It’s time to ditch passwords. The core problem with passwords is that they have passed their use-by date. Like the swords, spears and shields of yore, we can finally retire the password to the dustbin of history because there is a better way.
“Shadow IT” hints at people doing bad things to deliberately make life difficult for the IT Department, and sounds as if the phrase probably originated in IT. Shadow IT often refers to people in a company using SaaS applications that have not been officially blessed by IT. However, they do so not just to annoy IT, but because they’ve found applications and tools that make their lives easier, allow them to work faster in a way that suits them, and ultimately make the company (and hopefully themselves) more successful. In this blog post I’ll attempt to explain how IDaaS (Identity as a Service) can be used to help companies address issues brought about by Shadow IT. The main problem with Shadow IT is security. End-users and their lines of business seek out applications that help them work, whereas the focus of IT is security. And as IT is usually responsible…
Wouldn’t it be nice for a change to deploy an IT security solution that doesn’t sacrifice usability and productivity for security? I’m sure many of you have had the experience of introducing a new security product that, while solving a real security problem, just makes life hell for users. These can create new hurdles, introduce complexity, and generally take a toll on uses’ day-to-day productivity. Maybe you’re a user on the receiving end, not sure why IT has ‘decided’ to make your life hard. Then again maybe you’re the administrator more aware of the security benefits, but nonetheless, you are impacted by a demanding daily care and feeding regimen. This is the reason we love security at Centrify. Because it’s hard. It’s hard to get right. But when done right, it’s a wonderful thing – solving a real set of compelling business problems without driving down productivity. And with a…
We find that many of our customers and partners are vested in us as a key technology provider and we like to hear on occasion how our business is doing. With that in mind, I am pleased to announce that calendar year 2014 was another banner and record year for Centrify across all the key performance indicators we track. For example, the last few quarters of 2014 saw us growing sales more than 40 percent year over year. We also grew the company in terms of people, with the number of employees growing by more than 30 percent — we now number more than 400 people strong.
It’s been an exciting year since we launched the CCPN (Centrify Channel Partner Network) in January of 2014. We are now continuing to evolve our partner program based on industry changes and demands. Centrify recently announced a new partner program level within our Channel Partner Network. Our announcement of MSP capabilities to our product has opened up a new area of potential partners in the mid-market space, in addition to satisfying the demand from our current partners that focus on delivering managed services to their customers. As I look back at all we have accomplished in the past year, there are some very specific components that drove and will continue to drive, this success.
I know a very successful high school wrestling coach who has this running bit he does all the time at social events, cocktail parties, and random water cooler conversations. When asked why his teams are consistently good year after year, he always responds with, “I’ve discovered the ancient secret to staying extremely physically fit.” After a bit of egging on, he’ll reluctantly divulge this long lost tidbit of knowledge he stumbled upon while reading some ancient scrolls. “The secret to staying extremely physically fit,” he begins, always followed by an over-the-top dramatic pause, “is to eat right and exercise.” Just like maintaining excellent physical fitness, creating and maintaining a high level of IT security fitness is really a matter of practical sense, with of course the devil being in the details. This is the last of a 3 part blog in which I’m discussing three federal and industry standard security…
As someone who has been in the enterprise IT industry for 25+ years, it has always been the case where “industry” people (fellow Silicon Valley entrepreneurs, VCs, employees of fellow enterprise tech companies here in Silicon Valley, IT people, etc.) have understood what my company Centrify does vis a vis identity management. They could quickly grasp our special technical sauce and go-to-market strategy. Meanwhile, it was typically the case that “civilians” (i.e. non-IT people, e.g. my relatives in the Midwest) just knew at a high-level that “Tom works in the technology industry.” They could not really understand what Centrify does after hearing me summarize our solution (but I did get some patient smiles J), and our value proposition was certainly not readily apparent.
I just read an interesting article in NetworkWorld about a breach at a major financial institution. The article pointed out that breach resulted from a lack of deploying adequate security controls on the corporate servers. The article goes on to state, “Strong access management policies and network segmentation are key to limiting the extent of damage that attackers can do once they gain a foothold inside a network. However … implementing uniform security controls across their vast networks can be difficult because they often have to integrate large numbers of new systems with different levels of security as a result of acquiring other companies.”
Although many in the industry (perhaps our younger colleagues) look at mainframes like remnants of a bygone era of computing, it is interesting to note that mainframes are still powering key applications and processes that make businesses run. There is no doubt that sometimes “big iron” is needed to provide efficient compute power delivery and consolidation of resources.
We previously posted a blog looking at the recent spate of high-profile hacks, and posed the question, “Are celebrities any worse at choosing their passwords, or are we all as bad as each other?” The question now seems to be “Who’s next?” The recent iCloud hacks proved that we are all at risk of a security breach, whether we are a celebrity, with a large or small organization, or are simply a consumer using an online service or application. In reality, the question should not be “Who’s next?” Instead, our main considerations should be “How do we learn from this?”, “How do we ensure that history doesn’t repeat itself?” and “How do we avoid becoming tomorrow’s headline?” There is no definitive means of securing sensitive data, and the burden of protecting personal information seems to be a challenging issue resting on the shoulders of many. Password protection has been the…
Keep up to date with Centrify and with current IT Security best practices by subscribing to our blogs. Topics include:
Centrify CEO Tom Kemp, an industry expert in security and infrastructure software, discusses market and technology issues around the disruption occurring in the Identity and Access Management market due to the cloud, mobile and consumerization of IT trends occurring in today's IT environment.
CTO - EMEA, Sales & Support
Senior Director of Business Development
SVP of Products and Chief Product Officer
Senior Product Manager, Centrify Server Suite
Senior Manager - Product Marketing, Marketing
VP of Product Management
Director of Product Management
Technical Marketing Director
Senior Director of Product Management
Chief Technical Officer and Founder
SVP Business Development
Director of Product Management