Posts by Bill Mann

Bill Mann is Senior Vice President of Products and Chief Product Officer for Centrify. Mann is responsible for the innovation and evolution of all Centrify solutions, running product strategy and product management, as well as playing a lead role in M&A as the company scales to its next phase. Mann is an enterprise software security executive with both large company and startup experience.


Centrify Perspective

Reevaluate Your Cybersecurity Spend in 2017

By , October 17, 2017

Without a doubt, the most frustrating fact I face every day is this: Companies spend a meager 4.7% of their total security budgets on identity and access management (IAM) – while compromised identities are responsible for 80 percent of all data breaches. Eighty percent. This glaring disconnect is almost more than I can wrap my head around. Here’s the math: According to Gartner’s “Forecast: Information Security, Worldwide, 2015-2021, 2Q17 Update,” in 2015, companies spent nearly $84 billion on security. Approximately 4.7 percent of that ($4 billion) went towards identity and access management. This year, the total security spend is projected to…

Hot Topics

Equifax Data Breach: Stock Drops More Than Five Percent

By , September 7, 2017

Equifax announced today that it was hit by a cyber security incident, potentially impacting 143 million consumers in the U.S. According to the company’s press release, “criminals exploited a U.S. website application vulnerability to gain access to certain files.” The “information accessed primarily includes names, Social Security numbers, birth dates, addresses… [and] credit card numbers.” After news of the breach broke, Equifax’s stock price dropped five percent. This is directly in line with a recent Centrify-commissioned Ponemon study, which found this to be the historic average on Day One. Moreover, Equifax’s stock price dropped 13-14 percent the day after its breach…

Centrify Perspective

Four Things You Don’t Know About Cybersecurity… That You Should

By , July 25, 2017

Ponemon Institute recently conducted a survey, sponsored by Centrify, designed to more deeply understand the current state of cybersecurity. The Impact of Data Breaches on Reputation & Share Value: A Study of U.S. Marketers, IT Practitioners and Consumers examines differing perspectives across a number of security topics. I’d like to focus on IT professionals at this time, as I believe the results are enlightening, to say the least. 43 Percent of IT practitioners said their organization had a data breach involving sensitive customer or business information in the past two years. This tells us that more than one in five organizations…

Hot Topics

RSA: Centrify Survey Reveals Almost Half of Respondents Lack Confidence in Their Company’s Cybersecurity Strategies

By , February 16, 2017

Yesterday, we conducted an onsite survey of IT professionals attending the RSA Conference, being held this week at Moscone Center, San Francisco. The poll asked respondents how their companies secure applications and infrastructures in the age of access, and it revealed that only slightly more than half (55%) believe their company’s current technology investment ensures their company’s cybersecurity. This leaves about half of respondents with a lack of confidence in their own organization’s corporate security! While this fact is startling, it shouldn’t be too surprising, since a recent Forrester study, commissioned by Centrify, confirms that in the past two years, two-thirds…

Centrify Perspective

Top Three New Year’s Security Resolutions

By , January 4, 2017

When it comes to setting New Year’s resolutions, most people shoot for the moon. We tell ourselves we will give up carbs, go running every morning, become a vegan or even give up drinking alcohol. Inevitability, three weeks later, we find ourselves right back where we started. As security professionals, responsible for keeping the bad guys out and reducing the risk of data breaches, we find ourselves right back where we started too — we fundamentally do not really improve our security posture, and then wonder why not. We are very similar to our consumer counterparts, because we set lofty…

Hot Topics

Centrify Consumer Trust Survey: The Corporate Cost of Compromised Credentials

By , June 8, 2016

We recently conducted a survey to find out what happens to consumer trust when a business is breached. The study examined consumer attitudes toward corporate hacking, and surveyed 2,400 people across the U.S., U.K. and Germany. To our surprise, more than half (66 percent) of U.S. respondents said they are likely to stop doing business with a hacked organization, and fewer than half of Americans are very satisfied with how corporations handle cyberbreaches. Our data shows that when companies put customer data at risk, they are putting the entire business at risk. We found most consumers believe the burden of…

Centrify Perspective

How to Cook Up a Great MFA Strategy

By , May 12, 2016

Have you ever attempted to assemble do-it-yourself furniture—or for that matter throw together a meal—without following the instructions or recipes closely? You end up with furniture that looks like it was thrown off a truck or food that’s barely edible. When it comes to deploying multi-factor authentication (MFA), the same kind of philosophy applies. If you don’t follow some basic guidelines and practices, you’ll end up with a “solution” that doesn’t really solve the problem of protecting data. MFA solutions provide the kind of protection that organizations need in today’s increasingly complex IT and security environment—mitigating password risk by requiring…

Centrify Perspective

Is Multi-factor Authentication Adoption Finally Picking Up Speed?

By , May 3, 2016

Enterprise adoption of multi-factor authentication has been slow, with many organizations disregarding its value. But has Amazon triggered a change in momentum?   Despite best intentions, few in the industry would argue that relying on a password for security purposes works. If a password is too simplistic, it is more likely to be guessed (either by man or machine). If it is too complex, the chances are it has to be written down in order to be remembered, leaving it susceptible to prying eyes. Passwords are shared with insufficient consideration of the longer-term implications, and ex-employees can often still access…

Centrify Perspective

Centrify Connect: Two Days, Four Keynotes, 15 Business Sessions, 25 Technical Sessions and One Great Opportunity

By , February 11, 2016

Nothing beats getting a lot of very smart people together in one location around a mutual topic like cybersecurity. Our teams have been working behind the scenes to create a two-day experience for our customers, with a mix of opportunities to hear from industry experts, from each other, and from our own Centrify product experts. We’re calling it Centrify Connect, and it is scheduled for May 11 and 12 at the Park Central Hotel in New York. At the end of these two days in May, I expect that we will learn as much from our customers as they will…