Addressing the Top Five App Risks in Business

It’s a time of conflict There’s a battle within businesses, and the battleground is your applications. Employees – in the name of productivity – are adopting new cloud and mobile applications every day.  IT – in the name of security – is trying keep private data secure against breaches. Both groups often think the other “doesn’t get it.”  Users complain about complex password policies, and security-related “hoops” they have to jump through.  IT complains about endless helpdesk calls for password resets, shadow IT introducing risk, and an inability to secure an ever-changing hybrid environment. But both groups have more common…

Modernizing Legacy Apps to Boost Security: Part II

As we discussed in part I of this article, many companies are still in the process of modernizing their legacy apps. There are a number of reasons to do this, but securing your environment is typically the main goal. We’ve already identified that a (software) token-based system as essential. Let’s continue with a couple more best practices. Provide for User Provisioning An application needs user data — not for authentication, but because it needs to know the role and responsibilities of the person logging in so that privileges inside the app can be managed and regulated. Therefore, a database of…

SSO for Cloud-Based Apps a Key to Collaboration Success for Shiseido

At the end of last year, PC Magazine published an article about the five collaboration trends to expect in 2016. The article stated that, “Distributed teams have more ways than ever to communicate and collaborate in real time, and 2016 is set to bring another wave of innovation around cloud-based connectivity, cross-platform integration, and next-generation multimedia conferencing.” They were pretty accurate. Collaboration between employees and contractors — working from anywhere but the office – is more common every day. And, as the article predicted, “cloud-connected everything” (the #2 trend) and “seamless interoperability” (#4) are the name of the game. But building a truly collaborative…

Five Steps to Stay Secure in the Mobile Age

Least surprising note of the day: I am a huge geek. See my picture up there? Nerd beard. Enough said. My current geek obsession is focused on mobile devices. I just upgraded my fantastic and near-new Google Nexus 6P to a Google Pixel XL. Why? Because NEW PHONE. And Google AI Assistant. But mostly, NEW PHONE. And if you’re wondering, it is indeed a fantastic device, and of course it’s secured by Centrify. I had the new phone shipped to me here at work, so I could “move in” right away. As I compared the new and old devices, and…

Centrify Expands It’s Developer Program to Make it Easier to Add MFA, SSO and Access Control to Apps

Single sign-on, social login, multi-factor authentication (MFA), password reset and access control can now be easily integrated into cloud, mobile and behind the firewall apps from third party developers by integrating Centrify APIs. Application developers are in a modern day wonderland where they can build multifaceted and intricate apps that function across user devices without having to build much computing or coding infrastructure.  It is now taken for granted that developers tap into well known APIs like Twitter, Facebook, Google or eBay to enrich their apps with new layers of context, function and integration. The API economy essentially allows developers to outsource some…