Announcing Centrify’s New Analytics Service

After about two years of incredible hard work from the Centrify team, I am excited to announce the Centrify Analytics Service! Our goal for Centrify Analytics Service is to extend the Centrify Identity Services Platform to provide risk-based access management across apps and infrastructure. We all by now agree that IT and security teams in any enterprise are challenged with the risk of being breached in an enterprise that spans across cloud, mobile and data center. Traditional perimeter-based security is not good enough anymore, and the industry supports this claim: PwC in Information Security Breaches Survey 2016 titled, “A matter of when,…

Addressing the Top Five App Risks in Business

It’s a time of conflict There’s a battle within businesses, and the battleground is your applications. Employees – in the name of productivity – are adopting new cloud and mobile applications every day.  IT – in the name of security – is trying keep private data secure against breaches. Both groups often think the other “doesn’t get it.”  Users complain about complex password policies, and security-related “hoops” they have to jump through.  IT complains about endless helpdesk calls for password resets, shadow IT introducing risk, and an inability to secure an ever-changing hybrid environment. But both groups have more common…

How Much Does It Cost to Protect an Organization from Cybercrime?

$15 million per year is the mean annualized cost if you don’t protect yourself, based on 58 benchmarked organizations according to a study by Ponemon Institute in 2015. 2014’s mean cost per benchmarked organization was $12.7 million. Thus, we observe a $2.7 million (19 percent) increase in mean value. The net increase over six years in the cost of cyber crime is 82 percent. Figure one shows an average annualized cost per sector (1 Million omitted) The same study concluded that the cost breakdown for: Internal activities is 31% for detection, 24% for recovery, 15% for investigation, 13% for containment, 9%…

What is Customer Success?

Customer Success at Centrify is more than just an approach to account management or the name of a department. It is a mindset that reaches from the pre-sales process to renewal. With every interaction, Centrify’s goal is to add and drive value for our customers and partners. Centrify as a company is fully invested in the entire customer journey, as every area in the company is focused on our customers’ success, from the moment they sign-up to support and engineering, from professional services to marketing and from product management to our executive team. Every one of these areas are not just interacting…

Changing the Game: Simplified Authentication to IaaS

I am pleased to introduce the Identity Broker capability of the Centrify Privilege Service. Identity Broker for Linux enables a new paradigm in user authentication to Linux systems, which seamlessly integrates your choice of directory service, including Active Directory, LDAP directories or cloud directories such as Google G Suite Directory. This is a significant advancement in Centrify’s identity consolidation capabilities and delivers freedom of choice when deciding where to store your identities. For 12+ years, Centrify has focused on delivering some of the best possible integration of Linux servers into Active Directory. Our customers are successfully securing identity, authentication and privilege across…

SSO for Cloud-Based Apps a Key to Collaboration Success for Shiseido

At the end of last year, PC Magazine published an article about the five collaboration trends to expect in 2016. The article stated that, “Distributed teams have more ways than ever to communicate and collaborate in real time, and 2016 is set to bring another wave of innovation around cloud-based connectivity, cross-platform integration, and next-generation multimedia conferencing.” They were pretty accurate. Collaboration between employees and contractors — working from anywhere but the office – is more common every day. And, as the article predicted, “cloud-connected everything” (the #2 trend) and “seamless interoperability” (#4) are the name of the game. But building a truly collaborative…

Comparing Cloud Identity and Access Management (IAM) Solutions

The State of the IAM Market With the huge shift to the cloud happening and the corresponding plethora of SaaS apps now invading enterprises, it is not surprising that the need for identity and access management solutions built for the cloud is rising in importance in the minds of IT buyers. This is because each newly deployed cloud-based app can become an island of identity unto itself. This in turn causes the problems of end users drowning in too many passwords (which also increases the odds of one being stolen), the inability for IT to quickly provision and de-provision users…

National Cybersecurity Awareness Month: Lock Down Your Login

I just found out that October is “National Cyber Security Awareness Month.” Being in the security industry and seeing all the bad cybersecurity practices out there on a daily basis, I think every day we should evangelize the do’s and don’ts in regards to security; but, if we only get one month a year by Presidential proclamation, it beats nothing! As I dug into this awareness campaign, I noticed an initiative called STOP. THINK. CONNECT.™ that is sponsored by the National Cyber Security Alliance, and the “Lock Down Your Login” campaign, which was launched in September and does a nice job…

Multi-factor Authentication Solutions: Only as Strong as the Weakest Link

I’m going to stray slightly from the teaching aspect of my blogs to some recent revelations in the technology industry, specifically regarding multi-factor authentication (MFA). Unfortunately, this technology has become necessary for the everyday person, not just for businesses. I say “unfortunately” because it usually creates extra hurdles for end users that they would rather not deal with every time they want to check their email or Twitter account.   First, I’m going to give you a small sampling of what problems we face, how we address it and then share the scary part that even extremely experienced folks may not realize. The World…

Centrify Provides Day One Support for macOS Sierra and iOS 10

Today Apple released macOS Sierra and once again Centrify has ensured that our customers are ready to embrace the new release and its exciting new features with day one support. Centrify’s day one support for Sierra is effective across the entire product line, including our Centrify Identity Service, Centrify Express for Mac and Centrify Express for Mac Smart Card offerings. In addition to supporting the latest macOS release, Centrify has also provided day one support for the recently released iOS 10 update. With support for both of the new releases from Apple our customers can rest assured that they can take…