Centrify Brings Secure Identity Data to the Open Network Insight Project

Centrify has been working with Cloudera for years around our many joint customers and a partnership embracing the product strengths of both companies. Building on this foundation, Cloudera and Centrify today announced that Centrify has joined the Open Network Insight (ONI) project. ONI is an open source, Apache 2.0 licensed cybersecurity project that leverages big data and machine learning to detect advanced threats. ONI provides an open data model for Network, and with the addition of Centrify to the project will be extended to include identity. By extending ONI’s open data model into identity, Centrify is allowing users to centralize identity and…

Centrify Announces Centrify Server Suite 2016.1

I’m happy to announce the general availability of Centrify Server Suite 2016.1. Server Suite is our flagship product for enterprise-ready privileged identity management (PIM). It’s a big part of our overall PIM solution, along with Centrify Privilege Service. Every year, we aim to deliver one major feature release of Server Suite, usually towards the end of the calendar year, and a minor release in the late spring or early summer that rolls up all the maintenance work we’ve done and introduces a few minor feature updates. In this year’s maintenance release, however, we’ve added what I think are some really…

IBM — Centrify Partnership Brings Identity Security to IBM Big Insights

IBM is truly the original Big Data company. Going back to 1911 when IBM (then called Computing-Tabulating-Recording Company, or C-T-R) acquired Herman Hollerith’s Tabulating Machine Co., IBM has continuously brought innovation and insight to data recorded with computing machines.  The Tabulating machine was invented by Mr. Hollerith to count the 1890 US Census. It sorted and counted information recorded by punching holes in cards, and Hollerith had begun selling the machines to governments, railroad companies and retailers. Thus began the Big Data era.  The idea that businesses could gather data and analyze it to obtain competitive advantage/improve efficiency became the driving…

Identity Management for Multi-Tiered Big Data Environments

Are you satisfied that your big data applications are protected against cyberthreats? Are you able to prove compliance across the big data stack? If not, read on! Big Data environments usually have clusters of nodes, and each node has, at the bottom layer, an operating system on which the big data and applications sit on. For example — imagine an IBM BigInsights customer using the Big SQL application, based on a Hortonworks cluster running on Linux operating system. It can be challenging to figure out how to properly secure each layer of this stack! To help understand this better, let’s…

Securing Your Big Data Environments Built on Hadoop or NoSQL?

Do you know the percent of all Big Data projects that must meet some level of compliance? According to a recent SANS survey, over 80% have to today. The logical conclusion is that you already have sensitive data that you need to protect — it’s not a case of “if.” So, how are you protecting data from cyberthreats and proving compliance? Over the last few years, Centrify has worked with the leading vendors in Hadoop to deliver their customers’ enterprise-grade identity and access management (IAM). We’re the industry’s first privileged identity management (PIM) solution for Big Data and announced our partnership with…

Simplify and Secure Hadoop with Centrify

Do you have to secure your company’s Hadoop cluster as it moves to production? Concerned about setting up and managing an MIT Kerberos implementation? We’ve been working with over 40 enterprises across six major verticals over the last few years to address their Big Data IAM challenges. This blog post describes some of the key challenges they’ve faced, and how we at Centrify have helped address them.  Active Directory Integration Often, Hadoop projects within an enterprise are piloted by business units and then moved to production once the use case is validated. And, one of the first decisions business units and…

Plan to Secure Your Big Data Implementation and Meet Federal Compliance Mandates

For years Centrify has been deployed to help secure access to Hadoop clusters, and my team has helped to configure and deploy Centrify and Kerberos within many of them. Initially our involvement often started as clusters moved from pilot to production. Our sense is that someone in IT asked the questions: “How are we going to secure access?” “How are we going to provision and de-provision?” “How does this fit within our security mandates?” Centrify is called in to address these concerns. In most cases it would have been better if we’d been involved earlier, so as to better understand implementation…

How Centrify is Innovating in the Four Biggest Trends in IT … #1 Big Data

Recently at a CEO summit hosted by one of our investors I heard the CEO of VMware say that the four top of mind items for CIOs are Big Data, Mobile, Cloud and Security. This echoes what Gartner has been saying since late 2012 that these are the top 4 “big trends” that will “change IT.” Even IBM announced this week as part of their restructuring that these four areas are their most significant “strategic imperatives.”

Secure Identity for Hadoop @ Strata+Hadoop World 2015

The most interesting thing to me about Strata+Hadoop World was the stories about what everyone is doing with Hadoop or Big Data. We heard numerous stories about how data scientists are using Hadoop to analyze customer data, financial data, web site click traffic, etc. In fact, most of the people who came to the show were realizing the value of Hadoop technology, while very few were responsible for the IT infrastructure that it runs on (who we normally sell security solutions to). And the most common title at the show was Data Scientist, which got me thinking that we should have a Security…