It’s that time of year, when we get a peek at the new Nexus devices, as well as what Google has been hard at work on for Android. Android Lollipop definitely looks fantastic with its new “material design” overhaul of the UI. But beauty here is more than skin deep, as they say. One of the cool new features for us here at Centrify is “smart lock,” where the lock-screen can be bypassed when you are near trusted devices or locations. You can be sure we are hard at work here at Centrify to see where there might be business uses for this technology and what we can do to extend it even further. Notably absent from the Lollipop announcement were the “Android for work” components that we saw as part of the developer preview. We will have to wait and see if they are part of the initial release,…
SSH has become the defacto method to access UNIX and Linux computers over the network for several different use cases – from shell access or file transfers, to batch jobs that need to communicate with other computer or apps, to name a few. As with any remote access solution to a system that contains corporate data, centralized authentication and access controls are critical to ensure that only the right users can access that resource in line with the business needs. However the challenge is that SSH Server that is typically configured for remote access on nearly all UNIX and Linux systems supports many different methods of user authentication, and the configuration is defined locally on each system independently. Current implementations of SSH Server support authentication using one of the following methods: User ID & Password – A user or service needs to provide an identity and password to the remote system…
For all but the most curmudgeonly luddites among us, it’s become totally clear: “The cloud” is here to stay. The power and ubiquity of distributed compute and storage is all around us — at home, at work, and in our social lives. Recent advances in virtualization have brought us compute efficiency, storage consolidation, and system redundancy that was nearly unimaginable just 10 years ago. As a former IT guy, those benefits were always the promise of virtualization, but they seemed like a futuristic fantasy. A decade ago, my corporate file store consisted of primary storage with three disk shelves of expensive, fast spinning disks to store backed up data for 30 days. Then I had a filer to track what data was “fresh” and what was “stale.” Stale data was moved to secondary storage, which consisted of many more shelves of much slower disks. Then, after 90 days, all data…
Besides blogging about my take on our new product releases, interesting partnerships, and discussing trends in the security market, every six months or so I like to use this blog as a forum to give a business update to our customers and partners on Centrify itself. We find that many of our customers and partners are vested in us as a key technology provider and like to hear how we are doing. My last Centrify business update was just a few months ago, where I discussed our record Fiscal Year results (our FY ends in June).
Targeted attacks and security breaches continue to steal the headlines on a daily basis, and no person or organization is immune to the threats. Instances in which personal information is compromised have now become commonplace, as security threats have become increasingly complex, sophisticated and targeted. Unfortunately, with today’s mobile culture and BYOD workforce the threat landscape has broadened. And while the nature of attacks and threat vectors are evolving, traditional security is no longer a match for these attacks. IT departments do not have the resources to address each and every threat as it arises. As such, new technologies provide the security and flexibility to tackle these threats. Below we look at the top five reasons traditional enterprise security is no longer good enough. Advanced persistent threats are becoming more and more sophisticated in their execution, directly targeted at an enterprise’s most valuable assets and intellectual property. Stealthy and persistent in…
When we started Centrify more than 10 years ago, Identity and Access Management (“IAM”) was a big but rather static market. In 2008 — a few years after we formed Centrify — the analyst group IDC reported that the IAM market was $3.1 billion.
Centrify regional sales manager Derek Morwood explains that the 4Chan nude celebrity photo hack is the latest evidence that we need to move past passwords. The nub of the problem with password-based protection is that a memorable password means it is also more easily hackable. Derek says we can get rid of most passwords by using Identity Management (IdM) services such as Centrify’s Identity-as-a-Service (IDaaS) platform. The great news is that Centrify and its partner Samsung are now democratizing IdM so it is both accessible and affordable for virtually anyone who goes online.
We are happy to introduce Centrify for Mac 2014.1, which builds upon our best-in-class Active Directory integration to provide users with Single Sign-on (SSO) to our catalog of more than 3000 web and SaaS Apps through integration with the Centrify Cloud Service. The integration with the Centrify Cloud Service also provides IT admins with remote management of Macs as well as the user’s mobile devices. This release also provides expanded support for Smart Cards with integrations into other popular applications such as Firefox, Thunderbird and the DoD Encryption Wizard. We built Centrify for Mac to empower Corporate IT to manage Macs and now mobile devices within the Windows centric environments these devices are being brought into. Since many of the Macs coming into the environment are laptops, we wanted to ensure that IT is in control of the laptop even when they are taken home or on business trips. The Centrify…
Over the last few months, there have been exciting market developments in the enterprise mobility space highlighting two macro trends: #1 The need for mobile device vendors to deliver more than just a device but also a packaged mobile device and app management solution that enables their devices readily for business use and adoption by enterprises (Cases in point: Apple + IBM partnership and Blackberry “EZ Pass” EMM). #2 The rise of identity to be a clear driver and differentiator for enterprise mobility management vendors. With the convergence of cloud-based Identity and Access Management (“IAM”) and Enterprise Mobile Management (“EMM”) feature sets, many vendors are now bundling these solutions together (Cases in point: Microsoft Enterprise Mobility Suite and VMware Workspace Suite, with Centrify being the visionary and leader in this convergence by being the first to deliver an integrated EMM and IAM offering). In this blog I will outline how…
Centrify will provide day one support for iOS 8 for customers of its cloud based Identity as a Service and mobility management solution. Anticipation for the release of Apple’s latest mobile OS is very high, and if history is any indication, we expect rapid adoption. Centrify has been diligently working with the beta releases of iOS 8 to ensure a smooth transition for already enrolled devices and an improved on-boarding experience for new enrollments.
Keep up to date with Centrify and with current IT Security best practices by subscribing to our blogs. Topics include:
Centrify CEO Tom Kemp, an industry expert in security and infrastructure software, discusses market and technology issues around the disruption occurring in the Identity and Access Management market due to the cloud, mobile and consumerization of IT trends occurring in today's IT environment.
Senior Director of Business Development
Senior Product Manager, Centrify Server Suite
VP of Product Management
Director of Product Management
Senior Director of Product Management
Chief Technical Officer and Founder
SVP of Products and Chief Product Officer
SVP Business Development
Technical Marketing Director