CIO Influence
CIO Influence News Cloud Security

ThycoticCentrify Enhances Security and Compliance with New Secret Erase Feature for Secret Server

ThycoticCentrify Enhances Security and Compliance with New Secret Erase Feature for Secret Server

ThycoticCentrify, a leading provider of cloud identity security solutions formed by the merger of privileged access management (PAM) leaders Thycotic and Centrify, announced new and expanded capabilities for its award-winning PAM solution, Thycotic Secret Server. With the addition of the new Secret Erase feature, enhancements to Secret Server’s mobile application, Connection Manager, and Web Password Filler, Secret Server now more than ever helps reduce cyber risk, expand discovery, and increase productivity for IT administrators as well as business users.

Recommended ITech News: GTT Opticom Emergency Vehicle Preemption to launch on Whelen’s Smart Cloud Platform

No secret left behind

R****** of privileged account information after it’s no longer needed is critical to security and compliance standards, especially when organizations are working with contracted third-party administrators. With Secret Erase, secrets and related data – such as usernames, passwords, and email addresses – are purged completely from the database, while still providing an audit trail to meet documentation and compliance requirements.

“After a third-party engagement with a privileged user is completed, removing secrets and related data is a best practice,” said Jason Mitchell, Senior Vice President of Engineering at ThycoticCentrify. “Our latest release of Secret Server adds this important capability with Secret Erase, prioritizing both security and compliance. Now IT administrators can rest a little easier knowing no historic or unnecessary credentials are left available for cyber criminals to exploit and gain privileged access.”

Recommended ITech News: Independent Product Testing Firm Ten Mile Square Technologies Confirms INTRUSION Shield’s Cyber Defense Capabilities

SSH management for Unix/Linux

An accurate record of all SSH keys is essential to properly secure them. Locating and tracking SSH public keys can be an arduous task for IT administrators. To save time and effort, Secret Server’s Discovery tool now includes the ability to locate existing SSH keys associated with Linux and Unix servers. Additional SSH session management capabilities in the release simplify sudo/su elevation and enable select command blocklisting during SSH proxied sessions.

Usable security for greater productivity

The onslaught of daily alerts and notifications can be fatiguing for many users. With so much noise, it’s difficult to digest information quickly and understand which notifications require action. To reduce alert fatigue, Secret Server’s Inbox now provides a customizable toolset to manage how email and notifications are sent and received by users. Inbox allows for configuration of notification scheduling, collecting notifications into digest format, creation of message templates, rules, and more.

Recommended ITech News: Businesses Invest in Artificial Intelligence & Machine Learning to Expand Digital Business Plans

Related posts

Glasswall Extends Premier Partner Programme, Bringing its Content Disarm and Reconstruction (CDR) Solutions to Cybersecurity Markets Across Europe

CIO Influence News Desk

Netskope Threat Research: Data Sprawl Creating Risk for Organizations Worldwide as Personal App Use in Business Continues to Rise

Arelion First to Deploy Cisco 400G QSFP-DD Bright Optical Modules in Global Production IP Backbone

Business Wire

Leave a Comment