Bank Robbery and Ransomware Prevention Have This in Common

Imagine you are getting ready to commit a bank heist. You dress up in black and put on your Richard Nixon mask. You approach an area in the side ally, at night, where surveillance cameras don’t have a visual on a window. You grab your circle glass cutter and create an entrance. By stepping in, you have breached the bank. Glory and fortune are within your fingertips. Reality is about to hit like a ton of bricks. Banks protect their assets by using a layered defense and the least privilege principal. Layers are often vaults within vaults. The area where tellers sit is more secure than the lobby,…

Securing Enterprise Identities For Dummies, Part 2

In part one of Securing Enterprise Identities For Dummies, we covered how the traditional network perimeter is inadequate for today’s apps and infrastructure which are increasingly cloud and mobile. We also covered steps to securing enterprise identities so that any user can obtain secure access to any resource. These steps included: Taking stock of your existing enterprise users, apps and infrastructure Considering the role of identity in cybersecurity Architecting security using identity Deploying an identity platform for security Part 1 of this blog concluded that an identity platform can provide you with a unified and integrated set of tools, auditing, reporting…

Two-Factor vs. Multi-Factor Authentication

When I was a kid, I remember arguing with friends about… everything. I’m difficult that way. But in this specific argument, we were arguing about amounts. If I can recall, my seven-year-old stance was this: “A couple” meant two. Period. Always. No matter what. “A few” could mean two, or it could mean more, but it was always less than “a lot.” “A lot” was — well, you know, as many as you can grab. My buddy was sure that “a few” meant three, like “a couple” meant two. We argued, and used examples, and then probably picked up sticks…

Identity-as-a-Service Crosses the Chasm

Last week Gartner released its “Top 10 Security Predictions” for 2016, and what caught my eye was prediction #6 that said “By 2019, 40% of IDaaS implementations will replace on-premises IAM implementations, up from 10% today.” This is an interesting prediction, because it has been a common perception that Identity-as-a-Service (“IDaaS”) deployments have historically attached to net new infrastructure and apps within organizations (e.g. enabling single sign-on, MFA, and provisioning for relatively new deployments of SaaS apps such as Office 365, ServiceNow, Box, Dropbox, etc.). Which in turn meant that customers have typically left their pre-existing Identity and Access Management…

Centrify’s Derived Credentials Enables BYOD within the Government

Recently, when I was watching ESPN, it played a humorous bit involving NFL insider Adam Schefter’s kitchen shaking as if experiencing an earthquake, only instead it was just the cumulative rattling and vibrating from his 5 or 6 cell phones on the table. Of course the engineer in me immediately noted the impracticality of someone needing so many smart phones; however, this was not always the case in the early days of mobile computing. I met plenty of IT folks during the late 90’s who carried multiple cell phones and multiple pagers, since this was before true “smart” technology put a…

Forrester Study: Managing Privileged Access Security in a Hybrid IT World

We recently commissioned a Forrester study to find out how IT decision makers deal with privileged access security in hybrid IT environments. The survey tested the hypothesis that as organizations open up access to remote users and move more of their workloads to the cloud, their privileged identity management (PIM) solutions should also move to the cloud. The results are in! Having a PIM solution that is purely on-premises is no longer enough to secure privileged access to hybrid infrastructure and applications. The survey data shows that 92% of organizations are either currently outsourcing, or planning to outsource at least one…

The Cows Have Come Home: Now is the Time to Implement Multi-Factor Authentication

During our conversations with customers and prospects these days, the question of implementing multi-factor authentication (MFA) usually begins with “when do you plan to?” instead of “are you planning to?” We no longer need to ask: “Are you planning to implement MFA for remote server access and application access?” “Are you planning to implement MFA for password checkout and privilege elevation?” Starting the question with “when” assumes it’s a given. It is. The power and value of MFA is now broadly recognized. More so in the U.S. now that the Payment Card Industry Data Security Standard (PCI-DSS 3.2, April 2016) has…

Securing Enterprise Identities For Dummies, Part 1

We have written extensively this past year (here, here and here) about how traditional approaches to creating a secure network perimeter are no longer sufficient to protect your organization in an increasingly mobile and cloud world. “Securing this traditional ‘network perimeter’ included layers of firewalls, intrusion detection systems, and other network security devices and systems intended to keep data safe against attack. Attackers know that with the right credentials, they no longer have to fight through the old ‘perimeter’ defenses. They now use stolen credentials to gain access to your critical data, just like an employee.” (from “Securing Enterprise Identities…

Centrify Consumer Trust Survey: The Corporate Cost of Compromised Credentials

We recently conducted a survey to find out what happens to consumer trust when a business is breached. The study examined consumer attitudes toward corporate hacking, and surveyed 2,400 people across the U.S., U.K. and Germany. To our surprise, more than half (66 percent) of U.S. respondents said they are likely to stop doing business with a hacked organization, and fewer than half of Americans are very satisfied with how corporations handle cyberbreaches. Our data shows that when companies put customer data at risk, they are putting the entire business at risk. We found most consumers believe the burden of…

Centrify Named a Leader in the Gartner 2016 IDaaS Magic Quadrant

Today Gartner released its Magic Quadrant for Identity and Access Management-as-a-Service (“IDaaS”) and we are pleased to note that Centrify has been named a leader by Gartner in this Magic Quadrant (“MQ”). This is the third year in a row we have been included in the Gartner IDaaS MQ*, and we believe placement in the Leaders’ quadrant validates our unique ability to secure access to apps and infrastructure from any device for all users. Click here for a complimentary copy of the full report.   According to Gartner, “Leaders in the IDaaS market generally have made strong customer gains. They provide…