Secure Thinking by Tom Kemp

Comparing Centrify to Free Solutions such as Red Hat SSSD for Integrating Linux Systems with Active Directory

tomkemp
By Tom Kemp, November 25, 2014

Occasionally I get asked by prospective customers how our Centrify Server Suite compares to a “free” offering such as Red Hat SSSD for the integration of Linux systems with Active Directory. Usually this question pops up whenever a Linux OS vendor (e.g. Red Hat) introduces a new version of Linux (e.g. RHEL 7) that has a new or improved feature (e.g. SSSD) that claims “Improved Active Directory integration” in the “New Features” document for that release of the OS.

It's All About Identity

Best Practices for Initial Deployment of Windows Privilege Management

bradzehring
By Brad Zehring, November 24, 2014

Questions we’re asked by new Centrify Server Suite for Windows (CSS) customers often center on the “how” of implementing granular Windows privilege management. How do we deploy it? What are some of the best practices you’ve found? How can we get some broad controls in place now, without waiting to boil the ocean of every last detailed right for each of our hundreds of admins? In this blog, I’ll try to give some straightforward answers. Let’s start by taking a common implementation use case and learning how to configure Centrify Server Suite for Windows to handle it. The use case: Enable a user/admin to install with local admin rights any application digitally signed by Adobe. Server Suite for Windows can do this easily. CSS uses role-based access control to manage the assignment of privileges (the rights to elevate privilege on applications), so we’ll create a role, assign it to a…

Centrify Perspective

Using Centrify for NIST 800-53 Compliance

tomstanton
By Tom Stanton, November 19, 2014

There’s a humorous saying I often hear in IT Security circles that goes something like this: “If a CISO has the choice between being compliant or being secure, compliance always wins because that’s what will keep them out of prison.” The reality is that most organizations need to increase both as efficiently as possible, and this is where Centrify can help. The Centrify Server Suite leverages your existing Active Directory to secure your systems from identity related risks and attacks. Additionally it helps with compliance for a large number of federal and industry standard security controls, such as those found in : (1) NIST 800-53 Security Control Requirements, (2) DHS’ Continuous Diagnostics and Mitigation (CDM) Functional Area Requirements, and (3) SANS Top 20 Critical Controls. In this three-part blog I’ll be discussing how the Centrify Server Suite maps to specific requirements of each, beginning with NIST 800-53. The National Institute…

Centrify Perspective

Fundamentals in Securing your Customers’ Data

deanthompson
By Dean Thompson, November 19, 2014

I am tired of hearing about company’s losing customer data and how it’s becoming a commonplace expectation that a customer should expect this to happen. In this day and age with all of the technology available it seems we can’t get the simple principles of security right. Pick any of the breaches that have happened in the last couple of years and had those corporations followed good security practices those breaches would not have never happened.

It's All About Identity

Identity, Privilege and Compliance on Red Hat Systems

matthur
By Matt Hur, November 17, 2014

Centrify got our start in the security and identity business many years ago by starting in the datacenter and focusing on the problems of too many identity silos, disparate privilege management policies, and difficulty in tracing activity back to individuals. We saw back then that identity would be a key element of an IT strategy as system environments continue to get more diverse and deployed in more dynamic ways.

Centrify Perspective

Provisioning and the Termination Nightmare

chriswebber
By Chris Webber, November 12, 2014

Back in my IT days, I was – among various responsibilities – tasked with managing user access from the time they were hired to the time they moved on (or were fired.) As I will discuss, this was often the most stressful part of my day-to-day. Now with the explosion of mobile users and SaaS applications such as Google Apps, Office 365 and hundreds of other apps, managing access has become even more error-prone and stressful. But they don’t have to be.

Centrify Perspective

Mobile First + Identity First + Cloud First = Centrify User Suite

billmann
By Bill Mann, November 10, 2014

Here is a novel idea — Identity-as-a-Service (IDaaS) with Enterprise Mobile Management (EMM)-as-a-Service — but in combination. This is exactly what Centrify did when launching the Centrify User Suite in 2013. An industry first solution, built from the ground up for the mobile first, identity first and cloud first world of today and tomorrow.

Mobile Frontier

Better Together: Why Identity and Mobility are about to Converge

billmann
By Bill Mann, November 7, 2014

Two once-distinct markets are on course for convergence: mobility and identity. It’s a merger that will drive success for vendors that get the blend right—and could spell trouble for vendors that once prospered by focusing on mobility or identity alone.

Only a couple of years ago, emerging companies that specialized in either mobility or identity did quite well. Identity and access management (IAM) vendors like Okta rose to prominence by enabling enterprise users to easily access their various cloud applications, such as Salesforce, Workday and Taleo, via single sign-on. Meanwhile, at the other end of the spectrum, enterprise mobility management (EMM) vendors like AirWatch (acquired by VMware) and MobileIron (NASDAQ: MOBL) made a good living by helping organizations manage an ever-increasing array of mobile devices.

Partner Corner

Getting Mobile Identity Right: Why Samsung Partnered with Centrify

shreyassadalgi
By Shreyas Sadalgi, November 5, 2014

You’ve heard us talking quite a bit about how Centrify transformed traditional application “single sign-on” (SSO) solutions for desktops to “Zero Sign On” for mobile apps and devices. You’ve also heard why the world’s number one mobile device manufacturer chose to partner with Centrify for delivering mobile identity management to their millions of users.

Centrify Perspective

RMM Meets IDaaS: Why MSPs are the New VARs

billmann
By Bill Mann, November 4, 2014

Last week Centrify announced that AVG Technologies selected Centrify’s integrated cloud-based identity management (IDaaS) and enterprise mobility management (EMM) solution for the AVG CloudCare service. The partnership marks a significant opportunity for small- and medium-sized businesses (SMBs) that are increasingly looking to adopt cloud and mobile apps for business purposes, but don’t have the time or resources available to manage the IT challenges and complexity this transition entails. This is also a huge opportunity for managed service providers (MSPs) who are implementing and managing IT services on SMBs’ behalf, while also playing a consultative role with respect to IT opportunities and challenges. This is particularly interesting to me as I was involved in a similar deal to incorporate backup into the cloud when I ran the Arcserve business. Now, the market is moving to higher-valued IT Management, and Identity and Mobility certainly qualify. That said, I’d like to provide some…

Centrify

Centrify Blog

Keep up to date with Centrify and with current IT Security best practices by subscribing to our blogs. Topics include:

TwitterFollow Centrify on Twitter
TwitterFollow Centrify on LinkedIn
RssSubscribe to rss feed

Tom Kemp

Secure Thinking
by Tom Kemp

Centrify CEO Tom Kemp, an industry expert in security and infrastructure software, discusses market and technology issues around the disruption occurring in the Identity and Access Management market due to the cloud, mobile and consumerization of IT trends occurring in today's IT environment.

Tom’s Latest Posts

Comparing Centrify to Free Solutions such as Red Hat SSSD for Integrating Linux Systems with Active Directory

Continued Centrify Momentum

The Cloud is Disrupting and Defragmenting the Identity Market

Updates to Centrify Server Suite and our Express for *nix Program

Big Centrify Momentum in the Cloud Identity Market


TwitterFollow Tom on Twitter

Popular Tags


Our Bloggers

Barry Scott
Barry Scott

CTO - EMEA, Sales & Support


Ben Rice
Ben Rice

Senior Director of Business Development


Bill Mann
Bill Mann

SVP of Products and Chief Product Officer


Brad Zehring
Brad Zehring

Senior Product Manager, Centrify Server Suite


Chris Webber
Chris Webber

Senior Manager - Product Marketing, Marketing


Darren Gross
Darren Gross

Regional Director


David McNeely
David McNeely

VP of Product Management


Jeff Friedsam
Jeff Friedsam

Director of Product Management


Jonathan Bensen
Jonathan Bensen

Technical Marketing Director


Matt Hur
Matt Hur

Senior Director of Product Management


Paul Moore
Paul Moore

Chief Technical Officer and Founder


Shreyas Sadalgi
Shreyas Sadalgi

SVP Business Development


Sumana Annam
Sumana Annam

Director of Product Management