Securing Enterprise Identities For Dummies: Free Live Webinar

In previous blogs, “Securing Enterprise Identities For Dummies, Part One and Part Two,” I wrote extensively about how identity can provide a new layer of security for your organization. Identity can be a powerful security tool for protecting both end-users and privileged users from the leading cause of data breaches — compromised credentials. Implementing an identity platform for both identity as a service and privileged identity management can add a strong player security for your organization. In Part One, we covered how the traditional network perimeter is inadequate for today’s apps and infrastructure, which are increasingly cloud and mobile. We also…

Why Outsourced IT Deserves As Much (Or More) Security Than Internal IT

  This is a very short blog. Short on text, that is. Long on value. If you’re in IT, especially in IT management, please click on the following link to see the many ways — some unique to Centrify — that our new Server Suite 2016 and Privilege Service 15.12 protect your most sensitive data from being stolen. Rather than toss out a load of features and leave you struggling to figure out how to thread them together in a meaningful way that addresses your specific business needs, we’ve weaved them into a story. Stories are great! It’s fictional, but oh so apt given all the…

Federating Office 365 — an ADFS Alternative

So you have finally taken the plunge and decided to adopt Office 365. But as you embark on the Software-as-a-Service (SaaS) journey you come to realize that, as you adopt more and more SaaS applications, managing all these different logins could turn into a nightmare in the future. Not only would you have to touch each application when a new employee starts, but more importantly when an employee leaves. You start asking yourself questions like how do I manage to turn off access to all these cloud applications and how do I reclaim all the licenses from employees that have…

A Single Identity Platform for All Users

Over the past two years I have had countless conversations with customers and prospective customers who have asked: “we love what you do for SSO and MFA for employees, and how you do privileged identity management for IT staff … can we extend those capabilities to our business partners and customers?” These customers have all had a common goal in mind — they want to use a single platform and tool to manage user access to resources regardless of who the user is or where the user identity comes from. Well, to all of those people who I have discussed…