Posts by Corey Williams

Corey oversees the strategic vision, tactical roadmap and companywide go-to-market plan for Centrify products. Corey is a veteran technology consultant and marketer, with more than 15 years' enterprise software company experience.

Hot Topics

Top 3 Takeaways from the 2016 Cyber Security Study by Wells Fargo Insurance

By , September 12, 2016

Wells Fargo Insurance released their 2016 Cyber Security Study this week. Over 100 decision makers at companies with at least $100 million in annual revenue were surveyed to better understand perceptions of network security and data privacy vulnerabilities and related business exposures and risks. Three interesting takeaways from this study include: Takeaway #1: The Rise of Imposter Fraud Whether you call it CEO fraud, fraudulent inducement, social engineering fraud or business e-mail compromise scams, 21% of respondents have been targets of impostor fraud. Unfortunately, most suffered a financial loss, and often a significant one ($500k+). In fact, in April 2016,…

It's All About Identity

Securing Enterprise Identities For Dummies: Free Live Webinar

By , September 1, 2016

In previous blogs, “Securing Enterprise Identities For Dummies, Part One and Part Two,” I wrote extensively about how identity can provide a new layer of security for your organization. Identity can be a powerful security tool for protecting both end-users and privileged users from the leading cause of data breaches — compromised credentials. Implementing an identity platform for both identity as a service and privileged identity management can add a strong player security for your organization. In Part One, we covered how the traditional network perimeter is inadequate for today’s apps and infrastructure, which are increasingly cloud and mobile. We also…

Hot Topics

What Pokémon Go Teaches Us About Reducing Cyber Risk in the Enterprise

By , August 4, 2016

Pokémon Go is all the rage with my three kids: a tween, a teen and a young adult. At first I didn’t get the appeal. I would ask them, “What is the point of Pokémon?” And, they would answer, “Daaaad, you capture Pokémon with Poké Balls and there are ultra-rare ones like the Squirtle or the Mewtwo and you get berries and level them …(I sorta glaze over at this point).” Am I just being curmudgeonly (and, can you be curmudgeonly in your forties?), or could my kids break it down for me in a way that I would more easily relate…

It's All About Identity

Raise a Glass: Rémy Cointreau Chooses Centrify to Enable Secure Access to Apps from Any Device, Anywhere in the World

By , July 19, 2016

When it comes to some of the world’s finest Cognac and spirits, many of us turn to offerings from Rémy Cointreau. As one of the world’s leading alcoholic beverage brands, Rémy Cointreau employs 1,800 people all over the world and has more than $1 billion in annual sales. Rémy Cointreau recently chose Centrify to enable secure access to apps from any device, anywhere in the world.  When Chief Technology Officer Sébastien Huet joined Rémy Cointreau in 2015, one of his primary objectives was to help transform the company into a more agile organization. A key component of that transition would be…

It's All About Identity

Securing Enterprise Identities For Dummies, Part 2

By , June 28, 2016

In part one of Securing Enterprise Identities For Dummies, we covered how the traditional network perimeter is inadequate for today’s apps and infrastructure which are increasingly cloud and mobile. We also covered steps to securing enterprise identities so that any user can obtain secure access to any resource. These steps included: Taking stock of your existing enterprise users, apps and infrastructure Considering the role of identity in cybersecurity Architecting security using identity Deploying an identity platform for security Part 1 of this blog concluded that an identity platform can provide you with a unified and integrated set of tools, auditing, reporting…

It's All About Identity

Securing Enterprise Identities For Dummies, Part 1

By , June 9, 2016

We have written extensively this past year (here, here and here) about how traditional approaches to creating a secure network perimeter are no longer sufficient to protect your organization in an increasingly mobile and cloud world. “Securing this traditional ‘network perimeter’ included layers of firewalls, intrusion detection systems, and other network security devices and systems intended to keep data safe against attack. Attackers know that with the right credentials, they no longer have to fight through the old ‘perimeter’ defenses. They now use stolen credentials to gain access to your critical data, just like an employee.” (from “Securing Enterprise Identities…

Centrify Perspective

Centrify Named a Leader in the Gartner 2016 IDaaS Magic Quadrant

By , June 6, 2016

Today Gartner released its Magic Quadrant for Identity and Access Management-as-a-Service (“IDaaS”) and we are pleased to note that Centrify has been named a leader by Gartner in this Magic Quadrant (“MQ”). This is the third year in a row we have been included in the Gartner IDaaS MQ*, and we believe placement in the Leaders’ quadrant validates our unique ability to secure access to apps and infrastructure from any device for all users. Click here for a complimentary copy of the full report.   According to Gartner, “Leaders in the IDaaS market generally have made strong customer gains. They provide…

Hot Topics

2016 Verizon Data Breach Investigations Report (DBIR)

By , May 25, 2016

“We’re not mad, just disappointed.” This summarizes a lot of the conclusions made in the 2016 Verizon Data Breach Investigations Report (DBIR). This comprehensive report covers 100,000+ incidents, including 2,260 analyzed breaches across 82 countries (if you don’t have time to read the full report, you can check out the executive summary). Most of these breaches can be attributed to human error, and mostly not the active kind of human error, such as misconfiguration or inappropriate behavior. Rather, these errors are mostly due to failing to notice or inaction when it comes to the most basic security efforts such as patching, encryption…

Centrify Perspective

Sights and Sounds from Centrify Connect 2016 Day One

By , May 11, 2016

Hundreds of Centrify customers descended this week on NYC at the Park Central Hotel to meet up with peers across dozens of industries and geographies. Customers of Centrify hail from some of the largest banks and financial institutions to the most sensitive areas of the government, from the most premium brands of retail to some of the largest healthcare and pharmaceutical companies. All of these customers have gathered with a common goal of improving identity security across their respective organizations. Day one started with a bang with a special performance from actors who performed a Centrify-themed Hamilton act. After that was…

Hot Topics

For PCI Multi-Factor Authentication is Now Required for Everyone…and You Better Hurry

By , May 2, 2016

The “Payment Card Industry Data Security Standard” (PCI DSS) has long been a security and compliance driver for merchants, banks, hospitals, governments and anyone else that handles payment card information. PCI DSS standards are very prescriptive on what is expected in order to secure payment card data at rest and in motion, and also to require individual accountability while limiting access to only those with a need to know. Recently, the PCI council announced the latest release of PCI DSS version 3.2. This update includes 47 total clarifications, eight evolving requirements and three additional items of guidance. One of the…