It’s All About Identity

It’s All About Identity

This section highlights the important topics around identity as the key enabler for single sign-on, role-based access control, privileged identity management, auditing and compliance across on-premise, cloud and mobile users, apps and devices.


By , September 1, 2016

In previous blogs, “Securing Enterprise Identities For Dummies, Part One and Part Two,” I wrote extensively about how identity can provide a new layer of security for your organization. Identity can be a powerful security tool for protecting both end-users and privileged users from the leading cause of data breaches — compromised credentials. Implementing an identity platform for both identity as a service and privileged identity management can add a strong player security for your organization. In Part One, we covered how the traditional network perimeter is inadequate for today’s apps and infrastructure, which are increasingly cloud and mobile. We also…

By , August 23, 2016

Little has changed in 30 years of massive data breaches From the earliest computer hackers to today’s sophisticated cyber-criminals, little has changed in the modus operandi used to access and monetize financial data. In the TRW 1984 incident, thieves stole access codes to a credit rating database from a TRW subscriber, a Sears and Roebuck’s store in Sacramento. They proceeded to paste them to an online noticeboard, so that others with personal computers could use the stolen credit history information of 90 million Americans to commit credit card fraud. Today, privileged user’s credentials are still the preferred target for cyber…

By , July 26, 2016

Recent experiences have made me question just how much information we hand out nowadays to people we barely know. It seems that everyone wants a bit of our personal information, and more often than not we are happy to provide it. Even from my recent experiences selling a flat, it was surprising how much personally identifiable information the estate agent needed to see. I was asked to send all sorts of documents, from passport details to bank statements, often over e-mail. As someone keen to sell a flat, I did it without question of course — we all want the…

By , July 19, 2016

When it comes to some of the world’s finest Cognac and spirits, many of us turn to offerings from Rémy Cointreau. As one of the world’s leading alcoholic beverage brands, Rémy Cointreau employs 1,800 people all over the world and has more than $1 billion in annual sales. Rémy Cointreau recently chose Centrify to enable secure access to apps from any device, anywhere in the world.  When Chief Technology Officer Sébastien Huet joined Rémy Cointreau in 2015, one of his primary objectives was to help transform the company into a more agile organization. A key component of that transition would be…

By , June 28, 2016

In part one of Securing Enterprise Identities For Dummies, we covered how the traditional network perimeter is inadequate for today’s apps and infrastructure which are increasingly cloud and mobile. We also covered steps to securing enterprise identities so that any user can obtain secure access to any resource. These steps included: Taking stock of your existing enterprise users, apps and infrastructure Considering the role of identity in cybersecurity Architecting security using identity Deploying an identity platform for security Part 1 of this blog concluded that an identity platform can provide you with a unified and integrated set of tools, auditing, reporting…

By , June 27, 2016

When I was a kid, I remember arguing with friends about… everything. I’m difficult that way. But in this specific argument, we were arguing about amounts. If I can recall, my seven-year-old stance was this: “A couple” meant two. Period. Always. No matter what. “A few” could mean two, or it could mean more, but it was always less than “a lot.” “A lot” was — well, you know, as many as you can grab. My buddy was sure that “a few” meant three, like “a couple” meant two. We argued, and used examples, and then probably picked up sticks…

By , June 17, 2016

We recently commissioned a Forrester study to find out how IT decision makers deal with privileged access security in hybrid IT environments. The survey tested the hypothesis that as organizations open up access to remote users and move more of their workloads to the cloud, their privileged identity management (PIM) solutions should also move to the cloud. The results are in! Having a PIM solution that is purely on-premises is no longer enough to secure privileged access to hybrid infrastructure and applications. The survey data shows that 92% of organizations are either currently outsourcing, or planning to outsource at least one…

By , June 9, 2016

We have written extensively this past year (here, here and here) about how traditional approaches to creating a secure network perimeter are no longer sufficient to protect your organization in an increasingly mobile and cloud world. “Securing this traditional ‘network perimeter’ included layers of firewalls, intrusion detection systems, and other network security devices and systems intended to keep data safe against attack. Attackers know that with the right credentials, they no longer have to fight through the old ‘perimeter’ defenses. They now use stolen credentials to gain access to your critical data, just like an employee.” (from “Securing Enterprise Identities…

By , June 6, 2016

If you’re a sales operations professional, you sit at the crossroads of user access to vital, proprietary information — to applications (whether on premises or cloud), including all those plugins to your CRM system.  There’s the interface/integration with your finance system, the customer success app, the technical support app, the integration with channel partners, the business intelligence app, the access you provide third party vendors to assist with management of their app…the list goes on. If a bad actor gets access to any one entry point, you’re in trouble.  Compromised credentials are the number one cause of data breaches, according…