benrice

Posts by Ben Rice

Ben Rice is Vice President, Worldwide Business Development. Ben has held a variety of senior management positions at public companies such as Blue Coat Systems and startups such as Egnyte and Ositis Software. He began his career as an attorney working at The Castleman Law Firm, the LA County District Attorney and the Law Offices of Benjamin Z. Rice.


From the Cloud

Centrify Achieves Advanced Partner Status in AWS Partner Network

By , November 29, 2017

We are proud to announce that Centrify has met the requirements and is now an Advanced Partner within the AWS Partner Network. Is this just another Partner announcement or is there something more here? What This Means for Customers First, for customers, Centrify becoming an Advanced Technology Partner means that they have been so rigorously tested that AWS personnel can recommend Centrify to AWS customers without reservation. AWS has put Centrify and its products/services through hours of testing and diligence, including talking to customer references, analyzing Centrify’s Identity Services, as well as establishing that Centrify on AWS meets all security…

Hot Topics

4 Tips to Stay Safe Online for National Cybersecurity Awareness Month

By , October 3, 2017

Help! I Love the Internet, But My Identity and Data Are Up For Grabs — Should I Just Unplug?! In honor of National Cybersecurity Awareness Month, we at Centrify are doing what we can to help you to be #CyberAware. The theme for the first week is around simple steps to online safety. Have you ever considered how to protect your privacy or identity while “online”? Have you noticed over the last few years how many times your data has been stolen or exposed by hackers? Have you observed that most of these breaches were from systems where you were…

Centrify Perspective

How to Hack Passwords: How Long Would It Take Your Grandmother To Do It?

By , September 13, 2017

(Hint: You Won’t Believe the Answer) My last article “Do You Know How Easy It Is to Guess Your Password? (Hint: You Don’t Want to Read This!)”, was about how hackers can obtain massive databases of human generated passwords and run them through off-the-shelf tools on commodity hardware by using Graphics Card GPUs to gain speed and computing cost advantage. This article will delve into how easy it will be for your grandma to rig up a password cracking machine. First step for Grandma is to visit Amazon and pickup some hardware. Perhaps a nice BitCoin mining rig that can compute…

Centrify Perspective

Do You Know How Easy It Is to Guess Your Password? (Hint: You Don’t Want to Read This!)

By , May 31, 2017

The number of account credentials that has been stolen in the last 10 years has exploded to a degree that is unprecedented. It is now a fait accompli that many of the security tools out there can’t help you as 81% of data breaches come from compromised credentials. Lets delve into how easy it is to break into almost any account. Hackers have invented the digital equivalent of a master key. If you look at sites like SecLists, Weakpass, and Hashes.org —  not to mention berzerk0’s probable wordlists on github which is a clever amalgam of password wordlists. Here you will find…

Hot Topics

What’s Next from Google Cloud: Scenes from Google Next

By , March 13, 2017

Google Cloud last week had their big event in San Francisco, gathering Partners, customers and Googlers alike to talk about Google Cloud and its bright future. Centrify was proud to sponsor this event, and we had a presence in the Partner Playground, which allowed us to visit with hundreds of Google Next attendees to understand what they were doing with Google Cloud. Of course we spoke with Centrify customers, Google customers and some prospective customers, but interestingly, most of these conversations were with those who are already using software as a service (SaaS) or identity as a service (IDaaS) today….

Hot Topics

Centrify Supports Data Privacy Day: Take Action Today to Protect Your Privacy!

By , January 27, 2017

Centrify is proud to be a Data Privacy Day Champion because we work tirelessly each day to protect our customers and their data privacy.  We believe that all of us, whether at work or as consumers, should be aware of data privacy issues (who has my data? what can they do with it? what are they doing to protect it?) and take steps to protect personal data and business’s data. So, when we found out we could help champion Data Privacy Day we jumped at the chance. In recognition of Data Privacy Day, Centrify brings various supporting messages about how to keep…

Partner Corner

Centrify Joins Forces with Stop. Think. Connect™

By , October 11, 2016

I am excited to blog about our new association with the global cybersecurity awareness campaign STOP. THINK. CONNECT.™, which teaches digital citizens how to stay safer and securer online. Centrify always looks to align itself with like minded organizations and individuals as part of its global mission to protect companies and their users from cyberthreats. These organizations include the founders of STOP. THINK. CONNECT.: the National Cyber Security Alliance (NCSA), the APWG and the U.S. government, including the White House. The Department of Homeland Security leads the federal engagement in the campaign. Centrify is proud to work with these organizations, as well as the other 700+ members,…

Partner Corner

SIEM Partnerships with IBM, Splunk and HPe Grow Centrify Partnership Ecosystem

By , September 29, 2016

Have you ever wondered what happens to all the information that is generated by computers as they log the activities of users doing things? Every click, every command, every application interaction and every error is recorded as these actions occur. Sometimes these “events” figuratively do go on a road to nowhere… they just sit unanalyzed on a server somewhere waiting to fill up the disk with their eventual growth. The answer to the first sentence is that the information lies in these stacks of data, and that is a problem. As soon as you say problem — here comes software to the…

Centrify Perspective

How to Protect Yourself from a Social Engineering Attack

By , September 20, 2016

Hackers are after you. Not just “you” as a consumer using your devices to shop. Not just “you” as an employee accessing your company network, e-mail or applications. They are after you. The more they know and can readily find out about you, the easier it is to impersonate you for purposes of further compromise. One of the most common ways this happens is through social engineering — psychological manipulation of people into performing actions or divulging confidential information. Social engineering has been around for a long time; in fact, one of the earliest examples cited was the original Trojan Horse made of wood! However,…