Posts by Bill Mann

Bill Mann is Senior Vice President of Products and Chief Product Officer for Centrify. Mann is responsible for the innovation and evolution of all Centrify solutions, running product strategy and product management, as well as playing a lead role in M&A as the company scales to its next phase. Mann is an enterprise software security executive with both large company and startup experience.

Centrify Perspective

Centrify Connect: Two Days, Four Keynotes, 15 Business Sessions, 25 Technical Sessions and One Great Opportunity

By , February 11, 2016

Nothing beats getting a lot of very smart people together in one location around a mutual topic like cybersecurity. Our teams have been working behind the scenes to create a two-day experience for our customers, with a mix of opportunities to hear from industry experts, from each other, and from our own Centrify product experts. We’re calling it Centrify Connect, and it is scheduled for May 11 and 12 at the Park Central Hotel in New York. At the end of these two days in May, I expect that we will learn as much from our customers as they will…

Centrify Perspective

Basic Human Needs — Identity Management in the Home

By , January 27, 2016

It’s Saturday morning in sunny California, but it’s raining; and, because it is raining, the Internet is down. Since, today in my house the lack of Internet access has become the top of Maslow’s hierarchy of human needs, I drive quickly to the local cable company store to patiently wait and get a new modem — I have never done this before, and I have strict instructions from my son to not mess around with the internet, but to follow the instructions and get it up and running — the Clone Wars on Netflix needs to be watched! So, with…

It's All About Identity

What Does Mr. Robot Teach Us About the Recent US-China Cybersecurity Pact?

By , October 22, 2015

I caught up on Mr. Robot this weekend — in the show, hacker Elliot Alderson works with a Chinese hacker to hack the world’s largest corporation. While watching, I tried to understand how the recent agreement between President Obama and Chinese President Xi Jinping to prevent cyberattacks on each other will make a difference? Mr. Robot, for those you have not seen it, is a hacker drama that follows Elliot Alderson, a security engineer who works for a cybersecurity firm. Elliot has all sorts of social problems — so he connects with people by hacking them and tries his best…

Centrify Perspective

Have Users Log in as Themselves, While Maximizing Control Over Privileged Accounts

By , April 24, 2015

Our most recent product addition to the Centrify platform is Centrify Privilege Service — a security-as-a-service offering in the identity management sector that Gartner refers to as shared account password management. But you may be wondering if this changes our viewpoint on how to manage privileged identities in the enterprise, because we also have our Centrify Server Suite that provides what Gartner defines as “super user privilege management.” The short answer is no — we believe Server Suite and Privilege Service together provide the most comprehensive privileged identity management solution in the market. Let me use this blog to explain our view on privileged…

Centrify Perspective

Our latest innovation: Privileged Identity Management as-a-Service for the Modern Enterprise

By , April 23, 2015

The Centrify product team is very proud this week at the RSA Conference to announce the industry’s first cloud-based privileged identity management service. For those of you who follow Gartner’s terminology in the identity space, we now provide SAPM or shared account password management. This together with our existing SUPM (super user privilege management) capabilities results in Centrify offering the most comprehensive approach to privileged identity management in the market. Gartner also defines a sector called IDaaS (Identity Management as-as-Service), and with this release we become the first identity vendor to expand the definition of IDaaS to include privileged identity management…

Centrify Perspective

Big Data Requires Even Bigger Security

By , February 19, 2015

This week we announced the industry’s first privileged identity management solution for Big Data. Centrify has partnered with three of the leading Big Data analytics vendors — Cloudera, HortonWorks and MapR — to extend their security capabilities to include privileged identity management.

Centrify Perspective

Mobile First + Identity First + Cloud First = Centrify User Suite

By , November 10, 2014

Here is a novel idea — Identity-as-a-Service (IDaaS) with Enterprise Mobile Management (EMM)-as-a-Service — but in combination. This is exactly what Centrify did when launching the Centrify User Suite in 2013. An industry first solution, built from the ground up for the mobile first, identity first and cloud first world of today and tomorrow.

Mobile Frontier

Better Together: Why Identity and Mobility are about to Converge

By , November 7, 2014

Two once-distinct markets are on course for convergence: mobility and identity. It’s a merger that will drive success for vendors that get the blend right—and could spell trouble for vendors that once prospered by focusing on mobility or identity alone.

Only a couple of years ago, emerging companies that specialized in either mobility or identity did quite well. Identity and access management (IAM) vendors like Okta rose to prominence by enabling enterprise users to easily access their various cloud applications, such as Salesforce, Workday and Taleo, via single sign-on. Meanwhile, at the other end of the spectrum, enterprise mobility management (EMM) vendors like AirWatch (acquired by VMware) and MobileIron (NASDAQ: MOBL) made a good living by helping organizations manage an ever-increasing array of mobile devices.

Centrify Perspective

RMM Meets IDaaS: Why MSPs are the New VARs

By , November 4, 2014

Last week Centrify announced that AVG Technologies selected Centrify’s integrated cloud-based identity management (IDaaS) and enterprise mobility management (EMM) solution for the AVG CloudCare service. The partnership marks a significant opportunity for small- and medium-sized businesses (SMBs) that are increasingly looking to adopt cloud and mobile apps for business purposes, but don’t have the time or resources available to manage the IT challenges and complexity this transition entails. This is also a huge opportunity for managed service providers (MSPs) who are implementing and managing IT services on SMBs’ behalf, while also playing a consultative role with respect to IT opportunities…

Mobile Frontier

Identity Is the Clear Differentiator for Enterprise Mobility Management (EMM)

By , August 21, 2014

Centrify was the first company to unite Enterprise Mobility Management (EMM) and Identity and Access Management (IAM). Now we hear rumblings that VMware and Microsoft are pursuing similar strategies. But not all integrations are created equal. First, let’s review what’s happening in the market that is leading to identity becoming a core component of enterprise mobile management. At the macro level, there are three key shifts driving this change in the market: MDM has moved to EMM:  Mobile Device Management is now a commodity, so MDM vendors have had to reinvent themselves to become EMM vendors. Their focus has shifted…