Basic Human Needs — Identity Management in the Home

It’s Saturday morning in sunny California, but it’s raining; and, because it is raining, the Internet is down. Since, today in my house the lack of Internet access has become the top of Maslow’s hierarchy of human needs, I drive quickly to the local cable company store to patiently wait and get a new modem — I have never done this before, and I have strict instructions from my son to not mess around with the internet, but to follow the instructions and get it up and running — the Clone Wars on Netflix needs to be watched! So, with…

A Complete Identity Platform Can Reduce Risk for the Healthcare Industry

As a Fellow of the Institute for Critical Infrastructure Technology (ICIT), I was able to contribute my expertise to the legislative brief entitled “Hacking Healthcare in 2016: Lessons the Healthcare Industry can Learn from the OPM Breach.” In the brief, the ICIT provides a comprehensive assessment of the threats and healthcare trends that have the greatest impact on health sector security, as well as solutions and strategies to improve resiliency. The report draws from the OPM breach, which is a prime example of the enormous consequences an organization can face by not maintaining and protecting integrated systems. Specifically, this brief…

Advancing Identity Services Automation in ServiceNow

In April 2015, we announced Centrify’s integration with ServiceNow with support for Single Sign-On, MFA and Provisioning into ServiceNow, thereby providing a seamless, secure experience for users as well as streamlining user lifecycle management for administrators. Today, we’re excited to announce two new integrations built to advance our journey of “Identity Services Automation” with ServiceNow! Centrify Password Reset Centrify App Access for workflow integration With these integrations, we have enabled automation of identity services and app access. Centrify now leverages workflow processes of ServiceNow and delivers automation for access requests generated by ServiceNow’s platform.   Let us discuss both Centrify Identity Service integrations for ServiceNow….

Outsourced IT Part Deux

Let’s continue our purely fictional story from last time, where we stepped into the shoes of our IT consultant, Tony. You may recall he works for ACME Consulting who provides outsourced IT services to Banzai. In a nutshell, we showed how easy it can be for Banzai to improve security, reduce risk, increase visibility, and provide secure access from anywhere, leveraging Centrify’s Privilege Service and Server Suite. Let’s peek inside Banzai’s IT world for an update from the IT Director, Tom: Well, the results came in and it’s safe to say (no pun intended) that our expectations were fully met with the…

Federating Office 365 — an ADFS Alternative

So you have finally taken the plunge and decided to adopt Office 365. But as you embark on the Software-as-a-Service (SaaS) journey you come to realize that, as you adopt more and more SaaS applications, managing all these different logins could turn into a nightmare in the future. Not only would you have to touch each application when a new employee starts, but more importantly when an employee leaves. You start asking yourself questions like how do I manage to turn off access to all these cloud applications and how do I reclaim all the licenses from employees that have…

Identity Management for Multi-Tiered Big Data Environments

Are you satisfied that your big data applications are protected against cyberthreats? Are you able to prove compliance across the big data stack? If not, read on! Big Data environments usually have clusters of nodes, and each node has, at the bottom layer, an operating system on which the big data and applications sit on. For example — imagine an IBM BigInsights customer using the Big SQL application, based on a Hortonworks cluster running on Linux operating system. It can be challenging to figure out how to properly secure each layer of this stack! To help understand this better, let’s…

When it Comes to Cyberattacks, Half Protected is Half Not

As we begin this new year let us be reminded that current cybersecurity measures have not been enough to stem the tide of breaches. According to cyber security experts Verizon and Mandiant, over half — and trending toward 100% — of recent data breaches were due to compromised credentials. These credentials are the digital “keys to the kingdom” and give hackers everything they need to access corporate apps, siphon off sensitive data and damage or destroy critical systems. Like the ocean tides flowing inland, cyberattackers will always find the course of least resistance into your protected networks and resources. And…