Adopt Next-Gen Access to Power Your Zero Trust Strategy

Security breaches are now all too commonplace — 58% of organizations have experienced at least one in the past 12 months. As a result, IT security leaders are urgently scrambling to defend attacks at every entry point. Worse yet, traditional approaches to security, based on the notion that you can keep out the “bad guys” out while letting in the good guys, have proven ineffective.  Access control strategies that focus on separating trusted from untrusted users are missing the whole point. Mobile proliferation, reliance on outsourced partners and cloud technologies, and the regular occurrence of insider attacks mean that there…

The Cost of Customer Identity & Access Management (CIAM)

Customer Identity and Access Management (CIAM) is essentially a set of tools that allow your business to securely authenticate, manage and engage customers who are consuming products and services through your applications. Historically, customer identity has not always been top of mind when it comes to business-driving initiatives. Identity was simply a feature of the application, maybe a table or directory that stored user information. It was just there, without much need to think about it. Fast forward to present day and things have changed dramatically. Customers have now come to expect that their own preferences (likes, dislikes, purchase history)…

Persistence Pays Off

There are lots of maxims in the startup world about passion, patience and perseverance — but most of the time it is just lip service. Rarely do founding teams stick together and fight though more than a decade of ups and downs. But that is exactly what the Centrify founders have done for the last 14 years, beginning inside Mayfield’s offices in March of 2004. Success is the result of perfection, hard work, learning from failure, loyalty and persistence. — Colin Powell To help reset the context, in 2004 Lance Armstrong won his 6th Tour de France and the Boston…

Secure Identity to Protect Your Reputation

Reputation is built on trust – yet the paradox in the age of access is that the only way we can build trust is to eschew it. That age-old tool of identification–the password–no longer provides any level of security and, in fact, depending upon a password for protection is probably the worst mistake one can make. Likewise, relying on technology alone, such as firewalls, malware detectors and anti-virus programs, can create a false sense of security that often causes more problems than it solves. LESSONS FROM AUSTRALIA If you doubt that assumption, look at the volume of business disruption that…

Centrify’s Next Strategic Step Forward with Thoma Bravo

I am pleased as CEO and co-founder of Centrify to announce that Centrify has entered into a definitive agreement whereby Thoma Bravo, a leading high-growth private investment firm with a significant track record in cybersecurity, will acquire a majority interest in Centrify from our current venture capital investors led by Mayfield, Accel, Jackson Square Ventures and Index Ventures. We couldn’t be more thrilled to partner with this world class investor who has invested in other great cybersecurity companies like SailPoint, McAfee, Barracuda and others. We believe that this transaction optimally positions us to accelerate our pace of innovation in the…

A Ticking Time Bomb: Understanding and Securing the Next Generation of Workers

It’s sometimes easy to forget that the younger employees of today are the managers of tomorrow. If we fail to understand how they use technology and perceive security and privacy, it will have a major bearing on the workforce of the future, and the long-term ability of organisations to withstand cyber threats. To shed some light on the issue, Centrify recently commissioned new in-depth research drawing on interviews with not only 1,000 UK office workers aged 18-24, but also 500 senior decision makers. At a central London event last week, we gained some fascinating extra insight into how the next…

It’s Time for Managers to Lead Security by Example, Not Blame Younger Workers

The age gap is something that all organisations over the years have had to deal with in one way or another. But the flood of consumer-grade technologies into the workplace in recent years has arguably widened that gap even further. To learn more, Centrify recently polled not only 1,000 UK office workers aged 18-24 but also 500 senior decision makers. We found that the next-generation workforce is unfairly blamed for a range of perceived security issues, when in fact managers are the worst offenders. To enable newer, more flexible and agile ways of working demanded by younger employees, organisations must…

Stop Breaches with Analytics and Artificial Intelligence

According to Gartner, companies will spend up to $96 billion worldwide on security this year, but research by Centrify and Dow Jones suggests that up to 79% of companies have experienced a significant breach. Forrester estimates that 80% of security breaches involve privileged credentials. It’s understandable: After an intruder gains access to the employees’ devices, they try to snoop the network and install keylogger to get higher privilege credentials (such as root or administrator). Privileged credentials provide greater scope for stealing data en masse than individual accounts do. Traditional Privileged Access Management (PAM) products have been trying to resolve the…

Making Smarter Access Control Decisions

Hey Siri, block that attacker, please Wouldn’t it be great if Siri, Alexa, or Google Assistant had the intelligence to figure out malicious intent, govern access to our sensitive corporate data, and alert us in real time when something dodgy was going on? Well, they do leverage modern machine learning and AI to make “intelligent” decisions, but they’re clearly not designed for enterprise-grade security. At Centrify, though, we’re using AI and machine learning concepts to develop Next-Gen Access security to do just that. Only it’s not in a soft, cute, platonic solid form factor that sits on your desk….yet. As part…

Zero Trust Security and DevOps Take the Crown at AWS Public Sector Summit 2018

Last week, Amazon Web Services hosted its AWS Public Sector Summit in Washington, DC. In its 9th year, the event attracted thousands of global leaders and IT security practitioners from government, education, and non-profit organizations to learn how to start their path to the cloud or how to maintain momentum once they’ve begun the transformation. BULLISH OUTLOOK FOR CLOUD ADOPTION IN GOVERNMENT The meeting rooms and exhibit hall were humming and regularly required the organizer to cordon off access to the different floors due to reaching the facility’s capacity. The dramatic increase in attendees compared to prior years illustrates the…