Centrify Perspective

Are Celebrities Weaker than the Rest of Us?

barryscott
By Barry Scott, October 28, 2014

With the recent spate of high-profile hacks, and yet another report of nude celebrity photographs being leaked online, it’s worth posing the question, “Are celebrities any worse at choosing their passwords, or are we all as bad as each other?” As more and more pictures are released online, the question “How has this happened?” is a growing concern. While the exact method used remains unknown, it has been suggested that brute force methods were used alongside more targeted phishing attacks in order to steal personal photographs from celebrity accounts. A “brute force” attack relies on malicious, automated software to repeatedly guess large numbers of passwords in an attempt to discover the correct one. Now, passwords are not a new concept, and using word and character sequences for authentication purposes is common practice. We all have passwords that we use on a daily basis, with numerous accounts and information to memorize. Chances…

Hot Topics

Invasion through Identity

bradzehring
By Brad Zehring, October 27, 2014

In July, JP Morgan Chase discovered that 90 or so of its servers were breached by external hackers. As The New York Times reported, “By the time the bank’s security team discovered the breach in late July, hackers had already obtained the highest level of administrative privilege to dozens of the bank’s computer servers.” According to the article, it is still unclear how hackers managed to gain such deep access. Every organization in the world with significant financial assets is under constant Web-based attack from bad guys. Over the past two years, there’s been an impressive (or terrifying, depending on your point of view) increase in both the success of these attacks and the size and scope of the organizations affected. Virtually all of these hacks have one thing in common. They attack identity; specifically, they leverage vulnerabilities in software or business processes to subsequently elevate privilege until they reach…

Partner Corner

Centrify and AVG Partnership Helps MSPs Reach Above The Cloud

benrice
By Ben Rice, October 22, 2014

What is that? It is a newly discovered, but barely understood phenomenon called a Sprite.

sprite-580x384Sprites are large-scale electrical discharges that occur high above thunder clouds, giving rise to an amazing range of shapes flickering in the night sky. So why am I writing about this in the Centrify Partner blog? With our announcement today about AVG choosing Centrify to power its new AVG CloudCare™ IDaaS and EMM offerings, we are helping thousands of MSP (Managed Service Provider) organizations become Sprites — with the vantage point and capability to rise high above all their customers’ clouds and manage them using CloudCare IDaaS.

Centrify Perspective

Gartner Symposium/IT Expo 2014 Wrap-Up

jonathanbensen
By Jonathan Bensen, October 20, 2014

I recently attended the Gartner Symposium/IT Expo in Orlando with the Centrify team. For those of you not familiar with this event, it draws a lot of CIO’s/CSO’s and provides many timely and informative sessions for executive attendees. As a result, the booth conversations are often some of the best conversations for me as part of the Centrify Product team. I get first-hand accounts of the challenges and initiatives that enterprise IT teams are facing, and discuss the business and technical solutions they are looking for to accomplish their goals. Walking around the show floor, and browsing the sessions, it’s clear that Centrify is in a great place to address the current concerns of the Enterprise IT market. Of the hundreds of sessions at the event, 112 were mobile focused, 62 were security focused, and there were another 100 sessions around cloud. That’s a pretty good indication of what’s top…

Centrify Perspective

Halloween Season Brings New Candy from Google, Android Lollipop!

jonathanbensen
By Jonathan Bensen, October 16, 2014

It’s that time of year, when we get a peek at the new Nexus devices, as well as what Google has been hard at work on for Android. Android Lollipop definitely looks fantastic with its new “material design” overhaul of the UI. But beauty here is more than skin deep, as they say. One of the cool new features for us here at Centrify is “smart lock,” where the lock-screen can be bypassed when you are near trusted devices or locations. You can be sure we are hard at work here at Centrify to see where there might be business uses for this technology and what we can do to extend it even further. Notably absent from the Lollipop announcement were the “Android for work” components that we saw as part of the developer preview. We will have to wait and see if they are part of the initial release,…

Centrify Perspective

Mitigating Vulnerabilities Related to Unmanaged SSH Keys with Kerberos

davidmcneely
By David McNeely, October 15, 2014

SSH has become the defacto method to access UNIX and Linux computers over the network for several different use cases – from shell access or file transfers, to batch jobs that need to communicate with other computer or apps, to name a few. As with any remote access solution to a system that contains corporate data, centralized authentication and access controls are critical to ensure that only the right users can access that resource in line with the business needs. However the challenge is that SSH Server that is typically configured for remote access on nearly all UNIX and Linux systems supports many different methods of user authentication, and the configuration is defined locally on each system independently. Current implementations of SSH Server support authentication using one of the following methods: User ID & Password – A user or service needs to provide an identity and password to the remote system…

Centrify Perspective

Cloud is the Future and Mobile is the Driver. Are You Ready?

chriswebber
By Chris Webber, October 9, 2014

For all but the most curmudgeonly luddites among us, it’s become totally clear: “The cloud” is here to stay. The power and ubiquity of distributed compute and storage is all around us — at home, at work, and in our social lives. Recent advances in virtualization have brought us compute efficiency, storage consolidation, and system redundancy that was nearly unimaginable just 10 years ago.  As a former IT guy, those benefits were always the promise of virtualization, but they seemed like a futuristic fantasy. A decade ago, my corporate file store consisted of primary storage with three disk shelves of expensive, fast spinning disks to store backed up data for 30 days. Then I had a filer to track what data was “fresh” and what was “stale.” Stale data was moved to secondary storage, which consisted of many more shelves of much slower disks. Then, after 90 days, all data…

Secure Thinking by Tom Kemp

Continued Centrify Momentum

tomkemp
By Tom Kemp, October 7, 2014

Besides blogging about my take on our new product releases, interesting partnerships, and discussing trends in the security market, every six months or so I like to use this blog as a forum to give a business update to our customers and partners on Centrify itself. We find that many of our customers and partners are vested in us as a key technology provider and like to hear how we are doing. My last Centrify business update was just a few months ago, where I discussed our record Fiscal Year results (our FY ends in June).

Centrify Perspective

Five Reasons Traditional Enterprise Security is no Longer Good Enough

barryscott
By Barry Scott, October 1, 2014

Targeted attacks and security breaches continue to steal the headlines on a daily basis, and no person or organization is immune to the threats. Instances in which personal information is compromised have now become commonplace, as security threats have become increasingly complex, sophisticated and targeted. Unfortunately, with today’s mobile culture and BYOD workforce the threat landscape has broadened. And while the nature of attacks and threat vectors are evolving, traditional security is no longer a match for these attacks. IT departments do not have the resources to address each and every threat as it arises. As such, new technologies provide the security and flexibility to tackle these threats. Below we look at the top five reasons traditional enterprise security is no longer good enough. Advanced persistent threats are becoming more and more sophisticated in their execution, directly targeted at an enterprise’s most valuable assets and intellectual property. Stealthy and persistent in…

Secure Thinking by Tom Kemp

The Cloud is Disrupting and Defragmenting the Identity Market

tomkemp
By Tom Kemp, September 29, 2014

When we started Centrify more than 10 years ago, Identity and Access Management (“IAM”) was a big but rather static market. In 2008 — a few years after we formed Centrify — the analyst group IDC reported that the IAM market was $3.1 billion.

Centrify

Centrify Blog

Keep up to date with Centrify and with current IT Security best practices by subscribing to our blogs. Topics include:

TwitterFollow Centrify on Twitter
TwitterFollow Centrify on LinkedIn

Tom Kemp

Secure Thinking
by Tom Kemp

Centrify CEO Tom Kemp, an industry expert in security and infrastructure software, discusses market and technology issues around the disruption occurring in the Identity and Access Management market due to the cloud, mobile and consumerization of IT trends occurring in today's IT environment.

Tom’s Latest Posts

Continued Centrify Momentum

The Cloud is Disrupting and Defragmenting the Identity Market

Updates to Centrify Server Suite and our Express for *nix Program

Big Centrify Momentum in the Cloud Identity Market

Comparing Identity and Access Management as a Service (“IDaaS”) Solutions


TwitterFollow Tom on Twitter

Popular Tags


Our Bloggers

Ben Rice
Ben Rice

Senior Director of Business Development


Brad Zehring
Brad Zehring

Senior Product Manager, Centrify Server Suite


Darren Gross
Darren Gross

Regional Director


David McNeely
David McNeely

VP of Product Management


Jeff Friedsam
Jeff Friedsam

Director of Product Management


Matt Hur
Matt Hur

Senior Director of Product Management


Paul Moore
Paul Moore

Chief Technical Officer and Founder


Bill Mann
Bill Mann

SVP of Products and Chief Product Officer


Shreyas Sadalgi
Shreyas Sadalgi

SVP Business Development


Jonathan Bensen
Jonathan Bensen

Technical Marketing Director