Centrify Named a Visionary in the 2018 Magic Quadrant for Access Management, Worldwide

Download the 2018 Gartner Magic Quadrant for Access Management Centrify has been named a Visionary by Gartner, Inc. in the 2018 Magic Quadrant for Access Management, Worldwide. According to Gartner, “visionaries are noted for their innovative approach to access management technology, methodology and/or means of delivery.” We believe being recognized as a visionary in access management is a testament to the progress Centrify has made in delivering an innovative and class-leading solution while validating Centrify’s position as a top vendor in the access management market. Centrify’s innovative approach to access management is rooted in our Zero Trust Security approach and…

Zero Trust Security and DevOps Take the Crown at AWS Public Sector Summit 2018

Last week, Amazon Web Services hosted its AWS Public Sector Summit in Washington, DC. In its 9th year, the event attracted thousands of global leaders and IT security practitioners from government, education, and non-profit organizations to learn how to start their path to the cloud or how to maintain momentum once they’ve begun the transformation. BULLISH OUTLOOK FOR CLOUD ADOPTION IN GOVERNMENT The meeting rooms and exhibit hall were humming and regularly required the organizer to cordon off access to the different floors due to reaching the facility’s capacity. The dramatic increase in attendees compared to prior years illustrates the…

Cyber Risk Insights from the AIG 2017 Cyber Insurance Review

I read with interest AIG’s 2017 Cyber Insurance Review. In a one sentence summary: cyber insurance claims are up, due to systemic ransomware and wiper malware attacks, the cyber business is booming, but we are still early in the market evolution. Reading the report prompted me to ask three questions regarding Cyber Insurance: How well do insurance brokers understand cyber risk and cyber insurance? What percentage of businesses shopping for cyber insurance truly understand their cyber loss exposure in quantitative terms, and conversely how well do brokers understand their exposure What security controls and policies do businesses have in place…

Identity-Based Security Comes of Age at Infosec18

The annual Infosecurity Europe (Infosec) show was back again at the start of June even bigger and better than before. This year it was heartening to see so many businesses come to realise that an identity-based approach to cybersecurity is one of the best ways to keep regulators happy and threats at bay while driving adoption of agile cloud deployments. It all made our Zero Trust Security approach an easy sell as we engaged with customers and prospects. An oasis of calm Infosec has been running now for over two decades, but I’ve never before seen it on quite such…

LIVE BLOG: SecurIT Zero Trust Summit

REGISTER BELOW FOR THE LIVE STREAM! Welcome to the live blog from SecurIT: the Zero Trust Summit for CIOs and CISOs. SecurIT is an all-day industry event at Terra Gallery in San Francisco. This blog will be a frequently-updated chronology of highlights from the day, including notable quotes, photos, and other interesting details that we hope a remote audience will find useful in their Zero Trust journeys. If you’re new to Zero Trust, it might be helpful to visit https://www.centrify.com/zero-trust-security/ to learn more about this concept, which is enabling a complete rethink of security. The old adage of ‘trust, but…

Centrify Launches Zero Trust Security Network Ecosystem

The world has changed. I’m not sure if it was the HBO breach, Equifax, Yahoo, or one of the many breaches since, but after one of those we at Centrify realized it was one breach too many. As we looked at how the breaches were increasing in number, size, and severity we knew we had to do something different. How could we better protect our customers who are struggling under the weight of thousands of passwords and hundreds of ways to access applications/devices/servers? The answer lies in Zero Trust Security. The idea that we can no longer trust anyone attempting…

Five Reasons to Kill Off the Password

Australia recognised the security problem posed by passwords through widespread media coverage of Centrify’s warning issued on World Password Day, which occurred on May 3 this year. Centrify celebrated World Password Day, which turns up annually on the first Thursday of May as a day to promote good security hygiene and password habits, by calling for the end of this outmoded form of protection. Centrify’s World Password Day warning was picked up by leading publications, including FutureFive NZ, Lifehacker and SmartCompany and led to Australia’s national broadcasting, the ABC, interviewing me on radio in New South Wales, Queensland and Radio…

451 Research: Centrify Goes “All In” on the Zero Trust Movement

451 Research recently published an impact report recognizing Centrify as one of the early vendors to embrace the Zero Trust concept, which is a new conceptual framework on the rise as traditional security models that follow a hardened perimeter approach have failed. The author, 451 analyst Garrett Bekker, notes these failures and states that “the very concept of trust is called into question, in favor of assuming all users and assets are by definition untrusted” and that “the notion of trust is no longer based on where you are, but more on who you are, and what you are allowed…

SecurIT: Making Zero Trust a Reality for CIOs and CISOs

On June 13, C-level and senior management leaders from global companies spanning multiple industries will gather in San Francisco at SecurIT: the Zero Trust Summit for CIOs and CISOs. Hosted by IDG (publishers of CIO and CSO) and Centrify, this first-of-its-kind event will provide greater understanding around the concept of Zero Trust Security. Specifically, it will help define what Zero Trust is, why it matters, and help business leaders identify the best places for their organizations to start or continue on the journey to Zero Trust. The concept of Zero Trust can sound confusing (or perhaps even insulting), but the…

What’s in it for Consumers? The Top 5 Privacy Benefits of the GDPR

The General Data Protection Regulation, or GDPR for short, is a major new European privacy law that went into effect on May 25. GDPR will radically reframe our relationship with the organisations that store and process our data. From Amazon to the UK National Health Service (NHS), organisations around the world are desperately racing to ensure compliance, even after the deadline. Yet despite these efforts, just one in ten consumers have heard of the data protection regulation. That’s a shame, because this is a huge piece of legislation which will impact virtually every industry in its bid to make the…