Improved Secret Server usability through automated and simplified secret management: With new security controls, automation features and design updates, the new version of the Secret Server offers companies more protection and greater productivity when managing secrets.
ThycoticCentrify, a leading provider of cloud identity security solutions formed from the merger of two leaders in privileged access management (PAM), Thycotic and Centrify, is expanding the capabilities of its award-winning PAM solution, Secret Server. With new security controls, automation features, and design updates, Secret Server builds on its industry-leading secret management capabilities and ease of use to provide better protection and greater productivity.
Attackers use stolen credentials
According to the Verizon 2021 Data Breach Investigations Report, credentials are the primary means by which attackers enter an organization. 61 percent of security breaches are attributed to compromised credentials. To mitigate this threat, all organizations, regardless of size, location, or industry, need robust, easy-to-use solutions to protect the accounts and credentials that allow access to those permissions.
Stronger security controls reduce risk
The latest version of Secret Server allows organizations to switch Secret Server's master encryption key on demand. The rotation of individual secrets within the digital vault provides an additional layer of protection to prevent external actors from accessing the data.
Secret Server also simplifies the connection process for companies using jump boxes to protect access to critical resources. Instead of entering unique credentials at each connection point, users can now use a single key to traverse the entire route from start to jump box to destination in a single session. Users can launch the end-to-end route via Secret Server or the Connection Manager session management tool interface.
Checkout improvements eliminate bottlenecks
To improve auditing and compliance, Secret Server ensures that only one privileged user can use a secret at a time. If secrets are not checked back into the Secret Server after use, critical maintenance cannot be performed and productivity drops. In the latest release, secrets for API connections are automatically checked in when they expire. In addition, users now have a better overview of the remaining time to check out a secret and can extend the checkout if necessary.
More at ThycoticCentrify.com
About ThycoticCentrify ThycoticCentrify is a leading provider of cloud identity security solutions that enable digital transformation on a large scale. ThycoticCentrify's industry-leading Privileged Access Management (PAM) solutions reduce risk, complexity and cost while protecting enterprise data, devices and code in cloud, on-premises and hybrid environments. More than 14.000 leading companies around the world, including more than half of the Fortune 100, trust ThycoticCentrify. Customers include the world's largest financial institutions, intelligence agencies, and critical infrastructure companies. Whether human or machine, in the cloud or on-premises - with ThycoticCentrify, privileged access is secure.