Mobile Frontier

Mobile Frontier

Mobile platforms are the de-facto end points for accessing enterprise information and cloud apps. Centrify’s industry experts discuss important information and topics for any organization with users accessing information from mobile devices.


By , January 30, 2017

Before we go into how Multi-factor authentication (MFA) has changed, let’s have a quick look at what MFA is. With MFA, users must provide two or more “factors” of authentication when they access applications, networks and resources. MFA implementations use a combination of the following factors: Something you know: such as a username, password, PIN or the answer to a security question. Something you have: such as a smartphone, one-time pass token or smart card. Something you are: biometrics like your fingerprint, retina scans or voice recognition.   Now that we understand what MFA is, I’d like to point out that in today’s IT…

By , November 2, 2016

The Growing Threat of Mobile Malware The world’s projected population by 2020 is 7.8 billion people. By 2020, the expectation is that the population will have 11.6 billion mobile-connected devices, more than 1 device per person. As a result, mobile malware is becoming an increasing threat as cybercriminals seize the opportunity to access personal information for monetary gain and damage to both personal and business reputation. The proliferation of mobile devices has meant that mobile security risks are growing by the day, and businesses are recognising the increased threats they present to sensitive information as more and more companies allow…

By , June 20, 2016

Recently, when I was watching ESPN, it played a humorous bit involving NFL insider Adam Schefter’s kitchen shaking as if experiencing an earthquake, only instead it was just the cumulative rattling and vibrating from his 5 or 6 cell phones on the table. Of course the engineer in me immediately noted the impracticality of someone needing so many smart phones; however, this was not always the case in the early days of mobile computing. I met plenty of IT folks during the late 90’s who carried multiple cell phones and multiple pagers, since this was before true “smart” technology put a…

By , February 23, 2016

What is a derived credential anyway? You may have heard that Centrify announced support for “derived credentials,” in conjunction with its smart card offering. If you aren’t in the federal or ultra-secure enterprise space, you’ve probably never heard of derived credentials. So what’s so special about it? Users that are issued smart cards as their primary means of authentication have to physically insert a card into a reader on their desktop/laptop and then enter a PIN. This form of authentication replaces the username and password, and also covers the 2-factor requirement as well. (The card is something you have, and…

By , December 17, 2015

I just got back from the Gartner IAM Summit in Las Vegas. As always, it was a great summit chockfull of impressive speakers, informative content and valuable networking opportunities. In many of the sessions that I attended, a common theme was the convergence of identity and mobility. It was great to hear Gartner validating what we at Centrify have believed for quite some time. In fact, we were the first to deliver an integrated Identity-as-a-Service (IDaaS) and Enterprise Mobility Management (EMM) service back in 2012. Back then IDaaS and EMM were very distinct markets addressing different customer problems. So, why did we…

By , November 25, 2015

Last week I attended an executive forum hosted by Centrify and our partners, Google and Vox Mobile. We had a great lineup of speakers, including Andrew Toy (Android for Work Product Management Director), Jim Haviland (Chief Strategy Officer of Vox Mobile) and our very own Bill Mann. As the speakers shared their perspectives and insights on where mobility is going and what’s needed to get there, a few things really hit home for me. Mobility ≠ the latest phone or email We’ve only just scratched the surface of how mobility can truly transform business. Yes, email and other productivity apps…

By , November 5, 2015

I’ve worked in security companies nearly my whole career, so I understand why building security into our solutions is important. However, for some it can be a challenge, because the details of security can sometimes be complicated and difficult to understand. It’s our job as a security company to make these things easier to understand, but also to make sure security is something that “just works,” and isn’t a reactive function. Let’s talk about an example that should make this more clear. Recently, the team here at Centrify alerted me to a news report that a security researcher, Lookout, had…

By , October 21, 2015

It’s Halloween time, which means new candy from Google in the form of Android 6, and a few new Nexus devices (this time with fingerprint readers). The mobile team at Centrify has also been hard at work on some really great features — some of which work to manage and secure some of the fancy new capabilities of the new Android devices. It’s all in the hands In the November release, we will have full support for the new native fingerprint readers that should become ubiquitous on Android devices over the coming year.  Google is banking on this fingerprint technology being…

By , September 16, 2015

Today, Apple released its much anticipated iOS 9, which boasts new features like a more intelligent and proactive Siri and improved performance and battery life. Enterprise users will eagerly upgrade as soon as they see that little red notification badge on their iPhones and iPads — often despite the IT notification to not upgrade until IT has tested iOS 9 against critical apps. The good news is that Centrify has IT’s back. As with iOS 8, Centrify is pleased to announce day one support for iOS 9 for Centrify Identity Service (CIS). Customers can rest assured that as users upgrade…

By , July 27, 2015

Ben is a sales guy. He works for a Centrify customer. Ben’s very good at his job, which means he’s focused on sales. It also means he’s not focused on details like where he parks his rental car, or his hotel room number, or where he leaves his computer. Ben recently was on his way home from a great sales call in another city. He finished up with the customer, was very happy about the progress. While on the airport shuttle bus, he jumps on a conference call. He stays on the conference call the whole time he’s on the shuttle bus. He…