El Capitan is Here and Centrify Has You Covered With Day One Support

Today Apple released a new version of their Mac operating system, OS X 10.11, code named El Capitan. Centrify is pleased to announce day one support for Apple’s El Capitan release, ensuring customers can take advantage of the latest Apple has to offer. Centrify’s day one support for El Capitan is effective across the entire product line, including our Centrify Identity Service, Centrify Express for Mac and Centrify Express for Mac Smart Card offerings. Coupled with our day one support for the recently released iOS 9 update, the Centrify Identity Service (CIS) continues to deliver industry leading identity and access…

Centrify Partners with Leading NoSQL Innovators: Couchbase, DataStax, MongoDB

Things are changing. No kidding right? One of the biggest changes you may not even notice is how data is stored by your company or your friendly neighborhood web application.  These days many of these workloads are handled by a NoSQL database. According to Market Research Media, the worldwide NoSQL market is expected to reach $3.4 billion by 2020 at a CAGR of 21% between 2015 and 2020. This represents a tremendous new market where companies like Couchbase ($115 million raised), MongoDB ($311 million raised), and DataStax ($190 million raised) have collectively raised more than $600 million to satisfy the insatiable…

Securing Your Big Data Environments Built on Hadoop or NoSQL?

Do you know the percent of all Big Data projects that must meet some level of compliance? According to a recent SANS survey, over 80% have to today. The logical conclusion is that you already have sensitive data that you need to protect — it’s not a case of “if.” So, how are you protecting data from cyberthreats and proving compliance? Over the last few years, Centrify has worked with the leading vendors in Hadoop to deliver their customers’ enterprise-grade identity and access management (IAM). We’re the industry’s first privileged identity management (PIM) solution for Big Data and announced our partnership with…

Sharing – is it Just a Generational Thing?

It’s good to share, but I do wonder if perhaps we share a bit too much nowadays. Passwords to some of our most sensitive information are a good example of this. I was on the train a few weeks ago and a woman of about 20 years of age got on. Four stops later, I knew her doctor’s name and the details of her next appointment, the username and password to one of her accounts that she decided to share with her mother, and credit card information. This could have been a case study on what not to do —…

Apple is in the Enterprise: Now Let’s Make It Work

Apple recently made some “monster announcements” at their recent Apple Event, including the launch of the iPhone 6s, iPhone 6s Plus, iPad Pro and Watch OS 2. Consumers are already anticipating many of the new devices and features that were unveiled. The long queues will no doubt form outside your local Apple store when these devices ship. With all the innovative technology Apple continues to create, I got to thinking about Apple in the enterprise. There was a time when Apple devices were a rarity in a corporate environment. But today, the iPhone has become the defacto corporate smartphone, replacing…

Tech Apathy, Cybersecurity, and the $2,000 Question

I remember being about 9 years old, and starting to understand the concept of money. Suddenly things I wanted (typically, video games) equated with dollars, and I realized that I had very few dollars, but wanted lots of games. My buddies and I would daydream about how we could earn the impossible and princely sum of 100 dollars. 100 dollars! We’d be rich! Set for life! If we could just get 100 dollars, we thought we’d never need to ask for anything again. What would we be willing to do? Eat a worm? Totally. Clean the house — no problem….

IoT, the “Illusion of Trust” — Moving Trust from the Network to Users and Devices

Our always on, always connected world has fundamentally changed how businesses operate. Communicating with customers and employees will never be the same again with cloud solutions bringing many benefits by making things easier for businesses, and it’s happening whether we like it or not. But many businesses are placing trust in the cloud like they did for internal networks, without proper consideration for the challenges and deeper issues at hand. The added convenience of cloud applications also comes with a potential downside, such as potential security threats and surrender of control. Many people are familiar with the acronym “IoT,” and…

Centrify Delivers Day One Support for iOS 9

Today, Apple released its much anticipated iOS 9, which boasts new features like a more intelligent and proactive Siri and improved performance and battery life. Enterprise users will eagerly upgrade as soon as they see that little red notification badge on their iPhones and iPads — often despite the IT notification to not upgrade until IT has tested iOS 9 against critical apps. The good news is that Centrify has IT’s back. As with iOS 8, Centrify is pleased to announce day one support for iOS 9 for Centrify Identity Service (CIS). Customers can rest assured that as users upgrade…

Can the Government Fine Your Company for Lax Security?

A few years back I wrote a blog called “Buckle up with Cybersecurity … It’s the Law” in which I discussed how state laws regarding data breach notification were popping up all over. But I also noted that the SEC had just published disclosure obligations relating to cybersecurity risks and incidents. The thought process with the SEC was that if millions of dollars of intellectual property was being stolen due a data breach, it would be material to report in regulatory filings — and failure to do so could result in fines. I wrote at the time that while the…

The Ashley Madison Hack: Sleeping With the Enemy

The Ashley Madison hack is a wake up call not only for many individuals but for every single business, as well — many of which are still not paying enough attention to data security. The hack, which revealed the email addresses, personal information and sexual preferences of the site’s 36 million users, is devastating on many levels. For starters, Ashley Madison — whose slogan is “Life is short. Have an affair.” — will likely be the first high-profile company ever to go out of business as a direct result of a cyberattack. After all, it’s hard to see Ashley Madison regaining…