Have Users Log in as Themselves, While Maximizing Control Over Privileged Accounts

Our most recent product addition to the Centrify platform is Centrify Privilege Service — a security-as-a-service offering in the identity management sector that Gartner refers to as shared account password management. But you may be wondering if this changes our viewpoint on how to manage privileged identities in the enterprise, because we also have our Centrify Server Suite that provides what Gartner defines as “super user privilege management.” The short answer is no — we believe Server Suite and Privilege Service together provide the most comprehensive privileged identity management solution in the market. Let me use this blog to explain our view on privileged…

Our latest innovation: Privileged Identity Management as-a-Service for the Modern Enterprise

The Centrify product team is very proud this week at the RSA Conference to announce the industry’s first cloud-based privileged identity management service. For those of you who follow Gartner’s terminology in the identity space, we now provide SAPM or shared account password management. This together with our existing SUPM (super user privilege management) capabilities results in Centrify offering the most comprehensive approach to privileged identity management in the market. Gartner also defines a sector called IDaaS (Identity Management as-as-Service), and with this release we become the first identity vendor to expand the definition of IDaaS to include privileged identity management…

Privileged Identity Management from the Cloud

I’m very, very happy today to announce a brand new product from Centrify. It’s a product designed for privileged users – especially privileged IT users – who manage the increasingly complex and hybrid IT environments that we at Centrify call the modern enterprise. It’s a perfect complement to Centrify Server Suite; together they provide a comprehensive solution for reducing or eliminating identity-related risks on-premises and in the cloud. Our new product is delivered to you from the cloud – the Centrify Cloud. In fact, it’s the industry’s first privileged identity management solution designed and built from the ground up for the cloud. It’s called…

Centrify + ServiceNow = Identity Meets Modern Enterprise Service Management

Today at Knowledge15 — ServiceNow’s annual user conference, we are excited to announce the certification and availability of Centrify for ServiceNow – a key integration between the Centrify Identity Service and the ServiceNow Automation Platform. Through this blog I will paint more color on how Centrify and ServiceNow have partnered to create a vision of orchestrated service management based on user identity – one that we call “Identity Services Automation.” Over the last few months, we have been in conversations with our customers who also run ServiceNow’s Automation Platform to manage their enterprise IT services. In speaking with our mutual customers,…

The Problems with Privilege *and* Legacy Privileged Identity Management

I think we can all easily agree that security breaches caused by hacks/viruses/Advanced Persistent Threats (APTs)/etc. are just getting worse. But what is the biggest source of data breaches? Verizon’s recently published 2015 Data Breach Investigations Report has the answer, and it is our old friend the password. But not any ol’ password. The report found that the passwords that had the proverbial “keys to the kingdoms” — passwords associated with credentials that had “root” and/or “admin” privileges on critical infrastructure, apps and data — were the culprit. And this leads to today’s blog on the problems with privilege, and the…

Privilege vs. Productivity

Access to sensitive data is a constant worry; we only need to switch on the news to see another story of an attack or data breach. With concern mounting, it’s easy to see why there is high demand for new solutions to combat these threats. With many businesses struggling to keep up with the demands of employees working in different locations, logging on from home, or traveling with mobile devices, there is an increasing need to manage the security of employee accounts. Appropriate assignment of administrative privileges is seen as one of the top security challenges. Restricting and protecting highly…

Security Your Way – With Centrify Identity Service

I’m sure you’ve all heard Henry Ford’s famous quote (in reference to the Model T): “Any customer can have a car painted any color he wants so long as it’s black.” Of course, Ford’s intention in only offering one color was not to disappoint the customer; it was to optimize the efficiency in which the company could mass-produce their cars. Well, we’ve come a long way from that paradigm as we’ve seen with the mass-customization available for products from major brands today.  Unless you’ve been living under a rock, you are undoubtedly aware that Apple is launching their watch in a…