Targeted attacks and security breaches continue to steal the headlines on a daily basis, and no person or organization is immune to the threats. Instances in which personal information is compromised have now become commonplace, as security threats have become increasingly complex, sophisticated and targeted. Unfortunately, with today’s mobile culture and BYOD workforce the threat landscape has broadened. And while the nature of attacks and threat vectors are evolving, traditional security is no longer a match for these attacks. IT departments do not have the resources to address each and every threat as it arises. As such, new technologies provide the security and flexibility to tackle these threats. Below we look at the top five reasons traditional enterprise security is no longer good enough. Advanced persistent threats are becoming more and more sophisticated in their execution, directly targeted at an enterprise’s most valuable assets and intellectual property. Stealthy and persistent in…
When we started Centrify more than 10 years ago, Identity and Access Management (“IAM”) was a big but rather static market. In 2008 — a few years after we formed Centrify — the analyst group IDC reported that the IAM market was $3.1 billion.
Centrify regional sales manager Derek Morwood explains that the 4Chan nude celebrity photo hack is the latest evidence that we need to move past passwords. The nub of the problem with password-based protection is that a memorable password means it is also more easily hackable. Derek says we can get rid of most passwords by using Identity Management (IdM) services such as Centrify’s Identity-as-a-Service (IDaaS) platform. The great news is that Centrify and its partner Samsung are now democratizing IdM so it is both accessible and affordable for virtually anyone who goes online.
We are happy to introduce Centrify for Mac 2014.1, which builds upon our best-in-class Active Directory integration to provide users with Single Sign-on (SSO) to our catalog of more than 3000 web and SaaS Apps through integration with the Centrify Cloud Service. The integration with the Centrify Cloud Service also provides IT admins with remote management of Macs as well as the user’s mobile devices. This release also provides expanded support for Smart Cards with integrations into other popular applications such as Firefox, Thunderbird and the DoD Encryption Wizard. We built Centrify for Mac to empower Corporate IT to manage Macs and now mobile devices within the Windows centric environments these devices are being brought into. Since many of the Macs coming into the environment are laptops, we wanted to ensure that IT is in control of the laptop even when they are taken home or on business trips. The Centrify…
Over the last few months, there have been exciting market developments in the enterprise mobility space highlighting two macro trends: #1 The need for mobile device vendors to deliver more than just a device but also a packaged mobile device and app management solution that enables their devices readily for business use and adoption by enterprises (Cases in point: Apple + IBM partnership and Blackberry “EZ Pass” EMM). #2 The rise of identity to be a clear driver and differentiator for enterprise mobility management vendors. With the convergence of cloud-based Identity and Access Management (“IAM”) and Enterprise Mobile Management (“EMM”) feature sets, many vendors are now bundling these solutions together (Cases in point: Microsoft Enterprise Mobility Suite and VMware Workspace Suite, with Centrify being the visionary and leader in this convergence by being the first to deliver an integrated EMM and IAM offering). In this blog I will outline how…
Centrify will provide day one support for iOS 8 for customers of its cloud based Identity as a Service and mobility management solution. Anticipation for the release of Apple’s latest mobile OS is very high, and if history is any indication, we expect rapid adoption. Centrify has been diligently working with the beta releases of iOS 8 to ensure a smooth transition for already enrolled devices and an improved on-boarding experience for new enrollments.
The prospect of being breached by an advanced persistent threat (APT) can be, in a word, scary. Privileged identity management (PIM) strategies hold the prospect of significantly reducing the likelihood of a successful attack. This is the first in a series of posts about how PIM can offer an effective line of defense against APTs. The good news The good news is that most organizations are aware of and, in some way, are prepared to handle advanced persistent threats. According to a recent survey of security and risk professionals on APTs published by ISACA: 66% of organizations think they are a likely target for some variety of APT (but only 21% have actually been attacked) More than half of the organizations believe that they can detect, respond to, and stop an attack should it occur More than half of organizations who think they could be a target have updated their…
We’ve all seen the Hollywood movies. Retinal eye scanners that open secret passageways. Facial recognition systems and handprint scanners to verify that the good guys are who they say they are. In truth, corporate security in the real world is much more mundane. The most common model requires employees to enter a six or eight character password to access a secure environment. For many years, that model was good enough, even though many man hours were spent resetting or unlocking accounts when the password just couldn’t be remembered. Today, the model is broken because passwords, as they exist, have outlived their usefulness. In the old model, the workplace was always on-premise and people spent most of their time in their physical place of employment. But in today’s society, workers are just as apt to be in their own living room, in a client’s conference room, or in an overseas hotel…
The Centrify Server Suite 2014.1 update is available now on the Centrify Customer Download Center! Engineering has been working hard on this release for several months, and we’re pleased to post its availability today. They’ve put in a lot of tweaks and improvements based on customer feedback, and I know some of you will find these to be very welcome enhancements. We added support for new clients, too, including RHEL 7, OLE 7, and Windows Server Core. That last one is something I think it going to be increasingly important for those with Windows Server deployments. Here’s a bit on some of the new enhancements. We added a way to search for audited user sessions based on the time someone ran a particular command, which makes it easier to ensure regulatory compliance. It’s also a nice enhancement to help find the root cause of trouble ticket issues. We added a (much-requested) feature to Deployment Manager,…
At Centrify we have more than 5000 customers — including nearly half the Fortune 50 — who use our Centrify Server Suite, not only as an “Active Directory Bridge” to UNIX/Linux/Mac but also for privileged access management across Windows and *nix systems, privileged user activity monitoring, as well as for dynamic isolation of cross-platform systems. In fact industry analysts such as Forrester and Gartner say we are one of the top vendors in this high-growth area of identity management from a technology, vision and installed base perspective (e.g. see this Forrester report on Privileged Identity Management). We are continuing to invest heavily in our market-leading Server Suite and are in the midst of a few major projects to integrate our Server Suite with our Centrify Cloud Service — stay tuned for exciting details in the coming months.
Keep up to date with Centrify and with current IT Security best practices by subscribing to our blogs. Topics include:
Centrify CEO Tom Kemp, an industry expert in security and infrastructure software, discusses market and technology issues around the disruption occurring in the Identity and Access Management market due to the cloud, mobile and consumerization of IT trends occurring in today's IT environment.
Senior Director of Business Development
Senior Product Manager, Centrify Server Suite
VP of Product Strategy
Director of Product Management
Senior Director of Product Management
Chief Technical Officer and Founder
Senior Manager of Product Marketing
SVP Business Development