Occasionally I get asked by prospective customers how our Centrify Server Suite compares to a “free” offering such as Red Hat SSSD for the integration of Linux systems with Active Directory. Usually this question pops up whenever a Linux OS vendor (e.g. Red Hat) introduces a new version of Linux (e.g. RHEL 7) that has a new or improved feature (e.g. SSSD) that claims “Improved Active Directory integration” in the “New Features” document for that release of the OS.
Questions we’re asked by new Centrify Server Suite for Windows (CSS) customers often center on the “how” of implementing granular Windows privilege management. How do we deploy it? What are some of the best practices you’ve found? How can we get some broad controls in place now, without waiting to boil the ocean of every last detailed right for each of our hundreds of admins? In this blog, I’ll try to give some straightforward answers. Let’s start by taking a common implementation use case and learning how to configure Centrify Server Suite for Windows to handle it. The use case: Enable a user/admin to install with local admin rights any application digitally signed by Adobe. Server Suite for Windows can do this easily. CSS uses role-based access control to manage the assignment of privileges (the rights to elevate privilege on applications), so we’ll create a role, assign it to a…
There’s a humorous saying I often hear in IT Security circles that goes something like this: “If a CISO has the choice between being compliant or being secure, compliance always wins because that’s what will keep them out of prison.” The reality is that most organizations need to increase both as efficiently as possible, and this is where Centrify can help. The Centrify Server Suite leverages your existing Active Directory to secure your systems from identity related risks and attacks. Additionally it helps with compliance for a large number of federal and industry standard security controls, such as those found in : (1) NIST 800-53 Security Control Requirements, (2) DHS’ Continuous Diagnostics and Mitigation (CDM) Functional Area Requirements, and (3) SANS Top 20 Critical Controls. In this three-part blog I’ll be discussing how the Centrify Server Suite maps to specific requirements of each, beginning with NIST 800-53. The National Institute…
I am tired of hearing about company’s losing customer data and how it’s becoming a commonplace expectation that a customer should expect this to happen. In this day and age with all of the technology available it seems we can’t get the simple principles of security right. Pick any of the breaches that have happened in the last couple of years and had those corporations followed good security practices those breaches would not have never happened.
Centrify got our start in the security and identity business many years ago by starting in the datacenter and focusing on the problems of too many identity silos, disparate privilege management policies, and difficulty in tracing activity back to individuals. We saw back then that identity would be a key element of an IT strategy as system environments continue to get more diverse and deployed in more dynamic ways.
Back in my IT days, I was – among various responsibilities – tasked with managing user access from the time they were hired to the time they moved on (or were fired.) As I will discuss, this was often the most stressful part of my day-to-day. Now with the explosion of mobile users and SaaS applications such as Google Apps, Office 365 and hundreds of other apps, managing access has become even more error-prone and stressful. But they don’t have to be.
Here is a novel idea — Identity-as-a-Service (IDaaS) with Enterprise Mobile Management (EMM)-as-a-Service — but in combination. This is exactly what Centrify did when launching the Centrify User Suite in 2013. An industry first solution, built from the ground up for the mobile first, identity first and cloud first world of today and tomorrow.
Two once-distinct markets are on course for convergence: mobility and identity. It’s a merger that will drive success for vendors that get the blend right—and could spell trouble for vendors that once prospered by focusing on mobility or identity alone.
Only a couple of years ago, emerging companies that specialized in either mobility or identity did quite well. Identity and access management (IAM) vendors like Okta rose to prominence by enabling enterprise users to easily access their various cloud applications, such as Salesforce, Workday and Taleo, via single sign-on. Meanwhile, at the other end of the spectrum, enterprise mobility management (EMM) vendors like AirWatch (acquired by VMware) and MobileIron (NASDAQ: MOBL) made a good living by helping organizations manage an ever-increasing array of mobile devices.
You’ve heard us talking quite a bit about how Centrify transformed traditional application “single sign-on” (SSO) solutions for desktops to “Zero Sign On” for mobile apps and devices. You’ve also heard why the world’s number one mobile device manufacturer chose to partner with Centrify for delivering mobile identity management to their millions of users.
Last week Centrify announced that AVG Technologies selected Centrify’s integrated cloud-based identity management (IDaaS) and enterprise mobility management (EMM) solution for the AVG CloudCare service. The partnership marks a significant opportunity for small- and medium-sized businesses (SMBs) that are increasingly looking to adopt cloud and mobile apps for business purposes, but don’t have the time or resources available to manage the IT challenges and complexity this transition entails. This is also a huge opportunity for managed service providers (MSPs) who are implementing and managing IT services on SMBs’ behalf, while also playing a consultative role with respect to IT opportunities and challenges. This is particularly interesting to me as I was involved in a similar deal to incorporate backup into the cloud when I ran the Arcserve business. Now, the market is moving to higher-valued IT Management, and Identity and Mobility certainly qualify. That said, I’d like to provide some…
Keep up to date with Centrify and with current IT Security best practices by subscribing to our blogs. Topics include:
Centrify CEO Tom Kemp, an industry expert in security and infrastructure software, discusses market and technology issues around the disruption occurring in the Identity and Access Management market due to the cloud, mobile and consumerization of IT trends occurring in today's IT environment.
CTO - EMEA, Sales & Support
Senior Director of Business Development
SVP of Products and Chief Product Officer
Senior Product Manager, Centrify Server Suite
Senior Manager - Product Marketing, Marketing
VP of Product Management
Director of Product Management
Technical Marketing Director
Senior Director of Product Management
Chief Technical Officer and Founder
SVP Business Development
Director of Product Management