Partner Corner

Partner Corner

Centrify shares perspectives from its growing global sales partner network and technology alliances network, and information about these partners – including its North America Channel Partner Network, and worldwide reseller and distribution partnerships.


By , April 20, 2016

It’s industry standard for vendors to hand out annual awards, and Centrify is no different. The Centrify Channel Partner Network (CCPN) was launched in January of 2014 and is focused heavily on core strategic partners. Last year, we were able to launch our own CCPN awards program to honor partners that have embraced our efforts and program. Now that we are in our second year of awarding partners, there are some very obvious metrics that we have seen that drive success selling and managing Centrify’s products. There is a very high percentage of our partner community that have met the…

By , April 13, 2016

With a knowledge base and a self-service portal in place, you’re probably enjoying the fact that when someone in your organization needs help with a problem that they can solve on their own. It’s great to have options that will only make your business stronger — if you know how to properly utilize them. Yes, you can utilize the knowledge within your organization! Encyclopedias aren’t just made to look pretty on a shelf, their purpose is to use history to inform future decisions and help people draw conclusions that will make the world a better place. Okay, so that’s a…

By , March 24, 2016

IBM is truly the original Big Data company. Going back to 1911 when IBM (then called Computing-Tabulating-Recording Company, or C-T-R) acquired Herman Hollerith’s Tabulating Machine Co., IBM has continuously brought innovation and insight to data recorded with computing machines.  The Tabulating machine was invented by Mr. Hollerith to count the 1890 US Census. It sorted and counted information recorded by punching holes in cards, and Hollerith had begun selling the machines to governments, railroad companies and retailers. Thus began the Big Data era.  The idea that businesses could gather data and analyze it to obtain competitive advantage/improve efficiency became the driving…

By , March 9, 2016

Password managers are popping up across enterprises. And, many have a full electronic rolodex of passwords and usernames for all applications ranging from Amazon Prime account to a TurboTax login. While juggling authentication in one’s personal life might not be an issue, doing so professionally is cumbersome, and ultimately undermines productivity. The modern organization has an app for everything. It’s how we manage projects and delegate tasks, how we see the history of a sales interaction in a lead’s contact information, and even how we contact one another in the office. Technology has made it much easier for us to…

By , February 29, 2016

Have you ever reported to the police that someone else’s car was stolen or burglarized?  You haven’t?  Certainly you have heard a car alarm.  Why did you fail to act when the car alarm sound blared into your ears?  Hint: almost no one believes car alarms and so we are lulled into a false sense of security. Where this false sense of security has reached epic proportions is in our collective security for our digital identities. We use passwords so we think we are safe, but we are already compromised and don’t even know it! Business employees are using more varied devices…

By , February 23, 2016

Live from Mobile World Congress in Barcelona! Today, I am pleased to share that Blackberry has partnered with Centrify to provide an even greater level of security for highly regulated customers in the government and financial sectors that use Good Secure Mobility Platform. Together, Blackberry and Centrify are delivering a turnkey solution for using smart card-derived credentials for secure access to thousands of apps and servers on Good secured mobile devices. Blackberry wanted to open the door to full secure mobility for its public sector customers like state and federal governments, as well as security-conscious financial companies that rely on…

By , February 1, 2016

Today I am really excited to share that our three new product integration certifications with ServiceNow have raised the bar for identity services automation! These are around automating user password resets, application access requests and server/system access requests. All these integrations have been made possible by Centrify’s cloud identity security offerings — Centrify Identity Service (CIS) and Centrify Privilege Service (CPS). So why am I excited? 1) Centrify is the first vendor to support identity service automation for both end-users and privileged users to increase security and significantly reduce workloads and save time for ServiceNow request fulfillment. This means IT…

By , January 19, 2016

In April 2015, we announced Centrify’s integration with ServiceNow with support for Single Sign-On, MFA and Provisioning into ServiceNow, thereby providing a seamless, secure experience for users as well as streamlining user lifecycle management for administrators. Today, we’re excited to announce two new integrations built to advance our journey of “Identity Services Automation” with ServiceNow! Centrify Password Reset Centrify App Access for workflow integration With these integrations, we have enabled automation of identity services and app access. Centrify now leverages workflow processes of ServiceNow and delivers automation for access requests generated by ServiceNow’s platform.   Let us discuss both Centrify Identity Service integrations for ServiceNow….

By , January 7, 2016

Are you satisfied that your big data applications are protected against cyberthreats? Are you able to prove compliance across the big data stack? If not, read on! Big Data environments usually have clusters of nodes, and each node has, at the bottom layer, an operating system on which the big data and applications sit on. For example — imagine an IBM BigInsights customer using the Big SQL application, based on a Hortonworks cluster running on Linux operating system. It can be challenging to figure out how to properly secure each layer of this stack! To help understand this better, let’s…

By , November 11, 2015

  You’ve likely seen all the recent press surrounding  Google’s continued push into the enterprise since its launch of the Google for Work business tools including Apps for Work, Android for Work, Chrome for Work and Google Cloud Platform solutions.  Clearly Google is going “all in” on increasing both presence and market share of Google in the Enterprise, leveraging a partner ecosystem to help them accomplish these goals. Centrify’s continuing momentum and leadership around mobile and cloud identity management recently made us the only IDaaS vendor to have partnered with Google to offer the broadest set of third party identity…