Secure Password Management: A Simple Explanation for My 5 Year Old Niece

I had the opportunity to explain to my five year old niece, Sophia, about security. If you haven’t had a chance, please read my first blog on this subject, Cloud Access Security Broker (CASB) Model: A Simple Explanation for My 5 Year Old Niece. Today, I would like to talk about the challenges I had when I told Sophia about users, their passwords and educating users on how to protect their passwords. “Dear Sophia, do you remember how your parents kept their keys for the car, the house and the boat on one keychain? Well, sometimes they forget the keys at the office or…

Centrify Connect: Learn, Explore and Join the Conversation

For the past 12 years Centrify has built products that have addressed the needs of our customers. Protecting companies against data breaches due to compromised credentials is at the heart of what our products are designed to do. Behind these world-class products is a very talented team of people: product teams that every day find ways to better secure enterprises, engineering teams that write millions of lines of code, and service and support teams that ensure that our customers’ trust and investment in Centrify are secure as well. During this journey of building great products, we have acquired over 5,000 customers that have…

The Myth of Shared Account Password Management (SAPM)

In a response to the OPM breach and Tony Scott’s 30-day sprint, many agencies invested in a SAPM solution to manage their privileged users. Unfortunately this does not meet the measure of the requirement of HSPD-12 and multi-factor authentication (MFA) everywhere and the CDM authentication and credential requirements. The reality is that SAPM solutions only cover 5%-10% of the problem. The need for a true Super User Privileged Management (SUPM) is the only way to ensure that everyone in every organization is using a smart card (CAC/PIV) and a PIN, plus a third level of authentication to access all resources….

Cybersecurity Best Practices in 2016 — Start by Securing Your Identity

Each year the folks at FireEye release the M-Trends report compiled by their Mandiant Consulting arm. This outlines what last year’s IT security trends were and what we should anticipate in the coming year. While this year’s M-Trends 2016 validates what many of us have experienced firsthand, it really brings to the forefront how critically important securing identity will be this year. Within the 48-page report, there are 21 sections directly related to identity. Not to mention, a few infographics that invoke identity questions. After taking out the filler pages, identity is mentioned in almost every page. It will be…

Centrify Announces Global Channel Partner Award Winners

It’s industry standard for vendors to hand out annual awards, and Centrify is no different. The Centrify Channel Partner Network (CCPN) was launched in January of 2014 and is focused heavily on core strategic partners. Last year, we were able to launch our own CCPN awards program to honor partners that have embraced our efforts and program. Now that we are in our second year of awarding partners, there are some very obvious metrics that we have seen that drive success selling and managing Centrify’s products. There is a very high percentage of our partner community that have met the…

Passwords Suck! It’s Time to Kill the Password.

Passwords are meant to protect the sensitive information from the bad guys who want to steal or exploit it. They’re supposed to keep our identities and data safe. And they’re supposed to help keep our companies out of the mounting data breach headlines. But here’s the thing: they don’t. Relying only on password-based protection isn’t just risky; it’s stupid. It’s time to stop fooling ourselves into a false sense of security. Ask any security professional and they’ll tell you that passwords are ineffective. I’d go a step farther and say that passwords are the weakest link in the security chain….

How Centrify Solutions Address Security Recommendations from the M-Trends from Mandiant

IT security teams are struggling to prevent data breaches in cloud, mobile and data center environments and compromised user identity is the leading cause of data breaches. Traditional perimeter-defenses do not address users with too many passwords, too much access and too much privilege. Centrify helps customers solve these problems by minimizing the attack surface. This post will discuss how Centrify addresses the recommendations found on page 12 of the M-Trends 2015 report and in many cases provides further capabilities.  The below chart shows the mappings between our solutions and the Mandiant (a FireEye company) recommendations, followed by an explanation of…

Empower Employees Through Automation

With a knowledge base and a self-service portal in place, you’re probably enjoying the fact that when someone in your organization needs help with a problem that they can solve on their own. It’s great to have options that will only make your business stronger — if you know how to properly utilize them. Yes, you can utilize the knowledge within your organization! Encyclopedias aren’t just made to look pretty on a shelf, their purpose is to use history to inform future decisions and help people draw conclusions that will make the world a better place. Okay, so that’s a…

Billions of Dollars in Infosec Spending Wasted on Legacy, Network Security

The Vormetric 2016 Data Threat Report published in January 2016 provides valuable insight into trends in encryption and data security. The 2016 report surveyed over 1100 global security executives in mid-market and large enterprises across federal, retail finance and healthcare markets. In 2015 the incidence of breaches increased and the volume of records breached doubled over the prior year despite increased security spending. The report highlights a critical thinking gap, as security executives continue to equate compliance with security. “Compliance does not ensure security,” according to Garrett Bekker, 451 Research senior analyst and the report’s author. Compliance Does Not Equal Security “As we learned from data…

Chain Reaction — Strengthening the Weakest Link with Third Party Identity Management

Dealing with third parties is an inevitability of modern day business, and so too is the risk of a data breach. Unfortunately, the two often go hand in hand. Organisations are subject to the security of their supply chain, partners and contractors, and need to verify the legitimacy of these third parties. Allowing them external access to your corporate network puts additional strain on IT managers and Sysadmins to maintain business productivity without compromising security. Businesses must incorporate an additional layer of defence in order to protect sensitive corporate data from the threats posed by potentially less security-minded third parties,…