billmann

Posts by Bill Mann

Bill Mann is Senior Vice President of Products and Chief Product Officer for Centrify. Mann is responsible for the innovation and evolution of all Centrify solutions, running product strategy and product management, as well as playing a lead role in M&A as the company scales to its next phase. Mann is an enterprise software security executive with both large company and startup experience.


Hot Topics

RSA: Centrify Survey Reveals Almost Half of Respondents Lack Confidence in Their Company’s Cybersecurity Strategies

By , February 16, 2017

Yesterday, we conducted an onsite survey of IT professionals attending the RSA Conference, being held this week at Moscone Center, San Francisco. The poll asked respondents how their companies secure applications and infrastructures in the age of access, and it revealed that only slightly more than half (55%) believe their company’s current technology investment ensures their company’s cybersecurity. This leaves about half of respondents with a lack of confidence in their own organization’s corporate security! While this fact is startling, it shouldn’t be too surprising, since a recent Forrester study, commissioned by Centrify, confirms that in the past two years, two-thirds…

Centrify Perspective

Top Three New Year’s Security Resolutions

By , January 4, 2017

When it comes to setting New Year’s resolutions, most people shoot for the moon. We tell ourselves we will give up carbs, go running every morning, become a vegan or even give up drinking alcohol. Inevitability, three weeks later, we find ourselves right back where we started. As security professionals, responsible for keeping the bad guys out and reducing the risk of data breaches, we find ourselves right back where we started too — we fundamentally do not really improve our security posture, and then wonder why not. We are very similar to our consumer counterparts, because we set lofty…

Hot Topics

Centrify Consumer Trust Survey: The Corporate Cost of Compromised Credentials

By , June 8, 2016

We recently conducted a survey to find out what happens to consumer trust when a business is breached. The study examined consumer attitudes toward corporate hacking, and surveyed 2,400 people across the U.S., U.K. and Germany. To our surprise, more than half (66 percent) of U.S. respondents said they are likely to stop doing business with a hacked organization, and fewer than half of Americans are very satisfied with how corporations handle cyberbreaches. Our data shows that when companies put customer data at risk, they are putting the entire business at risk. We found most consumers believe the burden of…

Centrify Perspective

How to Cook Up a Great MFA Strategy

By , May 12, 2016

Have you ever attempted to assemble do-it-yourself furniture—or for that matter throw together a meal—without following the instructions or recipes closely? You end up with furniture that looks like it was thrown off a truck or food that’s barely edible. When it comes to deploying multi-factor authentication (MFA), the same kind of philosophy applies. If you don’t follow some basic guidelines and practices, you’ll end up with a “solution” that doesn’t really solve the problem of protecting data. MFA solutions provide the kind of protection that organizations need in today’s increasingly complex IT and security environment—mitigating password risk by requiring…

Centrify Perspective

Is Multi-factor Authentication Adoption Finally Picking Up Speed?

By , May 3, 2016

Enterprise adoption of multi-factor authentication has been slow, with many organizations disregarding its value. But has Amazon triggered a change in momentum?   Despite best intentions, few in the industry would argue that relying on a password for security purposes works. If a password is too simplistic, it is more likely to be guessed (either by man or machine). If it is too complex, the chances are it has to be written down in order to be remembered, leaving it susceptible to prying eyes. Passwords are shared with insufficient consideration of the longer-term implications, and ex-employees can often still access…

Centrify Perspective

Centrify Connect: Two Days, Four Keynotes, 15 Business Sessions, 25 Technical Sessions and One Great Opportunity

By , February 11, 2016

Nothing beats getting a lot of very smart people together in one location around a mutual topic like cybersecurity. Our teams have been working behind the scenes to create a two-day experience for our customers, with a mix of opportunities to hear from industry experts, from each other, and from our own Centrify product experts. We’re calling it Centrify Connect, and it is scheduled for May 11 and 12 at the Park Central Hotel in New York. At the end of these two days in May, I expect that we will learn as much from our customers as they will…

Centrify Perspective

Basic Human Needs — Identity Management in the Home

By , January 27, 2016

It’s Saturday morning in sunny California, but it’s raining; and, because it is raining, the Internet is down. Since, today in my house the lack of Internet access has become the top of Maslow’s hierarchy of human needs, I drive quickly to the local cable company store to patiently wait and get a new modem — I have never done this before, and I have strict instructions from my son to not mess around with the internet, but to follow the instructions and get it up and running — the Clone Wars on Netflix needs to be watched! So, with…

It's All About Identity

What Does Mr. Robot Teach Us About the Recent US-China Cybersecurity Pact?

By , October 22, 2015

I caught up on Mr. Robot this weekend — in the show, hacker Elliot Alderson works with a Chinese hacker to hack the world’s largest corporation. While watching, I tried to understand how the recent agreement between President Obama and Chinese President Xi Jinping to prevent cyberattacks on each other will make a difference? Mr. Robot, for those you have not seen it, is a hacker drama that follows Elliot Alderson, a security engineer who works for a cybersecurity firm. Elliot has all sorts of social problems — so he connects with people by hacking them and tries his best…

Centrify Perspective

Have Users Log in as Themselves, While Maximizing Control Over Privileged Accounts

By , April 24, 2015

Our most recent product addition to the Centrify platform is Centrify Privilege Service — a security-as-a-service offering in the identity management sector that Gartner refers to as shared account password management. But you may be wondering if this changes our viewpoint on how to manage privileged identities in the enterprise, because we also have our Centrify Server Suite that provides what Gartner defines as “super user privilege management.” The short answer is no — we believe Server Suite and Privilege Service together provide the most comprehensive privileged identity management solution in the market. Let me use this blog to explain our view on privileged…

Centrify Perspective

Our latest innovation: Privileged Identity Management as-a-Service for the Modern Enterprise

By , April 23, 2015

The Centrify product team is very proud this week at the RSA Conference to announce the industry’s first cloud-based privileged identity management service. For those of you who follow Gartner’s terminology in the identity space, we now provide SAPM or shared account password management. This together with our existing SUPM (super user privilege management) capabilities results in Centrify offering the most comprehensive approach to privileged identity management in the market. Gartner also defines a sector called IDaaS (Identity Management as-as-Service), and with this release we become the first identity vendor to expand the definition of IDaaS to include privileged identity management…