Centrify Perspective

Using Centrify for NIST 800-53 Compliance

tomstanton
By Tom Stanton, November 19, 2014

There’s a humorous saying I often hear in IT Security circles that goes something like this: “If a CISO has the choice between being compliant or being secure, compliance always wins because that’s what will keep them out of prison.” The reality is that most organizations need to increase both as efficiently as possible, and this is where Centrify can help. The Centrify Server Suite leverages your existing Active Directory to secure your systems from identity related risks and attacks. Additionally it helps with compliance for a large number of federal and industry standard security controls, such as those found in : (1) NIST 800-53 Security Control Requirements, (2) DHS’ Continuous Diagnostics and Mitigation (CDM) Functional Area Requirements, and (3) SANS Top 20 Critical Controls. In this three-part blog I’ll be discussing how the Centrify Server Suite maps to specific requirements of each, beginning with NIST 800-53. The National Institute…

Centrify Perspective

Fundamentals in Securing your Customers’ Data

deanthompson
By Dean Thompson, November 19, 2014

I am tired of hearing about company’s losing customer data and how it’s becoming a commonplace expectation that a customer should expect this to happen. In this day and age with all of the technology available it seems we can’t get the simple principles of security right. Pick any of the breaches that have happened in the last couple of years and had those corporations followed good security practices those breaches would not have never happened.

It's All About Identity

Identity, Privilege and Compliance on Red Hat Systems

matthur
By Matt Hur, November 17, 2014

Centrify got our start in the security and identity business many years ago by starting in the datacenter and focusing on the problems of too many identity silos, disparate privilege management policies, and difficulty in tracing activity back to individuals. We saw back then that identity would be a key element of an IT strategy as system environments continue to get more diverse and deployed in more dynamic ways.

Centrify Perspective

Provisioning and the Termination Nightmare

chriswebber
By Chris Webber, November 12, 2014

Back in my IT days, I was – among various responsibilities – tasked with managing user access from the time they were hired to the time they moved on (or were fired.) As I will discuss, this was often the most stressful part of my day-to-day. Now with the explosion of mobile users and SaaS applications such as Google Apps, Office 365 and hundreds of other apps, managing access has become even more error-prone and stressful. But they don’t have to be.

Centrify Perspective

Mobile First + Identity First + Cloud First = Centrify User Suite

billmann
By Bill Mann, November 10, 2014

Here is a novel idea — Identity-as-a-Service (IDaaS) with Enterprise Mobile Management (EMM)-as-a-Service — but in combination. This is exactly what Centrify did when launching the Centrify User Suite in 2013. An industry first solution, built from the ground up for the mobile first, identity first and cloud first world of today and tomorrow.

Mobile Frontier

Better Together: Why Identity and Mobility are about to Converge

billmann
By Bill Mann, November 7, 2014

Two once-distinct markets are on course for convergence: mobility and identity. It’s a merger that will drive success for vendors that get the blend right—and could spell trouble for vendors that once prospered by focusing on mobility or identity alone.

Only a couple of years ago, emerging companies that specialized in either mobility or identity did quite well. Identity and access management (IAM) vendors like Okta rose to prominence by enabling enterprise users to easily access their various cloud applications, such as Salesforce, Workday and Taleo, via single sign-on. Meanwhile, at the other end of the spectrum, enterprise mobility management (EMM) vendors like AirWatch (acquired by VMware) and MobileIron (NASDAQ: MOBL) made a good living by helping organizations manage an ever-increasing array of mobile devices.

Partner Corner

Getting Mobile Identity Right: Why Samsung Partnered with Centrify

shreyassadalgi
By Shreyas Sadalgi, November 5, 2014

You’ve heard us talking quite a bit about how Centrify transformed traditional application “single sign-on” (SSO) solutions for desktops to “Zero Sign On” for mobile apps and devices. You’ve also heard why the world’s number one mobile device manufacturer chose to partner with Centrify for delivering mobile identity management to their millions of users.

Centrify Perspective

RMM Meets IDaaS: Why MSPs are the New VARs

billmann
By Bill Mann, November 4, 2014

Last week Centrify announced that AVG Technologies selected Centrify’s integrated cloud-based identity management (IDaaS) and enterprise mobility management (EMM) solution for the AVG CloudCare service. The partnership marks a significant opportunity for small- and medium-sized businesses (SMBs) that are increasingly looking to adopt cloud and mobile apps for business purposes, but don’t have the time or resources available to manage the IT challenges and complexity this transition entails. This is also a huge opportunity for managed service providers (MSPs) who are implementing and managing IT services on SMBs’ behalf, while also playing a consultative role with respect to IT opportunities and challenges. This is particularly interesting to me as I was involved in a similar deal to incorporate backup into the cloud when I ran the Arcserve business. Now, the market is moving to higher-valued IT Management, and Identity and Mobility certainly qualify. That said, I’d like to provide some…

Centrify Perspective

Are Celebrities Weaker than the Rest of Us?

barryscott
By Barry Scott, October 28, 2014

With the recent spate of high-profile hacks, and yet another report of nude celebrity photographs being leaked online, it’s worth posing the question, “Are celebrities any worse at choosing their passwords, or are we all as bad as each other?” As more and more pictures are released online, the question “How has this happened?” is a growing concern. While the exact method used remains unknown, it has been suggested that brute force methods were used alongside more targeted phishing attacks in order to steal personal photographs from celebrity accounts. A “brute force” attack relies on malicious, automated software to repeatedly guess large numbers of passwords in an attempt to discover the correct one. Now, passwords are not a new concept, and using word and character sequences for authentication purposes is common practice. We all have passwords that we use on a daily basis, with numerous accounts and information to memorize. Chances…

Hot Topics

Invasion through Identity

bradzehring
By Brad Zehring, October 27, 2014

In July, JP Morgan Chase discovered that 90 or so of its servers were breached by external hackers. As The New York Times reported, “By the time the bank’s security team discovered the breach in late July, hackers had already obtained the highest level of administrative privilege to dozens of the bank’s computer servers.” According to the article, it is still unclear how hackers managed to gain such deep access. Every organization in the world with significant financial assets is under constant Web-based attack from bad guys. Over the past two years, there’s been an impressive (or terrifying, depending on your point of view) increase in both the success of these attacks and the size and scope of the organizations affected. Virtually all of these hacks have one thing in common. They attack identity; specifically, they leverage vulnerabilities in software or business processes to subsequently elevate privilege until they reach…

Centrify

Centrify Blog

Keep up to date with Centrify and with current IT Security best practices by subscribing to our blogs. Topics include:

TwitterFollow Centrify on Twitter
TwitterFollow Centrify on LinkedIn

Tom Kemp

Secure Thinking
by Tom Kemp

Centrify CEO Tom Kemp, an industry expert in security and infrastructure software, discusses market and technology issues around the disruption occurring in the Identity and Access Management market due to the cloud, mobile and consumerization of IT trends occurring in today's IT environment.

Tom’s Latest Posts

Continued Centrify Momentum

The Cloud is Disrupting and Defragmenting the Identity Market

Updates to Centrify Server Suite and our Express for *nix Program

Big Centrify Momentum in the Cloud Identity Market

Comparing Identity and Access Management as a Service (“IDaaS”) Solutions


TwitterFollow Tom on Twitter

Popular Tags


Our Bloggers

Barry Scott
Barry Scott

CTO - EMEA, Sales & Support


Ben Rice
Ben Rice

Senior Director of Business Development


Bill Mann
Bill Mann

SVP of Products and Chief Product Officer


Brad Zehring
Brad Zehring

Senior Product Manager, Centrify Server Suite


Chris Webber
Chris Webber

Senior Manager - Product Marketing, Marketing


Darren Gross
Darren Gross

Regional Director


David McNeely
David McNeely

VP of Product Management


Jeff Friedsam
Jeff Friedsam

Director of Product Management


Jonathan Bensen
Jonathan Bensen

Technical Marketing Director


Matt Hur
Matt Hur

Senior Director of Product Management


Paul Moore
Paul Moore

Chief Technical Officer and Founder


Shreyas Sadalgi
Shreyas Sadalgi

SVP Business Development


Sumana Annam
Sumana Annam

Director of Product Management