Why Outsourced IT Deserves As Much (Or More) Security Than Internal IT

  This is a very short blog. Short on text, that is. Long on value. If you’re in IT, especially in IT management, please click on the following link to see the many ways — some unique to Centrify — that our new Server Suite 2016 and Privilege Service 15.12 protect your most sensitive data from being stolen. Rather than toss out a load of features and leave you struggling to figure out how to thread them together in a meaningful way that addresses your specific business needs, we’ve weaved them into a story. Stories are great! It’s fictional, but oh so apt given all the…

Outsourced IT Part Deux

Let’s continue our purely fictional story from last time, where we stepped into the shoes of our IT consultant, Tony. You may recall he works for ACME Consulting who provides outsourced IT services to Banzai. In a nutshell, we showed how easy it can be for Banzai to improve security, reduce risk, increase visibility, and provide secure access from anywhere, leveraging Centrify’s Privilege Service and Server Suite. Let’s peek inside Banzai’s IT world for an update from the IT Director, Tom: Well, the results came in and it’s safe to say (no pun intended) that our expectations were fully met with the…

Handing Over The Keys Without Exposing The Whole Kingdom

Are you nervous about the prospect of handing over superuser account passwords to a 3rd party? Have you already outsourced IT functions and reluctantly handed over the keys? If the answer to either one is “yes” then you’re faced with a potentially risky situation. Of course, you trust your partner. You’ll have performed background checks on individuals, established SLAs and operational best practices that constrain the usage of these privileged accounts. Still, surveys tell us that data breaches by insiders exploiting privileged identities are rampant, so why should we think we’re any safer trusting an external 3rd party where we…