What’s Next from Google Cloud: Scenes from Google Next

Google Cloud last week had their big event in San Francisco, gathering Partners, customers and Googlers alike to talk about Google Cloud and its bright future. Centrify was proud to sponsor this event, and we had a presence in the Partner Playground, which allowed us to visit with hundreds of Google Next attendees to understand what they were doing with Google Cloud. Of course we spoke with Centrify customers, Google customers and some prospective customers, but interestingly, most of these conversations were with those who are already using software as a service (SaaS) or identity as a service (IDaaS) today….

Veterans Day: My Transition from Artillery Officer to Identity Management Professional

As an Artillery Officer in the United States Army, I am tasked with the challenge of understanding the enemy, their assets and capabilities, and from what vectors they can and will attack. Based on this knowledge and understanding, it is my responsibility to recommend to the commander on the ground: Where he should place his indirect fire assets (howitzers and mortars). Where he should place his observation platforms (forward observers, radars, and UAVs). What additional enablers (Fixed Wing and Rotary Wing Aircraft) he should request from higher headquarters to ensure his units are properly defended and conditions are set for…

SAP TechEd: 3 Realities of the SAP Community

We just completed another productive week at SAP TechEd and would like to thank the many Centrify customers who visited with our team and reaffirmed that Centrify is a vital to securing their SAP environments. Our customers inspire us to work harder each day, and we will continue to do our very best to maintain their confidence and trust. After attending the conference, and as we look ahead, Centrify understands these three realities of the SAP community: SAP systems are under constant attack: Since SAP is a critical business application in an enterprise containing some of the most crucial business data, intellectual…

SIEM Partnerships with IBM, Splunk and HPe Grow Centrify Partnership Ecosystem

Have you ever wondered what happens to all the information that is generated by computers as they log the activities of users doing things? Every click, every command, every application interaction and every error is recorded as these actions occur. Sometimes these “events” figuratively do go on a road to nowhere… they just sit unanalyzed on a server somewhere waiting to fill up the disk with their eventual growth. The answer to the first sentence is that the information lies in these stacks of data, and that is a problem. As soon as you say problem — here comes software to the…

Centrify Brings Secure Identity Data to the Open Network Insight Project

Centrify has been working with Cloudera for years around our many joint customers and a partnership embracing the product strengths of both companies. Building on this foundation, Cloudera and Centrify today announced that Centrify has joined the Open Network Insight (ONI) project. ONI is an open source, Apache 2.0 licensed cybersecurity project that leverages big data and machine learning to detect advanced threats. ONI provides an open data model for Network, and with the addition of Centrify to the project will be extended to include identity. By extending ONI’s open data model into identity, Centrify is allowing users to centralize identity and…

Empower Employees Through Automation

With a knowledge base and a self-service portal in place, you’re probably enjoying the fact that when someone in your organization needs help with a problem that they can solve on their own. It’s great to have options that will only make your business stronger — if you know how to properly utilize them. Yes, you can utilize the knowledge within your organization! Encyclopedias aren’t just made to look pretty on a shelf, their purpose is to use history to inform future decisions and help people draw conclusions that will make the world a better place. Okay, so that’s a…

Chain Reaction — Strengthening the Weakest Link with Third Party Identity Management

Dealing with third parties is an inevitability of modern day business, and so too is the risk of a data breach. Unfortunately, the two often go hand in hand. Organisations are subject to the security of their supply chain, partners and contractors, and need to verify the legitimacy of these third parties. Allowing them external access to your corporate network puts additional strain on IT managers and Sysadmins to maintain business productivity without compromising security. Businesses must incorporate an additional layer of defence in order to protect sensitive corporate data from the threats posed by potentially less security-minded third parties,…

Centrify Partners with ServiceNow to Deliver Increased Security and Fulfillment Automation of App and Server Access

Today I am really excited to share that our three new product integration certifications with ServiceNow have raised the bar for identity services automation! These are around automating user password resets, application access requests and server/system access requests. All these integrations have been made possible by Centrify’s cloud identity security offerings — Centrify Identity Service (CIS) and Centrify Privilege Service (CPS). So why am I excited? 1) Centrify is the first vendor to support identity service automation for both end-users and privileged users to increase security and significantly reduce workloads and save time for ServiceNow request fulfillment. This means IT…

5 Nuggets of Wisdom from the Gartner IAM Conference

The Gartner IAM conference was such a whirlwind earlier in December. I was fortunate to attend a number of sessions from Gartner analysts and guest speakers. Let me break down some of the key takeaways that I learned:  1. Combining two authentication factors of the same kind does not increase security. Are you implementing two-factor (multi-factor) authentication the right way? Authentication factors require a mixture of three main types of authentication: knowledge, possession, and inherence. If we ask someone to authenticate with two knowledge factors, is this really secure? It’s easy to hack two authentication factors if they are available…