ThycoticCentrify expands capabilities of its PAM solution – SecretServer

In News

ThycoticCentrify today announced new and expanded capabilities for its award-winning PAM solution, Secret Server. With the addition of new security controls, automation, and design updates, Secret Server builds on its industry-leading secrets management capabilities and ease-of-use to offer greater protection and higher productivity.

Stronger security controls reduce risk

The latest Secret Server release allows organizations to rotate Secret Server’s master encryption key on demand. Rotating individual secrets housed within the digital vault provides an additional layer of protection to block external actors from gaining access to it.

Secret Server also streamlines the connection process for organizations that use jump boxes to protect access to critical resources. Rather than taking time to inject unique credentials at every connection point, users can now use a single key to navigate an entire route from launch, to jump box, to destination within a single session. Users can launch the end-to-end route via Secret Server or the interface of the Connection Manager session management tool.

“Our continued focus on decreasing the steps required to safeguard secrets reduces the workload on security administrators and the attack surface area,” said Jon Kuhn, SVP of Product Management at ThycoticCentrify. “As an example, our master encryption key rotation capability is simple to implement and provides an additional layer of protection to block external actors from gaining access to all the other keys stored on the platform.”

Checkout enhancements remove bottlenecks

To enhance auditing and compliance, Secret Server ensures that only one privileged user at a time can use a secret. When secrets aren’t checked back into Secret Server after use, critical maintenance operations can’t be performed and productivity slows. The latest release automatically checks in secrets for API connections after expiration.

Additionally, users now have more visibility into remaining time on a secret checkout and can extend the checkout if required.

The latest release also includes enhancements to the Secret Server interface, logging, and reporting to increase usability and accessibility through improved keyboard navigation and screen reader hints.


You may also read!

Whose job is it to manage cybersecurity?

Paul Proctor, Distinguished VP Analyst at Gartner explains that one should stop pointing at the CIO when it come


Vectra acquires Siriux Security Technologies

Vectra AI announced the acquisition of Siriux Security Technologies, a leading provider of identity and software as a service (SaaS) posture management.


Safe Security in strategic collaboration with Infosys

Safe Security announced a strategic collaboration with Infosys to combine its SaaS platform SAFE with Infosys’s capabilities in quantitative cyber risk


Join Our Newsletter!

Love SecurityMEA? We love to tell you about our new stuff. Subscribe to newsletter!

Mobile Sliding Menu