Posts by Tom Kemp

Tom Kemp is co-founder of Centrify Corporation, a software and cloud security provider that delivers solutions that centrally control, secure and audit access to on-premise and cloud-based systems, applications and devices. Under his leadership Centrify has become one of the fastest growing security vendors in the industry and has amassed over 5,000 customers including nearly 50% of the Fortune 50.

Secure Thinking by Tom Kemp

Cybersecurity Must Be Top of Mind in the C-Suite

By , June 12, 2017

Data security breaches are no longer just an IT problem—they’re a C-suite problem. By now this should be obvious to everyone. Today’s advanced hackers — including cybercriminals, nation states, hacktivists and malicious insiders—are perpetrating ever more targeted, dangerous and frequent attacks. And the cost of these attacks is growing fast. The average total cost of a breach was $4 million in 2016, up 29 percent since 2013. And yet security is still not top of mind in the C-suite. Too many CEOs still consider security breaches merely a cost of doing business — rather than a serious threat to their…

Secure Thinking by Tom Kemp

More Thoughts on Vendor Consolidation in the Security Market

By , March 7, 2017

In my last blog post, I discussed a new major trend in the security market, which is that security buyers are increasingly looking to consolidate vendors and want more of a platform approach to security versus stitching together point solutions. Besides hearing this directly from customers over the last few months, I documented in the blog how two different analysts, who were both doing comprehensive security customer surveys, both independently found that around “70% of enterprise security buyers are consolidating vendors.”  In this blog post I want to further elaborate on this trend and share some additional data points that…

Secure Thinking by Tom Kemp

New Trend in the Security Space: Customers Want Vendor Consolidation and a Platform Approach

By , February 28, 2017

Starting late last year, I kept on hearing a growing drumbeat from customers that they were highly interested in consolidating the breadth of security vendors and products that they use internally to secure their enterprise. In past years, the talk by customers regarding “vendor consolidation” typically had been more in terms of the purchasing process and not having to deal with getting contracts and negotiating with yet another vendor. This time it was different — it has become clear to customers that having disjointed point solutions leave significant air gaps with regard to securing their enterprise, and that customers are…

Secure Thinking by Tom Kemp

The Cybersecurity Tipping Point Nears

By , February 15, 2017

If we’d take a moment to pull our heads out of the sand and look around, we’d quickly see that we’re on an ominous trajectory. There’s no arguing that over the last several years, we’ve been suffering from increasing numbers of breaches, cyberhacks and data leaks. What’s truly puzzling is the fact that we’ve grown so used to the headlines, they no longer seem to impact us: Target spent $250 million to manage a breach? A massive 1 terabytes per second attack against a DNS provider that knocks out major websites? One billion Yahoo identities hacked? Even a hacked election?…

Secure Thinking by Tom Kemp

Centrify Co-Chairs the 2017 ICIT Winter Summit

By , January 23, 2017

Once again, we find ourselves at that stage in the political cycle when the new administration is taking office. That means a revised look at everything — from the economy, to the markets, to the health of our industries. And an evaluation of how effectively we’re protecting all of the above. It is no surprise that cybersecurity is top of mind due to several recent high-profile breaches, many of which were mentioned in our end-of-the-year wrap-up. Perhaps no cybersecurity events were as disturbing as those surrounding the 2016 election. It turns out that many of these attacks would have been…

Secure Thinking by Tom Kemp

Cybersecurity in 2016; predictions for 2017

By , November 21, 2016

It’s that time of year again. The holiday season is upon us and with it, online shopping will no doubt take another bite out of traditional brick-and-mortar holiday sales. With a colorful new president taking office shortly thereafter, 2017 promises to be an interesting year. But before we get to predictions, let’s take a look at the year that was. 2016: The year in review After a series of high-profile breaches in 2015 that involved criminal and state-sponsored attacks against the personal data of hundreds of millions of people, our prediction last year was that 2016 would bring the increased…

Secure Thinking by Tom Kemp

Comparing Cloud Identity and Access Management (IAM) Solutions

By , October 17, 2016

The State of the IAM Market With the huge shift to the cloud happening and the corresponding plethora of SaaS apps now invading enterprises, it is not surprising that the need for identity and access management solutions built for the cloud is rising in importance in the minds of IT buyers. This is because each newly deployed cloud-based app can become an island of identity unto itself. This in turn causes the problems of end users drowning in too many passwords (which also increases the odds of one being stolen), the inability for IT to quickly provision and de-provision users…

Secure Thinking by Tom Kemp

National Cybersecurity Awareness Month: Lock Down Your Login

By , October 3, 2016

I just found out that October is “National Cyber Security Awareness Month.” Being in the security industry and seeing all the bad cybersecurity practices out there on a daily basis, I think every day we should evangelize the do’s and don’ts in regards to security; but, if we only get one month a year by Presidential proclamation, it beats nothing! As I dug into this awareness campaign, I noticed an initiative called STOP. THINK. CONNECT.™ that is sponsored by the National Cyber Security Alliance, and the “Lock Down Your Login” campaign, which was launched in September and does a nice job…

Secure Thinking by Tom Kemp

The “Grand Slam” of Identity and Access Management (IAM) Solutions

By , August 15, 2016

It’s summer and the sports of tennis and golf are enjoying their “grand slam” and “major” events (e.g. Wimbledon in tennis and the British Open in golf). Which got me thinking ― is there an equivalent set of “majors” for the Identity and Access Management market? The two major independent analyst firms in the IT industry — Gartner and Forrester ― spend a lot of time in the identity space, with Gartner publishing various Magic Quadrants and Forrester with its Waves. Magic Quadrants and Waves both measure a company’s current offerings, its strategy, as well as their market presence in…

Secure Thinking by Tom Kemp

Misuse of Privileged Credentials Now Involved in 80% of Data Breaches

By , August 2, 2016

Recently the respected analyst firm Forrester released its “Wave” for the privileged identity management (PIM) market. Centrify is quite proud to be recognized as a leader in the Forrester Wave (in fact we are the “furthest to the right”), and you can request a complimentary copy of the report here and see our analysis of the report here. But, what really jumped out at me was that the report documented how pervasive the misuse of privileged credentials are in data breaches. In this blog I will discuss what PIM is, what are some of the key findings of the Forrester report…