Cyberthreats to SAP Require a Next-Generation Identity Platform

With over 320,000 customers worldwide, SAP is one of the most critical business applications in the market. Because of the information that it contains, it is also one of the most targeted applications and systems for cyberthreats. Over the past few years, the SAP landscape has expanded beyond legacy ERP systems into technologies such as cloud, mobile, big data and the Internet of Things (IoT), while at the same time broadening the attack surface for SAP applications. According to a Ponemon Institute survey released earlier this year: Two of three SAP platforms were likely breached between 2014 and 2015. 75%…

SSO for Cloud-Based Apps a Key to Collaboration Success for Shiseido

At the end of last year, PC Magazine published an article about the five collaboration trends to expect in 2016. The article stated that, “Distributed teams have more ways than ever to communicate and collaborate in real time, and 2016 is set to bring another wave of innovation around cloud-based connectivity, cross-platform integration, and next-generation multimedia conferencing.” They were pretty accurate. Collaboration between employees and contractors — working from anywhere but the office – is more common every day. And, as the article predicted, “cloud-connected everything” (the #2 trend) and “seamless interoperability” (#4) are the name of the game. But building a truly collaborative…

How Centrify Can Help AWS Customers Comply with New HIPAA CSP Regulations

New HIPAA regulations are driving heightened security around electronic protected health information (ePHI) and Cloud Service Providers (CSP). These regulations detail the types of security for data in the cloud, as you might expect, but they also focus on securing and controlling the access to cloud systems, infrastructure and data. In the simplest terms, this means healthcare companies and their business associates (BA), need to focus on securing and managing resources IN the cloud, as well as securing and managing access TO the cloud. This can be broken down to mean that healthcare companies need to: Ensure cloud resources are…

How To Prevent Cybercrime: CFO Insights for Mid-Market and SMB Companies

Cybersecurity Risk From the Break Room to the Board Room How can CFO’s enable an organization to effectively combat cybercrime, while reducing IT security budgets? If this sounds too good to be true, let me explain how it can be done. Cyber risk is present at every level in every company from the break room to the board room. In retail, data breaches occur in companies of every size; from Yellowfront, a one-store grocer in Maine to the massive Home Depot and Target breaches. Cyber awareness of social engineering attack modes is a management priority, and all employees have responsibility in preventing…

The Government Cloud is Coming

If you’re like me, you’ve been hearing the phrase, “the cloud is coming” for years before you ever learned that winter was too. I never read any of the books, which first came out in 1996, so it wasn’t until the Game of Thrones TV series started in 2011 that I first heard the phrase “winter is coming.” So, when did I start hearing of the cloud’s inevitability? For me, the “cloud” started when people began insisting that it didn’t really exist, like Oracle’s Larry Ellison did back in 2008. And I distinctly remember thinking that ‘ol Larry had a point….

Cloudbound? How to Secure Your Migration to AWS

I’ve always enjoyed hearing grand stories of moving workloads to the cloud. This allows sharing resources you no longer have to manage and you gain access to all the processing power needed to finish jobs in an efficient manner. The best part is that you pay only for what you use. This explains Amazon Web Services (AWS) Elastic Compute Cloud (EC2) success.  In simple terms, move workloads to the cloud and you’ll be happy! This is awesome — yet, there is one question I often have. How will you secure this? Verizon’s 2016 Data Breach Investigations Report states 63% of data breaches involve compromised passwords. Amazon knows this and has done a fine job of building a…

Using the Centrify Developer Platform

As my colleague Ben points out, the world of software has become one of interoperability and interaction through APIs.  Using libraries and APIs to construct a user experience is no longer the specialized domain of ISV’s building something specific and targeted at a distinct set of users.  Instead, everyone from application developers to IT and security professionals regularly look to integrate directly with the products they use at a programmatic level. For IT and security professionals, the ability to tightly integrate and leverage a vendor’s product as a tool in their own workflow is paramount to their ability to service customers, whether it is…

Forrester Study: Managing Privileged Access Security in a Hybrid IT World

We recently commissioned a Forrester study to find out how IT decision makers deal with privileged access security in hybrid IT environments. The survey tested the hypothesis that as organizations open up access to remote users and move more of their workloads to the cloud, their privileged identity management (PIM) solutions should also move to the cloud. The results are in! Having a PIM solution that is purely on-premises is no longer enough to secure privileged access to hybrid infrastructure and applications. The survey data shows that 92% of organizations are either currently outsourcing, or planning to outsource at least one…

The Cows Have Come Home: Now is the Time to Implement Multi-Factor Authentication

During our conversations with customers and prospects these days, the question of implementing multi-factor authentication (MFA) usually begins with “when do you plan to?” instead of “are you planning to?” We no longer need to ask: “Are you planning to implement MFA for remote server access and application access?” “Are you planning to implement MFA for password checkout and privilege elevation?” Starting the question with “when” assumes it’s a given. It is. The power and value of MFA is now broadly recognized. More so in the U.S. now that the Payment Card Industry Data Security Standard (PCI-DSS 3.2, April 2016) has…

Centrify Partners with ServiceNow to Deliver Increased Security and Fulfillment Automation of App and Server Access

Today I am really excited to share that our three new product integration certifications with ServiceNow have raised the bar for identity services automation! These are around automating user password resets, application access requests and server/system access requests. All these integrations have been made possible by Centrify’s cloud identity security offerings — Centrify Identity Service (CIS) and Centrify Privilege Service (CPS). So why am I excited? 1) Centrify is the first vendor to support identity service automation for both end-users and privileged users to increase security and significantly reduce workloads and save time for ServiceNow request fulfillment. This means IT…