Posts by Ben Rice

Ben Rice is Vice President, Worldwide Business Development. Ben has held a variety of senior management positions at public companies such as Blue Coat Systems and startups such as Egnyte and Ositis Software. He began his career as an attorney working at The Castleman Law Firm, the LA County District Attorney and the Law Offices of Benjamin Z. Rice.

Centrify Perspective

Do You Know How Easy It Is to Guess Your Password? (Hint: You Don’t Want to Read This!)

By , May 31, 2017

The number of account credentials that has been stolen in the last 10 years has exploded to a degree that is unprecedented. It is now a fait accompli that many of the security tools out there can’t help you as 81% of data breaches come from compromised credentials. Lets delve into how easy it is to break into almost any account. Hackers have invented the digital equivalent of a master key. If you look at sites like SecLists, Weakpass, and —  not to mention berzerk0’s probable wordlists on github which is a clever amalgam of password wordlists. Here you will find…

Hot Topics

What’s Next from Google Cloud: Scenes from Google Next

By , March 13, 2017

Google Cloud last week had their big event in San Francisco, gathering Partners, customers and Googlers alike to talk about Google Cloud and its bright future. Centrify was proud to sponsor this event, and we had a presence in the Partner Playground, which allowed us to visit with hundreds of Google Next attendees to understand what they were doing with Google Cloud. Of course we spoke with Centrify customers, Google customers and some prospective customers, but interestingly, most of these conversations were with those who are already using software as a service (SaaS) or identity as a service (IDaaS) today….

Hot Topics

Centrify Supports Data Privacy Day: Take Action Today to Protect Your Privacy!

By , January 27, 2017

Centrify is proud to be a Data Privacy Day Champion because we work tirelessly each day to protect our customers and their data privacy.  We believe that all of us, whether at work or as consumers, should be aware of data privacy issues (who has my data? what can they do with it? what are they doing to protect it?) and take steps to protect personal data and business’s data. So, when we found out we could help champion Data Privacy Day we jumped at the chance. In recognition of Data Privacy Day, Centrify brings various supporting messages about how to keep…

Partner Corner

Centrify Joins Forces with Stop. Think. Connect™

By , October 11, 2016

I am excited to blog about our new association with the global cybersecurity awareness campaign STOP. THINK. CONNECT.™, which teaches digital citizens how to stay safer and securer online. Centrify always looks to align itself with like minded organizations and individuals as part of its global mission to protect companies and their users from cyberthreats. These organizations include the founders of STOP. THINK. CONNECT.: the National Cyber Security Alliance (NCSA), the APWG and the U.S. government, including the White House. The Department of Homeland Security leads the federal engagement in the campaign. Centrify is proud to work with these organizations, as well as the other 700+ members,…

Partner Corner

SIEM Partnerships with IBM, Splunk and HPe Grow Centrify Partnership Ecosystem

By , September 29, 2016

Have you ever wondered what happens to all the information that is generated by computers as they log the activities of users doing things? Every click, every command, every application interaction and every error is recorded as these actions occur. Sometimes these “events” figuratively do go on a road to nowhere… they just sit unanalyzed on a server somewhere waiting to fill up the disk with their eventual growth. The answer to the first sentence is that the information lies in these stacks of data, and that is a problem. As soon as you say problem — here comes software to the…

Centrify Perspective

How to Protect Yourself from a Social Engineering Attack

By , September 20, 2016

Hackers are after you. Not just “you” as a consumer using your devices to shop. Not just “you” as an employee accessing your company network, e-mail or applications. They are after you. The more they know and can readily find out about you, the easier it is to impersonate you for purposes of further compromise. One of the most common ways this happens is through social engineering — psychological manipulation of people into performing actions or divulging confidential information. Social engineering has been around for a long time; in fact, one of the earliest examples cited was the original Trojan Horse made of wood! However,…

Partner Corner

Centrify Brings Secure Identity Data to the Open Network Insight Project

By , July 28, 2016

Centrify has been working with Cloudera for years around our many joint customers and a partnership embracing the product strengths of both companies. Building on this foundation, Cloudera and Centrify today announced that Centrify has joined the Open Network Insight (ONI) project. ONI is an open source, Apache 2.0 licensed cybersecurity project that leverages big data and machine learning to detect advanced threats. ONI provides an open data model for Network, and with the addition of Centrify to the project will be extended to include identity. By extending ONI’s open data model into identity, Centrify is allowing users to centralize identity and…

Centrify Perspective

Centrify Expands It’s Developer Program to Make it Easier to Add MFA, SSO and Access Control to Apps

By , May 24, 2016

Single sign-on, social login, multi-factor authentication (MFA), password reset and access control can now be easily integrated into cloud, mobile and behind the firewall apps from third party developers by integrating Centrify APIs. Application developers are in a modern day wonderland where they can build multifaceted and intricate apps that function across user devices without having to build much computing or coding infrastructure.  It is now taken for granted that developers tap into well known APIs like Twitter, Facebook, Google or eBay to enrich their apps with new layers of context, function and integration. The API economy essentially allows developers to outsource some…

Partner Corner

IBM — Centrify Partnership Brings Identity Security to IBM Big Insights

By , March 24, 2016

IBM is truly the original Big Data company. Going back to 1911 when IBM (then called Computing-Tabulating-Recording Company, or C-T-R) acquired Herman Hollerith’s Tabulating Machine Co., IBM has continuously brought innovation and insight to data recorded with computing machines.  The Tabulating machine was invented by Mr. Hollerith to count the 1890 US Census. It sorted and counted information recorded by punching holes in cards, and Hollerith had begun selling the machines to governments, railroad companies and retailers. Thus began the Big Data era.  The idea that businesses could gather data and analyze it to obtain competitive advantage/improve efficiency became the driving…

Partner Corner

Centrify and Yubico Partner to Bring Context-Based Adaptive Authentication to the Enterprise

By , February 29, 2016

Have you ever reported to the police that someone else’s car was stolen or burglarized?  You haven’t?  Certainly you have heard a car alarm.  Why did you fail to act when the car alarm sound blared into your ears?  Hint: almost no one believes car alarms and so we are lulled into a false sense of security. Where this false sense of security has reached epic proportions is in our collective security for our digital identities. We use passwords so we think we are safe, but we are already compromised and don’t even know it! Business employees are using more varied devices…