Forrester Names Centrify a Leader in Privileged Identity Management

Today Forrester Research released The Forrester Wave™: Privileged Identity Management, Q4 20181. Evaluating 11 vendors, Forrester named Centrify a Leader. Here at Centrify, we believe this is a strong validation of Centrify’s Zero Trust Privilege approach to privileged identity management. A complimentary version of this report is available for download here. Centrify is redefining the legacy approach to Privileged Identity Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a “never trust, always verify, enforce least privilege” approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the…

The Base of Cyber-Attacks: Credential Harvesting

Cyber attackers long ago figured out that the easiest way to gain access to sensitive data is by compromising an end user’s identity and credentials. According to the Verizon 2017 Data Breach Investigation Report, 81% of hacking-related breaches leverage either stolen, default, or weak credentials. Often these credentials belong to privileged users, providing cyber adversaries the “keys to the kingdom” and providing them a perfect camouflage for their data exfiltration efforts. Betting on the human factor and attacking the weakest link in the cyber defense chain, credential harvesting has become the base of most cyber-attacks. Recent reports of a newly-detected Smoke…

Centrify’s new spinout, Idaptive, named Overall Leader in KuppingerCole Leadership Compass for Cloud-based MFA Solutions

Wow! Right out of the gate and the brand new spinout of Centrify Application and Endpoint Services as Idaptive is named as an Overall Leader in the recent KuppingerCole Leadership Compass for Cloud-based MFA Solutions report. Most organizations today are wrestling with how to better authenticate users. Passwords are not enough and MFA has risen as a secure option for most enterprises. According to the report: “Cloud-based MFA is the process of using a SaaS solution to gather additional attributes about users and their environments and evaluate the attributes in the context of risk-based policies. The goal of Cloud MFA…

At SecurIT in New York, it’s a Zero Trust State of Mind

On October 29-30, Centrify will proudly sponsor the second SecurIT: the Zero Trust Summit for CIOs and CISOs in New York City. Produced by CIO and CSO from IDG in partnership with Centrify, the two-day event will focus on how to capitalize on the adoption wave of Zero Trust to stay ahead of the security curve. The summit will be held at the Grand Hyatt New York, which is the only hotel connected to the majestic Grand Central Terminal. It’s an amazing venue that visually stuns with ballrooms evoking the history and splendor of New York and its amazing skyline….

Moving Beyond Legacy PAM: Centrify Zero Trust Privilege

Our customers trust us to keep their most privileged credentials – the “keys to the kingdom” – secure from being exploited. Over half of the Fortune 100, the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse. We know that we can do even better. That starts today with a singular focus on continuing to redefine the legacy approach to Privileged Access Management (PAM) with cloud-architected Zero Trust Privilege. SO WHAT DOES THAT MEAN? First, to sharpen that focus, we’re spinning out our Identity-as-a-Service business…

Stay Secure with Day-One Support for iOS 12 and macOS Mojave

It’s that time of year again: time for all the latest and greatest from our friends in Apple Park (or the Apple Spaceship as locals call it). This week, Apple released iOS 12 and next week Apple will release the latest update for macOS, 10.14 Mojave. We here at Centrify are excited for the new capabilities, the new look of iOS 12, and the new features and improvements with macOS Mojave. To that point, we have made sure that our customers are able to move forward with day-one Centrify support for both offerings. Our day-one support is effective across Centrify’s…

Centrify Scores Highest for Both “Workforce Users Accessing SaaS” and “Business-to-Business” in New Gartner Report

Gartner just released their first ever “Critical Capabilities for Access Management, Worldwide, 2018” report, and we are proud to see that Centrify has scored the highest of any vendor in 2 out of 3 Use Cases including “Workforce Users Accessing SaaS” (3.78 out of 5.0) and “Business-to-Business” (3.52 out of 5.0). Gartner evaluated 15 vendors’ services on nine critical capabilities including Event Logging and Reporting, SaaS Application Enablement, User Authentication Methods, and Authorization and Adaptive Access and three common Use Cases: Workforce Users Accessing SaaS, Business-to-Business, and Business-to-Consumer. We believe this validates our unique ability to secure access to apps…

Behind the Numbers: Database Authentication and Authorization

Earlier this month, I posted a blog about how most companies I speak with have not implemented a modern database authentication and authorization approach. I also recommended 8 steps IT leaders can take to modernize their database management operations. Upon reflection, I think an interesting follow up would be to take a look at some numbers that further illustrate the need to put effective database authentication and authorization practices in place to secure the enterprise. LOOK AT THE NUMBERS Let’s create a fictitious sample company to examine, called Company X. At the DB Survival Blog site, the accepted high-end number…

Centrify Interns Reflect on a Summer of Zero Trust

Every summer, Centrify gets an infusion of fresh perspectives and eager learners via our Summer Intern program. This summer, we had 22 interns join us on our mission to secure enterprise Identity and Access Management with Zero Trust Security. Some have already returned to school, while others are extending their internships due to late school start dates or because they’ve already graduated. As part of our own learning process, we created a contest asking them to share some of their highlights about being part of the Centrify Zero Trust team, whether recognizing a particular mentor, noting key learnings they’ll take…

Modern Practices: Zero Trust Security

In today’s mobile-first, cloud-first environment, cybersecurity starts with protecting the primary attack vector – privileged identities – with a “never trust, always verify” mindset for Zero Trust Security. Gartner predicts that companies will spend $96 billion in cybersecurity solutions in 2018 alone. While worldwide spending will increase 8% from last year’s total, less than 10% will be spent on Identity and Access Management, the number one attack vector. Clearly there is misinformation and misunderstanding of how to stop a breach. A recent research study with Dow Jones Customer Intelligence, “CEO Disconnect is Weakening Cybersecurity,” revealed that a discrepancy in the C-Suite is weakening enterprise security postures. CEOs mistakenly focus on eliminating malware, while Technical Officers (CIOs, CTOs and CISOs) on the front lines of cybersecurity point to identity breaches – including privileged user identity attacks and default,…