Partner Corner

Samsung Partners with Centrify to Democratize Mobile Management

shreyassadalgi
By Shreyas Sadalgi, September 18, 2014

Over the last few months, there have been exciting market developments in the enterprise mobility space highlighting two macro trends: #1 The need for mobile device vendors to deliver more than just a device but also a packaged mobile device and app management solution that enables their devices readily for business use and adoption by enterprises (Cases in point:  Apple + IBM partnership and Blackberry “EZ Pass” EMM). #2 The rise of identity to be a clear driver and differentiator for enterprise mobility management vendors. With the convergence of cloud-based Identity and Access Management (“IAM”) and Enterprise Mobile Management (“EMM”) feature sets, many vendors are now bundling these solutions together (Cases in point: Microsoft Enterprise Mobility Suite and VMware Workspace Suite, with Centrify being the visionary and leader in this convergence by being the first to deliver an integrated EMM and IAM offering). In this blog I will outline how…

Hot Topics

Centrify Provides Day 1 Support for iOS 8

peterhavens1
By Peter Havens, September 17, 2014

Centrify will provide day one support for iOS 8 for customers of its cloud based Identity as a Service and mobility management solution. Anticipation for the release of Apple’s latest mobile OS is very high, and if history is any indication, we expect rapid adoption. Centrify has been diligently working with the beta releases of iOS 8 to ensure a smooth transition for already enrolled devices and an improved on-boarding experience for new enrollments.

It's All About Identity

Can Privileged Identity Management Help Defend Against Advanced Persistent Threats?

jeffweinberger
By Jeff Weinberger, September 16, 2014

The prospect of being breached by an advanced persistent threat (APT) can be, in a word, scary. Privileged identity management (PIM) strategies hold the prospect of significantly reducing the likelihood of a successful attack. This is the first in a series of posts about how PIM can offer an effective line of defense against APTs. The good news The good news is that most organizations are aware of and, in some way, are prepared to handle advanced persistent threats. According to a recent survey of security and risk professionals on APTs published by ISACA: 66% of organizations think they are a likely target for some variety of APT (but only 21% have actually been attacked) More than half of the organizations believe that they can detect, respond to, and stop an attack should it occur More than half of organizations who think they could be a target have updated their…

It's All About Identity

Death to Passwords! They Don’t Work, So What’s Next?

ronallmand
By Ron Allmand, September 3, 2014

We’ve all seen the Hollywood movies. Retinal eye scanners that open secret passageways. Facial recognition systems and handprint scanners to verify that the good guys are who they say they are. In truth, corporate security in the real world is much more mundane. The most common model requires employees to enter a six or eight character password to access a secure environment. For many years, that model was good enough, even though many man hours were spent resetting or unlocking accounts when the password just couldn’t be remembered. Today, the model is broken because passwords, as they exist, have outlived their usefulness. In the old model, the workplace was always on-premise and people spent most of their time in their physical place of employment. But in today’s society, workers are just as apt to be in their own living room, in a client’s conference room, or in an overseas hotel…

Hot Topics

The Centrify Server Suite 2014.1 Update has Arrived

bradzehring
By Brad Zehring, August 27, 2014

The Centrify Server Suite 2014.1 update is available now on the Centrify Customer Download Center! Engineering has been working hard on this release for several months, and we’re pleased to post its availability today. They’ve put in a lot of tweaks and improvements based on customer feedback, and I know some of you will find these to be very welcome enhancements. We added support for new clients, too, including RHEL 7, OLE 7, and Windows Server Core. That last one is something I think it going to be increasingly important for those with Windows Server deployments. Here’s a bit on some of the new enhancements. We added a way to search for audited user sessions based on the time someone ran a particular command, which makes it easier to ensure regulatory compliance. It’s also a nice enhancement to help find the root cause of trouble ticket issues. We added a (much-requested) feature to Deployment Manager,…

Secure Thinking by Tom Kemp

Updates to Centrify Server Suite and our Express for *nix Program

tomkemp
By Tom Kemp, August 27, 2014

At Centrify we have more than 5000 customers — including nearly half the Fortune 50 — who use our Centrify Server Suite, not only as an “Active Directory Bridge” to UNIX/Linux/Mac but also for privileged access management across Windows and *nix systems, privileged user activity monitoring, as well as for dynamic isolation of cross-platform systems. In fact industry analysts such as Forrester and Gartner say we are one of the top vendors in this high-growth area of identity management from a technology, vision and installed base perspective (e.g. see this Forrester report on Privileged Identity Management). We are continuing to invest heavily in our market-leading Server Suite and are in the midst of a few major projects to integrate our Server Suite with our Centrify Cloud Service — stay tuned for exciting details in the coming months.

Mobile Frontier

Identity Is the Clear Differentiator for Enterprise Mobility Management (EMM)

billmann
By Bill Mann, August 21, 2014

Centrify was the first company to unite Enterprise Mobility Management (EMM) and Identity and Access Management (IAM). Now we hear rumblings that VMware and Microsoft are pursuing similar strategies. But not all integrations are created equal. First, let’s review what’s happening in the market that is leading to identity becoming a core component of enterprise mobile management. At the macro level, there are three key shifts driving this change in the market: MDM has moved to EMM:  Mobile Device Management is now a commodity, so MDM vendors have had to reinvent themselves to become EMM vendors. Their focus has shifted from device management to mobile application management (MAM) and mobile content management (MCM). Why? Because ultimately our devices are just devices — they are commodity items. But the apps we use, the content within those apps, and our relationship to our apps is vitally important—for both work and play. Features of…

Hot Topics

Don’t Let Security Go with Your Staff

barryscott
By Barry Scott, August 15, 2014

At some point or another we have all left a job. If you’re one of the lucky ones, it’s because you found something better. You’ll have farewell drinks, and possibly a good-bye gift or good luck card to see you on your way. If you were one of the unlucky ones, you may have been let go because of innumerable reasons beyond your or your employer’s control, and have left feeling pretty hard done by.

Hot Topics

Passwords are the Problem

chriswebber
By Chris Webber, August 13, 2014

Hackers are quickly moving beyond stealing credit card data, and instead looking for our usernames and passwords, which are a much bigger route to our money.

What if you only had one key to every lock in your life – house, car, office, kid’s dorm room, etc – then imagine that key unlocked every valuable part of your family’s life, and had your name etched into it forever.

When hackers compromise our usernames and passwords, they have the key to all of our locks. We need to demand a better online security solution…

Mobile Frontier

Centrify Mobile Authentication (MAS) SDK Solution – How It Powers SSO to Native Applications!

sumanaannam
By Sumana Annam, August 5, 2014

In the previous blogs, we have covered the Enterprise Mobile App Challenges as well as What an ideal SSO solution should be across native mobile applications. Today, I will cover how Centrify Mobile Authentication Services (MAS) SDK powers single sign-on (SSO) across native applications on the iOS, Android and Samsung Knox. For starters, Centrify User Suite, SaaS Edition (Centrify SaaS Edition), uniquely integrates single sign-on for SaaS applications with user-centric mobile security management. With Centrify’s cloud-based service, you can quickly provide end-users with single sign-on to cloud-based apps through an easy-to-use web portal. When users enroll their devices in the Centrify Cloud Service, they automatically get zero sign-on to those same apps as well as to Mobile applications which use Centrify Mobile Authentication Services (MAS) SDK. Overview of the Centrify User Suite and key architectural components can be found here. Let’s take a look at SSO to native mobile applications. Mobile applications can…

Centrify

Centrify Blog

Keep up to date with Centrify and with current IT Security best practices by subscribing to our blogs. Topics include:

TwitterFollow Centrify on Twitter
TwitterFollow Centrify on LinkedIn

Tom Kemp

Secure Thinking
by Tom Kemp

Centrify CEO Tom Kemp, an industry expert in security and infrastructure software, discusses market and technology issues around the disruption occurring in the Identity and Access Management market due to the cloud, mobile and consumerization of IT trends occurring in today's IT environment.

Tom’s Latest Posts

Updates to Centrify Server Suite and our Express for *nix Program

Big Centrify Momentum in the Cloud Identity Market

Comparing Identity and Access Management as a Service (“IDaaS”) Solutions

Centrify Raises $42 Million; Will Take Cloud Identity to Next Level

Centrify Advances Its Enterprise Device Management for Mac, iPad and iPhone


TwitterFollow Tom on Twitter

Popular Tags


Our Bloggers

Ben Rice
Ben Rice

Senior Director of Business Development


Brad Zehring
Brad Zehring

Senior Product Manager, Centrify Server Suite


Darren Gross
Darren Gross

Regional Director


David McNeely
David McNeely

VP of Product Strategy


Jeff Friedsam
Jeff Friedsam

Director of Product Management


Matt Hur
Matt Hur

Senior Director of Product Management


Paul Moore
Paul Moore

Chief Technical Officer and Founder


Sean O’Connell
Sean O’Connell

Senior Manager of Product Marketing


Shreyas Sadalgi
Shreyas Sadalgi

SVP Business Development