Partner Corner

Centrify and AquaConnect Partner to provide USC with a complete solution for anytime, anywhere access to Mac applications

benrice
By Ben Rice, July 22, 2014

We are very happy to announce our partnership with AquaConnect and our early success with a joint customer win at the University of Southern California. It’s a great story for USC, AquaConnect, and Centrify thanks to the power of partnership and the trust it often requires. Every now and then we get lucky in Business Development. Normally, BD folks are out targeting new partners and seeking new opportunities to win business for their companies. This usually involves a lot of hard work to build a solution, bring it to market, market the solution, and then work with field and channel teams to win a joint customer(s). In this case, it worked in the opposite way where we first heard of AquaConnect after we had received a PO from USC!!

Secure Thinking by Tom Kemp

Big Centrify Momentum in the Cloud Identity Market

tomkemp
By Tom Kemp, July 16, 2014

Centrify finished our fiscal year on June 30th and I wanted to use this blog to highlight for our customers and partners some of the main accomplishments that Centrify has had over the last 12 months. From a financial perspective, we had record sales quarters throughout the fiscal year and continued along the lines that had us growing sales over 40% last calendar year. We further built our executive management team, moved into new and bigger corporate headquarters, won numerous awards, and raised $42 million in funding.

Hot Topics

Globalization Meets Access and Privilege: Can this be a Match Made in Heaven?

darrengross
By Darren Gross, July 14, 2014

While globalization can be traced back many millennia, it wasn’t until the late 19th and early 20th Century that the connectedness of the world’s economies and cultures really began to merge, with large enterprises at the time expanding their businesses overseas. This was all aided by technological advancements such as air travel and the mass production of cars. Fast forward to today, and it would be impossible to deny that globalization isn’t continuing to expand. The Internet has facilitated this a thousand times over and has allowed small companies and individuals to build a presence in other countries without the need for significant investment.

Centrify Perspective, It's All About Identity

What’s the difference between a “privileged user” and a “privileged account”?

matthur
By Matt Hur, July 7, 2014

In a previous blog post, I asked the question:  “What Does ‘Privileged Identity Management’ Mean When Everyone is a Privileged User?”  Today, I’d like to explore a related topic:  If everyone is, to some degree, a privileged user, how does that change the way we think of managing privilege in the enterprise? Historically, people have equated “privileged users” with “administrators” of systems or applications because these are the people who have the rights to do things that could potentially have serious consequences.  On a Linux system, the “superuser” (usually the “root” account) has unfettered ability to do absolutely anything on that system.  In a Windows environment, the equivalent is the local administrator (or domain administrator, who can do anything across all Windows machines within the Active Directory domain).  These all-powerful accounts are necessary in order to perform system maintenance, to start/stop services, to view or retrieve data files, etc.  So…

Partner Corner

Centrify and Sencha Space – Secure Enterprise Mobility Made Simple!

sumanaannam
By Sumana Annam, July 1, 2014

BYOD is a fact of life. And that’s a VERY GOOD thing! BYOD makes teams more agile and employees more productive and happier too. A recent survey showed that 78% of employees access work-related files and applications from personal devices and 61% of respondents said they were happier in their jobs and more productive when they could use their self-chosen devices and cloud-based tools. Yet nearly 40% stated that restrictive IT policies affected their efficiency and ability to problem-solve. But balancing convenience with security is no easy task.

Mobile Frontier

Solving account lockout by eliminating use of passwords by using PKI certificates

davidmcneely
By David McNeely, June 30, 2014

Have you ever been forced to change your password on your laptop only to find that you got your AD account locked about an hour later? If your company is like mine, we require our login passwords to be changed every 90 days, and what a pain that is just because we don’t allow reusing passwords, they have to be complex with mixed case and both alpha and numeric characters and at least 8 characters long, yes it could be more complex

Partner Corner

Centrify and Concur Partner to Enable “The Perfect Trip”

charlescoats
By Charles Coats, June 26, 2014

This week Centrify announced a partnership with Concur enabling secure single sign-on (SSO) for Concur users and an integrated identity and mobile management infrastructure for IT organizations running Concur and other SaaS applications. Centrify does not announce partnerships with every SaaS vendor with whom we integrate – our solution integrates with thousands of SaaS apps – so let’s cover the two reasons why this partnership is important and unique.

Centrify Perspective, Mobile Frontier

Is Mobile Device Management on the verge of death?

davidmcneely
By David McNeely, June 25, 2014

Mobile Device Management (MDM) solutions are a popular way for IT organizations to secure the smart phones and tablets that their employees bring to work and want to use to access business applications and data. However the traditional MDM solution may not survive given the growing concern over user privacy as well as the coarse grained and sometimes inadequate controls they have over the device. At the same time, mobile device operating systems are evolving to provide much better security to enable better privacy controls for the user and to ensure that data stored on the device is properly protected. Employees don’t like MDM solutions One of the biggest concerns an employee has with the use of MDM to manage their mobile devices is that the solution has nearly complete control over their device and they either have to accept it in order to gain access to company resources and…

It's All About Identity

Centrify Privilege Management Highlighted by Forrester

bradzehring
By Brad Zehring, June 23, 2014

Happy to note that Centrify is a vendor with one of “a handful of mature products” for application privilege management in the new Forrester report Prepare For The Post-AV Era Part 1: Five Alternatives To Endpoint Antivirus by Chris Sherman, published on June 9. This provocative report explains why security and risk professionals (S&R) aren’t satisfied with traditional endpoint anti-virus technology.  Adoption of A-V is actually declining in favor of other technologies better suited for endpoint threat protection. “Forrester has spoken with a number of S&R pros who plan to reduce their reliance on third-party AV. Usually, they do this through adoption of more proactive forms of protection combined with a lightweight or “free” AV engine supplied by the operating system vendor.” One of those proactive technologies S&R professionals are turning to is application privilege management, which enforces least-privilege on servers and endpoints. Centrify Server Suite provides full-featured privilege management solutions for UNIX,…

Partner Corner

How Office 365 is Bringing Back Microsoft’s Mojo

charlescoats
By Charles Coats, June 18, 2014

Microsoft received ample criticism for its “Lost Decade” spanning 2000-2010 when it ceded leadership in search to Google, in consumer devices to Apple and in web services to Amazon – all while its stock price remained flat. While the company had some bright spots – it tripled revenue to $65B and doubled net income to $19B – it’s undeniable that huge opportunities were missed. Fast forward to recent developments. In the past 9 months Microsoft’s stock is up 30% – more than the S&P 500, Google and Amazon. New CEO Satya Nadella and his focus on making Microsoft a mobile and cloud-first company have been well received. Office for iPad, Windows Phone 8.1 and Surface 3 have recently launched – with many more products in the pipeline. Earnings strength continues with positive overall results for Q3 FY14 posted in April. Cloud services are gaining strength: Azure is making inroads against…

Centrify

Centrify Blog

Keep up to date with Centrify and with current IT Security best practices by subscribing to our blogs. Topics include:

TwitterFollow Centrify on Twitter
TwitterFollow Centrify on LinkedIn

Tom Kemp

Secure Thinking
by Tom Kemp

Centrify CEO Tom Kemp, an industry expert in security and infrastructure software, discusses market and technology issues around the disruption occurring in the Identity and Access Management market due to the cloud, mobile and consumerization of IT trends occurring in today's IT environment.

Tom’s Latest Posts

Big Centrify Momentum in the Cloud Identity Market

Comparing Identity and Access Management as a Service (“IDaaS”) Solutions

Centrify Raises $42 Million; Will Take Cloud Identity to Next Level

Centrify Advances Its Enterprise Device Management for Mac, iPad and iPhone

The College Basketball-ization of the Enterprise IT Landscape


TwitterFollow Tom on Twitter

Popular Tags


Our Bloggers

David McNeely
Ben Rice

Senior Director of Business Development


Brad Zehring
Brad Zehring

Senior Product Manager, Centrify Server Suite


Darren Gross
Darren Gross

Regional Director


David McNeely
David McNeely

Senior Director of Product Management


Jeff Friedsam
Jeff Friedsam

Director of Product Management


Matt Hur
Matt Hur

Senior Director of Product Management


Matt Ramsay
Matt Ramsay

Regional Director, Asia Market


Paul Moore
Paul Moore

Chief Technical Officer and Founder


Sean O’Connell
Sean O’Connell

Senior Manager of Product Marketing


Shreyas Sadalgi
Shreyas Sadalgi

Vice President of Business Development


Victor Belfor
Victor Belfor

Senior Director of Business Development