It's All About Identity

Ditch Your Passwords Once and For All

derekmorwood
By Derek Morwood, January 28, 2015

It’s time to ditch passwords. The core problem with passwords is that they have passed their use-by date. Like the swords, spears and shields of yore, we can finally retire the password to the dustbin of history because there is a better way.

Centrify Perspective

Shadow IT – Back Into the Light

barryscott
By Barry Scott, January 26, 2015

“Shadow IT” hints at people doing bad things to deliberately make life difficult for the IT Department, and sounds as if the phrase probably originated in IT. Shadow IT often refers to people in a company using SaaS applications that have not been officially blessed by IT. However, they do so not just to annoy IT, but because they’ve found applications and tools that make their lives easier, allow them to work faster in a way that suits them, and ultimately make the company (and hopefully themselves) more successful. In this blog post I’ll attempt to explain how IDaaS (Identity as a Service) can be used to help companies address issues brought about by Shadow IT. The main problem with Shadow IT is security. End-users and their lines of business seek out applications that help them work, whereas the focus of IT is security. And as IT is usually responsible…

Centrify Perspective

Top 10 IT Productivity Gains with Centrify Privileged Identity Management

tonygoulding
By Tony Goulding, January 22, 2015

Wouldn’t it be nice for a change to deploy an IT security solution that doesn’t sacrifice usability and productivity for security? I’m sure many of you have had the experience of introducing a new security product that, while solving a real security problem, just makes life hell for users. These can create new hurdles, introduce complexity, and generally take a toll on uses’ day-to-day productivity. Maybe you’re a user on the receiving end, not sure why IT has ‘decided’ to make your life hard. Then again maybe you’re the administrator more aware of the security benefits, but nonetheless, you are impacted by a demanding daily care and feeding regimen. This is the reason we love security at Centrify. Because it’s hard. It’s hard to get right. But when done right, it’s a wonderful thing – solving a real set of compelling business problems without driving down productivity. And with a…

Secure Thinking by Tom Kemp

2014: Another Record Year!

tomkemp
By Tom Kemp, January 20, 2015

We find that many of our customers and partners are vested in us as a key technology provider and we like to hear on occasion how our business is doing. With that in mind, I am pleased to announce that calendar year 2014 was another banner and record year for Centrify across all the key performance indicators we track. For example, the last few quarters of 2014 saw us growing sales more than 40 percent year over year. We also grew the company in terms of people, with the number of employees growing by more than 30 percent — we now number more than 400 people strong.

Centrify Perspective

Innovative New Program for MSPs to Offer Cloud Identity to their Customers

nathanadams
By Nathan Adams, January 14, 2015

It’s been an exciting year since we launched the CCPN (Centrify Channel Partner Network) in January of 2014. We are now continuing to evolve our partner program based on industry changes and demands. Centrify recently announced a new partner program level within our Channel Partner Network. Our announcement of MSP capabilities to our product has opened up a new area of potential partners in the mid-market space, in addition to satisfying the demand from our current partners that focus on delivering managed services to their customers. As I look back at all we have accomplished in the past year, there are some very specific components that drove and will continue to drive, this success.

Centrify Perspective

Centrify and the SANS Top 20

tomstanton
By Tom Stanton, January 9, 2015

I know a very successful high school wrestling coach who has this running bit he does all the time at social events, cocktail parties, and random water cooler conversations.  When asked why his teams are consistently good year after year, he always responds with, “I’ve discovered the ancient secret to staying extremely physically fit.” After a bit of egging on, he’ll reluctantly divulge this long lost tidbit of knowledge he stumbled upon while reading some ancient scrolls. “The secret to staying extremely physically fit,” he begins, always followed by an over-the-top dramatic pause, “is to eat right and exercise.” Just like maintaining excellent physical fitness, creating and maintaining a high level of IT security fitness is really a matter of practical sense, with of course the devil being in the details. This is the last of a 3 part blog in which I’m discussing three federal and industry standard security…

Secure Thinking by Tom Kemp

2014: The Nexus between Identity and Today’s Headline Grabbing Security Breaches

tomkemp
By Tom Kemp, January 6, 2015

As someone who has been in the enterprise IT industry for 25+ years, it has always been the case where “industry” people (fellow Silicon Valley entrepreneurs, VCs, employees of fellow enterprise tech companies here in Silicon Valley, IT people, etc.) have understood what my company Centrify does vis a vis identity management. They could quickly grasp our special technical sauce and go-to-market strategy. Meanwhile, it was typically the case that “civilians” (i.e. non-IT people, e.g. my relatives in the Midwest) just knew at a high-level that “Tom works in the technology industry.” They could not really understand what Centrify does after hearing me summarize our solution (but I did get some patient smiles J), and our value proposition was certainly not readily apparent.

Hot Topics

Another Breach! Security Controls Shouldn’t be that Hard!

matthur
By Matt Hur, December 29, 2014

I just read an interesting article in NetworkWorld about a breach at a major financial institution. The article pointed out that breach resulted from a lack of deploying adequate security controls on the corporate servers. The article goes on to state, “Strong access management policies and network segmentation are key to limiting the extent of damage that attackers can do once they gain a foothold inside a network. However … implementing uniform security controls across their vast networks can be difficult because they often have to integrate large numbers of new systems with different levels of security as a result of acquiring other companies.”

It's All About Identity

Identity Management for Mainframe-Powered Linux (zLinux – Linux on IBM System z Machines)

matthur
By Matt Hur, December 22, 2014

Although many in the industry (perhaps our younger colleagues) look at mainframes like remnants of a bygone era of computing, it is interesting to note that mainframes are still powering key applications and processes that make businesses run. There is no doubt that sometimes “big iron” is needed to provide efficient compute power delivery and consolidation of resources.

Centrify Perspective

Who is Next? What the Latest High-Profile Security Breaches Should Tell Us About Passwords

barryscott
By Barry Scott, December 15, 2014

We previously posted a blog looking at the recent spate of high-profile hacks, and posed the question, “Are celebrities any worse at choosing their passwords, or are we all as bad as each other?” The question now seems to be “Who’s next?” The recent iCloud hacks proved that we are all at risk of a security breach, whether we are a celebrity, with a large or small organization, or are simply a consumer using an online service or application. In reality, the question should not be “Who’s next?” Instead, our main considerations should be “How do we learn from this?”, “How do we ensure that history doesn’t repeat itself?” and “How do we avoid becoming tomorrow’s headline?” There is no definitive means of securing sensitive data, and the burden of protecting personal information seems to be a challenging issue resting on the shoulders of many. Password protection has been the…

Centrify

Centrify Blog

Keep up to date with Centrify and with current IT Security best practices by subscribing to our blogs. Topics include:

TwitterFollow Centrify on Twitter
TwitterFollow Centrify on LinkedIn
RssSubscribe to rss feed

Tom Kemp

Secure Thinking
by Tom Kemp

Centrify CEO Tom Kemp, an industry expert in security and infrastructure software, discusses market and technology issues around the disruption occurring in the Identity and Access Management market due to the cloud, mobile and consumerization of IT trends occurring in today's IT environment.

Tom’s Latest Posts

2014: Another Record Year!

2014: The Nexus between Identity and Today’s Headline Grabbing Security Breaches

Comparing Centrify to Free Solutions such as Red Hat SSSD for Integrating Linux Systems with Active Directory

Continued Centrify Momentum

The Cloud is Disrupting and Defragmenting the Identity Market


TwitterFollow Tom on Twitter

Popular Tags


Our Bloggers

Barry Scott
Barry Scott

CTO - EMEA, Sales & Support


Ben Rice
Ben Rice

Senior Director of Business Development


Bill Mann
Bill Mann

SVP of Products and Chief Product Officer


Brad Zehring
Brad Zehring

Senior Product Manager, Centrify Server Suite


Chris Webber
Chris Webber

Senior Manager - Product Marketing, Marketing


Darren Gross
Darren Gross

Regional Director


David McNeely
David McNeely

VP of Product Management


Jeff Friedsam
Jeff Friedsam

Director of Product Management


Jonathan Bensen
Jonathan Bensen

Technical Marketing Director


Matt Hur
Matt Hur

Senior Director of Product Management


Paul Moore
Paul Moore

Chief Technical Officer and Founder


Shreyas Sadalgi
Shreyas Sadalgi

SVP Business Development


Sumana Annam
Sumana Annam

Director of Product Management