Modernizing Legacy Apps to Boost Security: Part II

As we discussed in part I of this article, many companies are still in the process of modernizing their legacy apps. There are a number of reasons to do this, but securing your environment is typically the main goal. We’ve already identified that a (software) token-based system as essential. Let’s continue with a couple more best practices. Provide for User Provisioning An application needs user data — not for authentication, but because it needs to know the role and responsibilities of the person logging in so that privileges inside the app can be managed and regulated. Therefore, a database of…

User Provisioning – Do You Have Proper Employee Lifecycle Management?

Centrify has invested heavily into a strategic partnership with SoftwareONE over the past 12 months, and we are excited to align our thought leadership between organizations. I would like to introduce Tristan Ackley, the Global Content Writer on the Marketing team at SoftwareONE. He has recently teamed up with Centrify’s WW Director of SaaS Sales, Fahad Rizqi, to relay the importance of IDaaS and application provisioning in today’s marketplace. He has contributed the following post as a guest blogger to the Centrify Blog: Tristan: Did you know that roughly one in five workers routinely shares ‪passwords with members of their…

Provisioning and the Termination Nightmare

Back in my IT days, I was – among various responsibilities – tasked with managing user access from the time they were hired to the time they moved on (or were fired.) As I will discuss, this was often the most stressful part of my day-to-day. Now with the explosion of mobile users and SaaS applications such as Google Apps, Office 365 and hundreds of other apps, managing access has become even more error-prone and stressful. But they don’t have to be.