions formed from the merger of two leaders in privileged access management (PAM), Thycotic and Centrify, is expanding the capabilities of its award-winning PAM solution, Secret Server. With new security controls, automation features, and design updates, Secret Server builds on its industry-leading secret management capabilities and ease of use to provide better protection and greater productivity.

Attackers use stolen credentials

According to the Verizon 2021 Data Breach Investigations Report, credentials are the primary means by which attackers enter an organization. 61 percent of security breaches are attributed to compromised credentials. To mitigate this threat, all organizations, regardless of size, location, or industry, need robust, easy-to-use solutions to protect the accounts and credentials that allow access to those permissions.

Stronger security controls reduce risk

The latest version of Secret Server allows organizations to switch Secret Server's master encryption key on demand. The rotation of individual secrets within the digital vault provides an additional layer of protection to prevent external actors from accessing the data.

Secret Server also simplifies the connection process for companies using jump boxes to protect access to critical resources. Instead of entering unique credentials at each connection point, users can now use a single key to traverse the entire route from start to jump box to destination in a single session. Users can launch the end-to-end route via Secret Server or the Connection Manager session management tool interface.

Checkout improvements eliminate bottlenecks

To improve auditing and compliance, Secret Server ensures that only one privileged user can use a secret at a time. If secrets are not checked back into the Secret Server after use, critical maintenance cannot be performed and productivity drops. In the latest release, secrets for API connections are automatically checked in when they expire. In addition, users now have a better overview of the remaining time to check out a secret and can extend the checkout if necessary.

More at ThycoticCentrify.com

 


About ThycoticCentrify

ThycoticCentrify is a leading provider of cloud identity security solutions that enable digital transformation on a large scale. ThycoticCentrify's industry-leading Privileged Access Management (PAM) solutions reduce risk, complexity and cost while protecting enterprise data, devices and code in cloud, on-premises and hybrid environments. More than 14.000 leading companies around the world, including more than half of the Fortune 100, trust ThycoticCentrify. Customers include the world's largest financial institutions, intelligence agencies, and critical infrastructure companies. Whether human or machine, in the cloud or on-premises - with ThycoticCentrify, privileged access is secure.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more