Mobile World Congress 2017: It’s Not About the Phones Anymore

I’m here at Mobile World Congress 2017, and of course all the big names have new phones, but we expect that now. This year the theme is decidedly more about the future. Every year MWC has a theme, which is usually some sort of catchy marketing phrase. However, this year the theme is “The Next Element,” and I think it fits. Things like 5G connected cars, drones, VR and IoT are the showcase of many of the companies here. This is all great, and I like the progress the industry has made in just the last year. However, for me being…

Ponemon 2017 Report: The Need for a New IT Security Architecture

It’s annual cybersecurity reporting season and first up in 2017 is the Ponemon Global Study, “The Need for a New IT Security Architecture” sponsored by Citrix. The study reveals global trends in IT security risks and reasons why security practices and policies need to evolve in order to deal with threats from disruptive technologies, cybercrime and compliance. Changes in the workplace and problems managing IT security are also increasing risks to the organization. This report surveyed more than 4000 global IT and security practitioners and discusses the findings that concern risks created by cybercrime, employee negligence and organizational dysfunction and…

Addressing the Top Five App Risks in Business

It’s a time of conflict There’s a battle within businesses, and the battleground is your applications. Employees – in the name of productivity – are adopting new cloud and mobile applications every day.  IT – in the name of security – is trying keep private data secure against breaches. Both groups often think the other “doesn’t get it.”  Users complain about complex password policies, and security-related “hoops” they have to jump through.  IT complains about endless helpdesk calls for password resets, shadow IT introducing risk, and an inability to secure an ever-changing hybrid environment. But both groups have more common…

Solving DHS Continuous Diagnostics and Mitigation (CDM) Phase 2

The Department of Homeland Security (DHS) established a $6B blanket purchase agreement (BPA) to improve the cyber defenses for federal, state, local, tribal and territorial governments. The DHS Continuous Diagnostics and Mitigation (CDM) program helps protect government IT networks from cyberthreats and enhances risk-based decision making by providing a consistent and proven set of solutions. Centrify is the selected solution for CDM Phase 2 CRED that ensures all federal agency associates only have access to servers, applications or network resources based on their unique identity, role and responsibility within their organization. Centrify Server Suite offers a robust Active Directory bridge…

Centrify Crushes Competition for Mac Management via Microsoft Active Directory

In a November 7th Network World article, reviewer Tom Henderson evaluated three different solutions for managing Macs inside a Microsoft Active Directory environment. We look forward to reviews like this due to their ability to illustrate the strengths of our Mac solution from a third-party perspective, and to show customers exactly how we stack up against the competition — on top! Early in the review, Henderson noted that Centrify allows for the direct control of “virtually everything in the Systems Preferences app of our Macs.” In fact, we support over 300 policies for managing Mac configuration and security settings including…

Why is Single Sign-on for Mobile Applications Important?

The Growing Threat of Mobile Malware The world’s projected population by 2020 is 7.8 billion people. By 2020, the expectation is that the population will have 11.6 billion mobile-connected devices, more than 1 device per person. As a result, mobile malware is becoming an increasing threat as cybercriminals seize the opportunity to access personal information for monetary gain and damage to both personal and business reputation. The proliferation of mobile devices has meant that mobile security risks are growing by the day, and businesses are recognising the increased threats they present to sensitive information as more and more companies allow…

Five Steps to Stay Secure in the Mobile Age

Least surprising note of the day: I am a huge geek. See my picture up there? Nerd beard. Enough said. My current geek obsession is focused on mobile devices. I just upgraded my fantastic and near-new Google Nexus 6P to a Google Pixel XL. Why? Because NEW PHONE. And Google AI Assistant. But mostly, NEW PHONE. And if you’re wondering, it is indeed a fantastic device, and of course it’s secured by Centrify. I had the new phone shipped to me here at work, so I could “move in” right away. As I compared the new and old devices, and…

How to Secure Your Mobile Device, In an Unsafe World

You’ve seen the news headlines, “900 Million Android Devices Vulnerable!” Which, at first glance seems pretty shocking — after all, that’s roughly half of all active Android devices. If you are like me though, this kind of news is becoming all too normal. It seems there is always some new hack, exploit or vulnerability. Before this, it was Stagefright – the vulnerability where an attacker could gain control of your device with just an MMS message. When it comes to mobile devices, there is a certain sensitivity. For most of us, if someone is able to gain control of our device,…

Raise a Glass: Rémy Cointreau Chooses Centrify to Enable Secure Access to Apps from Any Device, Anywhere in the World

When it comes to some of the world’s finest Cognac and spirits, many of us turn to offerings from Rémy Cointreau. As one of the world’s leading alcoholic beverage brands, Rémy Cointreau employs 1,800 people all over the world and has more than $1 billion in annual sales. Rémy Cointreau recently chose Centrify to enable secure access to apps from any device, anywhere in the world.  When Chief Technology Officer Sébastien Huet joined Rémy Cointreau in 2015, one of his primary objectives was to help transform the company into a more agile organization. A key component of that transition would be…

Billions of Dollars in Infosec Spending Wasted on Legacy, Network Security

The Vormetric 2016 Data Threat Report published in January 2016 provides valuable insight into trends in encryption and data security. The 2016 report surveyed over 1100 global security executives in mid-market and large enterprises across federal, retail finance and healthcare markets. In 2015 the incidence of breaches increased and the volume of records breached doubled over the prior year despite increased security spending. The report highlights a critical thinking gap, as security executives continue to equate compliance with security. “Compliance does not ensure security,” according to Garrett Bekker, 451 Research senior analyst and the report’s author. Compliance Does Not Equal Security “As we learned from data…