Federated Identity Management vs. SSO

Last time I wrote about how much it costs to protect yourself, so I want to follow up  with another topic that hits close to home: your wallet. Federated identity management (FIM) and single sign-on (SSO) are not synonymous — FIM gives you SSO, but SSO does not give you FIM. That minor detail is very important to understand, as you make the leap to the cloud and adopt more SaaS applications. While you will have some initial startup cost with FIM by building out an identity service provider (IDP), it is cheaper in the long run than using simple SSO with FIM….

Top Three New Year’s Security Resolutions

When it comes to setting New Year’s resolutions, most people shoot for the moon. We tell ourselves we will give up carbs, go running every morning, become a vegan or even give up drinking alcohol. Inevitability, three weeks later, we find ourselves right back where we started. As security professionals, responsible for keeping the bad guys out and reducing the risk of data breaches, we find ourselves right back where we started too — we fundamentally do not really improve our security posture, and then wonder why not. We are very similar to our consumer counterparts, because we set lofty…

What is Customer Success?

Customer Success at Centrify is more than just an approach to account management or the name of a department. It is a mindset that reaches from the pre-sales process to renewal. With every interaction, Centrify’s goal is to add and drive value for our customers and partners. Centrify as a company is fully invested in the entire customer journey, as every area in the company is focused on our customers’ success, from the moment they sign-up to support and engineering, from professional services to marketing and from product management to our executive team. Every one of these areas are not just interacting…

5 Critical Topics in Cybersecurity Training

With European Cybersecurity Month in full swing, this week’s topic of discussion is “Cybersecurity Training.” Whilst cybersecurity training and awareness has undoubtedly improved, a common mistake is that it is often treated as a one-time tick-box exercise, rather than an ongoing process. As cyberthreats become part of the reality of daily business, the limitations of traditional security controls have been exposed and businesses need to recognise that cybersecurity is not simply a one-off task on the to-do list. A security breach is now assumed to be inevitable and whilst layering defensive security controls and tools are a step in the…

Comparing Cloud Identity and Access Management (IAM) Solutions

The State of the IAM Market With the huge shift to the cloud happening and the corresponding plethora of SaaS apps now invading enterprises, it is not surprising that the need for identity and access management solutions built for the cloud is rising in importance in the minds of IT buyers. This is because each newly deployed cloud-based app can become an island of identity unto itself. This in turn causes the problems of end users drowning in too many passwords (which also increases the odds of one being stolen), the inability for IT to quickly provision and de-provision users…

Gartner: Centrify Scores Highest for Workforce to SaaS Use Case

Gartner just released its “Critical Capabilities for Identity and Access Management as a Service” report, and we are proud to see that Centrify has scored the highest in the “Workforce to SaaS” use case. We believe this validates our unique ability to secure access to apps and infrastructure from any device for all users. Please have a look at a complimentary copy of the full report to see for yourself. Gartner defines the “Workforce to SaaS” use case as: …primarily driven by the need to extend basic IAM functions and serve employees accessing SaaS applications. We’re especially proud of this…

Cybersecurity Best Practices in 2016 — Start by Securing Your Identity

Each year the folks at FireEye release the M-Trends report compiled by their Mandiant Consulting arm. This outlines what last year’s IT security trends were and what we should anticipate in the coming year. While this year’s M-Trends 2016 validates what many of us have experienced firsthand, it really brings to the forefront how critically important securing identity will be this year. Within the 48-page report, there are 21 sections directly related to identity. Not to mention, a few infographics that invoke identity questions. After taking out the filler pages, identity is mentioned in almost every page. It will be…

Centrify Announces Global Channel Partner Award Winners

It’s industry standard for vendors to hand out annual awards, and Centrify is no different. The Centrify Channel Partner Network (CCPN) was launched in January of 2014 and is focused heavily on core strategic partners. Last year, we were able to launch our own CCPN awards program to honor partners that have embraced our efforts and program. Now that we are in our second year of awarding partners, there are some very obvious metrics that we have seen that drive success selling and managing Centrify’s products. There is a very high percentage of our partner community that have met the…

Picking a Perfect Bracket is Hard, SaaS Implementation is Easy

Being in tech and a self-proclaimed sports junkie, I couldn’t resist writing my blog about my favorite sporting event — March Madness. If you’re like me, you watched the selection show this past weekend and started thinking about your bracket. You said to yourself, I know the perfect bracket is impossible — but one day I’m going to get it right. Depending on who you listen to the odds range from a high of 1 in 128 billion to a low of 1 in 9.2 quintillion (yes, that’s a real number — 9 followed by 18 digits).  So, I wasn’t too…

Cloud Security Alliance Welcomes Newest Member

It’s been quite a busy year in the cloud computing world. It seems that every week, a relatively young cloud-focused company scores a funding round with a valuation above $1B (unicorns!), and every week we see a traditional enterprise-focused software vendor introduce a new cloud-based service. Each firm will provide different numbers, but the consensus is that spend on cloud computing services is growing significantly, and when compared to the rest of Enterprise IT spend, spend on cloud services is growing at a much faster clip. Diving a bit deeper, the mix of services is changing dramatically. Earlier this year,…