We’ve all heard the advice to create a unique and strong password for every site you access, and never reuse passwords. While this advice has been heard time and time again, it is largely ignored (more than 50% according to a quick Google search). Why is it so important to use different passwords?
We recently announced that Centrify’s channel revenue contribution nearly doubled in our fiscal year 2013 over fiscal year 2012. Our channel organization has been laser-focused on some key areas to grow our partners and onboard new partners that satisfy our GTM strategies. Channel engagement and execution is critical to our success as a software and cloud vendor moving forward. We have been spending a lot of time inspecting our historical activities, determining best practices, identifying key partner profiles, and aligning our sales teams to work in tandem with our channel teams to create a truly mature channel cadence.
eBay has become the most recent public target in a string of attacks that are growing more common by the week. It’s been reported that hackers obtained “a small number” of eBay employee credentials, which they then used to get access to millions of eBay customer account.
How many languages do you speak? If you were raised in the United States, the answer is probably no more than one. This isn’t exactly the forum for learning a new language, however, it could certainly be a place where you learn about a new word! After-all; long before a technology word becomes a “buzz-word” it simply starts out as a mere word! This new word deals with startling facts about issues that really need to be resolved. Back in 2007 Microsoft funded a study that was recently referenced in PC Magazine.
Centrify is extremely excited to announce Fortinet as an investor and technology partner today. From the beginning we saw huge potential as we talked about the possibilities for partnership with Fortinet. By combining Centrify’s identity and mobile management solutions with Fortinet’s market dominating security portfolio, we have created a formidable partnership centered on solving the most important problems for our joint customers relating to cloud, mobile, and security.
Today Centrify announced that we have raised $42 million in funding, thereby bringing our total amount raised to more than $94 million. This is a huge milestone for Centrify and the $6 billion Identity and Access Management (IAM) market — especially the soon-to-be $1 billionIdentity-as-a-Service sub-segment of the IAM market. Centrify now represents one of the most well-funded private companies in the IAM market, as well as one of the fastest growing vendors in the IAM market that at the same time has also reached critical mass in terms of revenue, customers, employees, partnerships, etc. In this blog post I will talk about the details of this round of financing, who our new investors are, the key milestones we attained to be able to raise such a great round of financing, and what this means for the IAM market in general.
The Heartbleed bug has generated a lot of catastrophic commentary and reverberating repercussions since it was publicly disclosed on April 7. ‘Catastrophic’ is the right word,” wrote Internet security expert Bruce Schneier on his blog. “On the scale of 1 to 10, this is an 11.” That intensity of reaction is not surprising given estimates that around half a million of the Internet’s secure web servers (some 17 percent) were believed to be vulnerable to attack due to Heartbleed, in addition to countless embedded devices such as firewalls and routers.
Passwords are a problem. We have seen this statement echoed by numerous security professionals over the years, yet we all still heavily rely on passwords every day to access applications at work and at home. As the proliferation of mobile devices continues at a rapid pace, more and more employees are using personal devices to access corporate networks. As the number of applications they use continues to grow, it becomes increasingly difficult for IT teams to track and manage users and their permissions.
In Part I of this blog, we talked about the benefits and risks associated with new trends in enterprise IT.Today, forward-looking organizations are already embracing BYOD, mobility and cloud. But balancing convenience with security is no easy task. Fortunately, the same vey trends are also giving birth to a new set of tools which combine terrific user experience for employees with security and peace of mind for IT. One example of such a tool is the mobile container technology (such as FixMo SafeZone, Sencha Space and Divide). A container is a virtual environment on a mobile device that separates personal data from…
IT departments are undergoing a massive change. It can be difficult and it can be painful. Bu it is woth it. BYOD, Mobility and Cloud are good for business!
Many industries (and especially the technology sector) are going through an unprecedented time. The combination of highly efficient supply chains, easy access to offshore manufacturing capacities, outsourced labor, and cloud computing dramatically lowered barriers to competitive market entry. Competition is more fierce than ever before. It is an “evolve or die” world and examples of companies who didn’t evolve fast enough are everywhere: Blockbuster, Nokia, Circuit City, the American automotive industry, traditional airlines. Is it because these industries are inherently difficult? Well, no. Startups such as Ryan Air, Amazon, Tesla and Netflix, as well as large companies such as Hyundai, Toyota, Apple and Samsung, are prospering in the same very industries (and US automakers seem to be finally catching up too).