Five Reasons to Visit Centrify Booth #N6445 at RSA 2019

The 2019 RSA Conference is just around the corner, coming up March 4-8 at the Moscone Center in San Francisco! If you’ve never attended an RSA show before, this is the security event of the year and the best opportunity you’ll find to network with over 40,000 other security professionals — exchanging ideas, learning the latest trends and finding solutions that empower you to stay ahead of rapidly-evolving and increasingly-costly cyber threats. As usual, Centrify will have a significant presence at the event. We’ve moved from the South Hall into the North Hall, and will be offering demos, theater presentation and great…

Putting the Reins in Good Hands

After over 300 blog posts as CEO of Centrify, this will be my last Centrify blog post. The reason is because after having co-founded Centrify nearly 15 years ago and building it with a great team of fellow employees into a leading $100+ million in revenue cybersecurity company, I have handed over the reins. In fact, I have handed them to two people — Tim Steinkopf, who is now CEO of our Privileged Access/Identity Management business (aptly named Centrify!) and to Danny Kibel, who is now CEO our Next-Gen Access Management spin out from Centrify called Idaptive. The fact that…

Myth vs Reality: Join as Centrify Debunks 5 Myths of Zero Trust Security

In 2018, Zero Trust Security gained a lot of popularity, as more organizations recognized the merit of the Zero Trust approach to security. We saw the term go from being a buzzword to an actual security approach that organizations have engaged and started to implement. That’s the good news. The bad news is that when it comes to actually implementing a Zero Trust Security model, many still don’t know where to start. And there are several misconceptions surrounding Zero Trust that further impede adoption. This might explain why, despite the rise in awareness about Zero Trust Security, an incredible 66%…

The State of Cyber Security in Healthcare

The privacy and security concerns associated with digital patient records make the healthcare industry one of the most regulated industries in the United States. Regulations such as the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health (HITECH) Act create a much higher standard of scrutiny than other verticals with regards to privacy and disclosure requirements. However, being compliant doesn’t mean you’re secure. Traditionally, healthcare providers’ mission is to save lives. As a result, IT security departments are typically not a top priority when it comes to budget dollars and are often…

CEO Fraud Continues to Rear Its Ugly Head

As CEO of Centrify, I have been writing about “CEO Fraud” — whereby scammers send emails that impersonate senior executives to obtain money or data — for well over three years now. I have blogged about it based on first-hand encounters, presented on it and the broader topic of “business email compromise” (BEC) at the 2016 RSA Conference, and was even interviewed on a nightly news show about it (scroll to 18:30 to see yours truly wax poetic). But I am not the “vox clamantis in deserto” (“voice crying out in the wilderness” for those that know Latin, or you…

Zero Trust Lessons from a Holiday Classic

Every year when the holidays roll around, I’m amazed at the way shopping deals dominate the headlines. Black Friday and Cyber Monday are annual juggernauts that produce some amazing opportunities for shoppers and retailers alike. Yet this year, even the mighty shopping season has taken back-seat to the continuing domination of security breaches in the press. With $114 billion being spent on Information Security products and services in 2018, as estimated by Gartner, we should see the frequency of data breaches going down. Instead, rather than seeing fewer headlines, we’re seeing more. In the past two weeks alone we’ve seen…

Gartner Names Centrify a Leader in Magic Quadrant for Privileged Access Management (PAM)

On December 3, 2018 Gartner released The Magic Quadrant for Privileged Access Management, Q4 2018. Evaluating 14 vendors, Gartner positioned Centrify in the LEADERS quadrant. Here at Centrify, we believe this is a strong validation of Centrify’s Zero Trust Privilege approach to privileged access management. A complimentary version of this report is available for download here. As breaches and attacks grow, the market is finally realizing that importance of PAM not just for compliance, but as a strong security control. At Gartner’s Security and Risk Management Summit in June 2018, Neil MacDonald noted in the keynote that PAM was one of the Top…

Forrester Names Centrify a Leader in Privileged Identity Management

Today Forrester Research released The Forrester Wave™: Privileged Identity Management, Q4 20181. Evaluating 11 vendors, Forrester named Centrify a Leader. Here at Centrify, we believe this is a strong validation of Centrify’s Zero Trust Privilege approach to privileged identity management. A complimentary version of this report is available for download here. Centrify is redefining the legacy approach to Privileged Identity Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a “never trust, always verify, enforce least privilege” approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the…

The Base of Cyber-Attacks: Credential Harvesting

Cyber attackers long ago figured out that the easiest way to gain access to sensitive data is by compromising an end user’s identity and credentials. According to the Verizon 2017 Data Breach Investigation Report, 81% of hacking-related breaches leverage either stolen, default, or weak credentials. Often these credentials belong to privileged users, providing cyber adversaries the “keys to the kingdom” and providing them a perfect camouflage for their data exfiltration efforts. Betting on the human factor and attacking the weakest link in the cyber defense chain, credential harvesting has become the base of most cyber-attacks. Recent reports of a newly-detected Smoke…

Centrify’s new spinout, Idaptive, named Overall Leader in KuppingerCole Leadership Compass for Cloud-based MFA Solutions

Wow! Right out of the gate and the brand new spinout of Centrify Application and Endpoint Services as Idaptive is named as an Overall Leader in the recent KuppingerCole Leadership Compass for Cloud-based MFA Solutions report. Most organizations today are wrestling with how to better authenticate users. Passwords are not enough and MFA has risen as a secure option for most enterprises. According to the report: “Cloud-based MFA is the process of using a SaaS solution to gather additional attributes about users and their environments and evaluate the attributes in the context of risk-based policies. The goal of Cloud MFA…