From the Cloud

From the Cloud

With no boundaries to protect, Identity as a Service (IDaaS) is the best way to manage access to and secure cloud apps. Centrify’s industry experts discuss helpful information and trends for any organization with users leveraging cloud apps.


By , January 12, 2016

Let’s continue our purely fictional story from last time, where we stepped into the shoes of our IT consultant, Tony. You may recall he works for ACME Consulting who provides outsourced IT services to Banzai. In a nutshell, we showed how easy it can be for Banzai to improve security, reduce risk, increase visibility, and provide secure access from anywhere, leveraging Centrify’s Privilege Service and Server Suite. Let’s peek inside Banzai’s IT world for an update from the IT Director, Tom: Well, the results came in and it’s safe to say (no pun intended) that our expectations were fully met with the…

By , January 11, 2016

So you have finally taken the plunge and decided to adopt Office 365. But as you embark on the Software-as-a-Service (SaaS) journey you come to realize that, as you adopt more and more SaaS applications, managing all these different logins could turn into a nightmare in the future. Not only would you have to touch each application when a new employee starts, but more importantly when an employee leaves. You start asking yourself questions like how do I manage to turn off access to all these cloud applications and how do I reclaim all the licenses from employees that have…

By , December 30, 2015

The Gartner IAM conference was such a whirlwind earlier in December. I was fortunate to attend a number of sessions from Gartner analysts and guest speakers. Let me break down some of the key takeaways that I learned:  1. Combining two authentication factors of the same kind does not increase security. Are you implementing two-factor (multi-factor) authentication the right way? Authentication factors require a mixture of three main types of authentication: knowledge, possession, and inherence. If we ask someone to authenticate with two knowledge factors, is this really secure? It’s easy to hack two authentication factors if they are available…

By , December 21, 2015

2015 sure has been a banner year for cloud technologies! A major development has been the mainstream adoption of containers. Google’s Kubernetes project and Docker have helped the adoption with major open source contributions in these areas. Back in 2014, we knew that Google launches more than 2 billion containers a week! More recently Docker shared that more than 1.3 billion container image downloads had been issued until November of this year, up from just over 2.75 million a year ago.  Cloud adoption for enterprises may be sooner than we expect — 34% of enterprises will have greater than 60% of their applications on cloud platforms in the next 2 years. Choice to go…

By , December 18, 2015

I am excited to announce that Centrify has added Smart Card login as a core feature of our Cloud Identity Platform supporting both the Centrify Identity Service as well as the Centrify Privilege Service. Smart Cards in physical form (CAC/PIV), derived credentials, virtual smart cards as well as USB PKI Keys (such as Yubikey or SafeNet eToken Pro) can now be used to login to your agency’s personalized Centrify cloud portal for access to SaaS applications as well as privileged user access to authorized servers and networking devices. There are several reasons that our customers are asking for this capability as they…

By , December 15, 2015

Over the past two years I have had countless conversations with customers and prospective customers who have asked: “we love what you do for SSO and MFA for employees, and how you do privileged identity management for IT staff … can we extend those capabilities to our business partners and customers?” These customers have all had a common goal in mind — they want to use a single platform and tool to manage user access to resources regardless of who the user is or where the user identity comes from. Well, to all of those people who I have discussed…

By , November 19, 2015

I don’t know when it started, probably during my cartoon watching childhood days, but somewhere in days past — I developed a taste for Science Fiction. I suppose Flash Gordon and the Jetsons got me started and from there, I moved on the harder stuff — like Lost in Space, The Twilight Zone, The Time Tunnel, and of course Star Trek. I realize that some of those shows might be unfamiliar to you. Honestly, based on the quality of CGI and the talented professionals behind special effects today, those shows would likely be classified as… well… lame. True enough, the special…

By , October 27, 2015

Google Apps for Work is quite a popular choice amongst the small businesses and younger companies that are born in the cloud. However, Google is pushing the envelope further to make its way into larger enterprises with their initiative “Google for Work.” Well, there’s good news — Centrify has the solutions to help with the adoption of Google Apps for Work in mid to large enterprises. Before we go any further, let’s take a look at Google Apps for Work adoption numbers published by Google: More than one million paying organizations are actively using Google Drive, including companies like The New York Times, Uber,…

By , October 20, 2015

Enterprise customers are finding value in deploying Chromebooks, and it can be seen from the Gartner forecast on the Chromebook adoption worldwide (below). Some of the early adopters include Netflix, Starbucks and Sanmina — because of their security, simplicity and ability to integrate into existing technology and infrastructure. As more enterprises adopt these endpoints, one important consideration for IT is handling identity management for Chromebooks. One of the comments from Isabelle Durand, principal analyst at Gartner, stuck a chord with me: “By adopting Chromebooks and cloud computing, businesses can benefit; they can shift their focus from managing devices to managing something much more important —…

By , September 17, 2015

Our always on, always connected world has fundamentally changed how businesses operate. Communicating with customers and employees will never be the same again with cloud solutions bringing many benefits by making things easier for businesses, and it’s happening whether we like it or not. But many businesses are placing trust in the cloud like they did for internal networks, without proper consideration for the challenges and deeper issues at hand. The added convenience of cloud applications also comes with a potential downside, such as potential security threats and surrender of control. Many people are familiar with the acronym “IoT,” and…