Cloud Access Security Broker (CASB) Model: A Simple Explanation for My 5 Year Old Niece

I had the pleasure of hosting a family gathering during the holidays and my five year old niece, Sophia, came up to me and asked me what I do while I sat in front of a computer all day. Having been a sales engineer for over 20 years, I never thought that the most challenging part of my career would be explaining what I do to my niece. As I thought about how to respond, I felt a little hand yank on my arm and her say, “Hello, Uncle, are you there?” I told Sophia, “Look at my screen and point at three things…

Are We Ready to Swap Passwords with Fingerprints?

Is it time to bid adieu to passwords and say hola to fingerprints? Are we finally moving towards a virtual world where the human body could be the key for accessing physical or virtual systems? Will biometrics sound the death knell on passwords or are we speculating a plot of a sci-fi movie? Is possession-based authentication (OTP, App based configuration to validate access) is a better way to look at MFA? We may safely assume that password security has failed over a period of time. With uncountable number of passwords being required in different applications and getting compromised in the…

Integrating Centrify Server Suite with SIEM Tools — Part 1

Are you an existing Centrify Server Suite (CSS) customer who wants to put Centrify events into your SIEM or BI tool? Do you want to learn about the Centrify events? If so, read on! Centrify Server Suite (CSS) is an agent based solution for unified identity management across Windows, Linux and UNIX systems. The CSS agent can track over 300 different types of events in real-time on 450+ flavors of Windows, Linux and UNIX machines. A few sample categories of the CSS events for example are: User activity events on Centrify tools Log in events on Windows, Linux & UNIX Privilege escalations events on Windows…

IBM — Centrify Partnership Brings Identity Security to IBM Big Insights

IBM is truly the original Big Data company. Going back to 1911 when IBM (then called Computing-Tabulating-Recording Company, or C-T-R) acquired Herman Hollerith’s Tabulating Machine Co., IBM has continuously brought innovation and insight to data recorded with computing machines.  The Tabulating machine was invented by Mr. Hollerith to count the 1890 US Census. It sorted and counted information recorded by punching holes in cards, and Hollerith had begun selling the machines to governments, railroad companies and retailers. Thus began the Big Data era.  The idea that businesses could gather data and analyze it to obtain competitive advantage/improve efficiency became the driving…

Picking a Perfect Bracket is Hard, SaaS Implementation is Easy

Being in tech and a self-proclaimed sports junkie, I couldn’t resist writing my blog about my favorite sporting event — March Madness. If you’re like me, you watched the selection show this past weekend and started thinking about your bracket. You said to yourself, I know the perfect bracket is impossible — but one day I’m going to get it right. Depending on who you listen to the odds range from a high of 1 in 128 billion to a low of 1 in 9.2 quintillion (yes, that’s a real number — 9 followed by 18 digits).  So, I wasn’t too…

Dear Taxpayer: We Still Can’t Guarantee Your Security

2015 was the year of the U.S. Internal Revenue Service (IRS) Get Transcript identity theft. Since the spouse and I were affected by this breach last year, I figured I’d better have a look into any recent developments. The IRS has implemented new safeguards for 2016 to help taxpayers verify their identity and the validity of their tax returns, before it will accept the returns for processing. Here’s a summary: Stronger password with a minimum of eight characters, including alphanumeric and special characters Three security questions to verify identity upon login Account lockout features for session length, and number of login attempts Email address verification, via email or text…

Secure Identity Management in Higher Education with Centrify

All higher education institutions are concerned with the security of student identities, as they should be. Many years ago, in most colleges and universities (and still some today) it was common practice to use a student’s social security number as their ID. Today, many universities and colleges have replaced the social security number with a randomly generated student ID number that links to the student profile. They then worked hard to provide SSO solutions to all of the systems and applications students need access to. Of course this was easier said than done, and in many cases not all of…

Passwords Are Dead. Why Smart Companies are Benefiting from Multi-Factor Authentication.

In a recent Wall Street Journal op-ed, President Obama announced the launch of a new national awareness campaign to “encourage more Americans to move beyond passwords — adding an extra layer of security like a fingerprint or codes sent to your cellphone.” The shift from single passwords to multi-factor authentication couldn’t be timelier or more strategic. Fact: passwords alone are no longer effective. This is something both sides of the aisle can agree upon. 2014 went down as “the year of the hack” when a Russian crime ring on its own stole more than 1.2 billion passwords. Since then, password…

MFA Everywhere Means VPNs Too!

As you’ve probably seen around here, Centrify is excited about our features which enable enterprises to deploy MFA across their enterprise, so that you are fully protected. We’ve been calling this initiative “MFA Everywhere.”  But, what does “everywhere” mean? To me it means protect your data/apps/network with a modern identity perimeter wherever you expose access. Imagine if all the doors to enter your house required keys, except one. That wouldn’t be a very good solution to protecting your home, so make sure you aren’t doing something similar to your network. Remember, half protected, is half not. VPN’s are often overlooked…

How Single Sign-On (SSO) Empowers the Enterprise

Password managers are popping up across enterprises. And, many have a full electronic rolodex of passwords and usernames for all applications ranging from Amazon Prime account to a TurboTax login. While juggling authentication in one’s personal life might not be an issue, doing so professionally is cumbersome, and ultimately undermines productivity. The modern organization has an app for everything. It’s how we manage projects and delegate tasks, how we see the history of a sales interaction in a lead’s contact information, and even how we contact one another in the office. Technology has made it much easier for us to…