It’s All About Identity

It’s All About Identity

This section highlights the important topics around identity as the key enabler for single sign-on, role-based access control, privileged identity management, auditing and compliance across on-premise, cloud and mobile users, apps and devices.


By , October 31, 2016

In the novel Frankenstein, by Mary Shelly, Victor Frankenstein embarks on a quest to create life by using dead body parts, “collected bones from carnel-houses.” In the novel, the monster is totally uncontrollable and ultimately dooms his creator Victor. Frankenstein is not only a masterpiece of literature, but also represents a perfect analogy for today’s highly distributed business, and government, IT enterprises. Within the IT organizations of large enterprises, it’s very common to have different groups operating with almost complete autonomy, like small “kingdoms,” and these groups may rarely, if ever, coordinate their activities. Sure it’s true, that in some activities…

By , September 21, 2016

Today Apple released macOS Sierra and once again Centrify has ensured that our customers are ready to embrace the new release and its exciting new features with day one support. Centrify’s day one support for Sierra is effective across the entire product line, including our Centrify Identity Service, Centrify Express for Mac and Centrify Express for Mac Smart Card offerings. In addition to supporting the latest macOS release, Centrify has also provided day one support for the recently released iOS 10 update. With support for both of the new releases from Apple our customers can rest assured that they can take…

By , September 6, 2016

I’m very pleased to announce that we’ve added a brand-new deployment option to Centrify Privilege Service, our enterprise-grade privileged identity management (PIM) solution for remote access, shared account password management, multi-factor authentication (MFA) and privileged session monitoring. Privilege Service is now the only product of its type available today that natively supports all three deployment models that enterprise customers need: on-premises, private cloud and public cloud. Privilege Service has been available as PIM-as-a-Service from day one, i.e. the public cloud deployment option. And now, you have the option to install, deploy and manage Privilege Service within your own IT environment….

By , September 1, 2016

In previous blogs, “Securing Enterprise Identities For Dummies, Part One and Part Two,” I wrote extensively about how identity can provide a new layer of security for your organization. Identity can be a powerful security tool for protecting both end-users and privileged users from the leading cause of data breaches — compromised credentials. Implementing an identity platform for both identity as a service and privileged identity management can add a strong player security for your organization. In Part One, we covered how the traditional network perimeter is inadequate for today’s apps and infrastructure, which are increasingly cloud and mobile. We also…

By , August 23, 2016

Little has changed in 30 years of massive data breaches From the earliest computer hackers to today’s sophisticated cyber-criminals, little has changed in the modus operandi used to access and monetize financial data. In the TRW 1984 incident, thieves stole access codes to a credit rating database from a TRW subscriber, a Sears and Roebuck’s store in Sacramento. They proceeded to paste them to an online noticeboard, so that others with personal computers could use the stolen credit history information of 90 million Americans to commit credit card fraud. Today, privileged user’s credentials are still the preferred target for cyber…

By , July 26, 2016

Recent experiences have made me question just how much information we hand out nowadays to people we barely know. It seems that everyone wants a bit of our personal information, and more often than not we are happy to provide it. Even from my recent experiences selling a flat, it was surprising how much personally identifiable information the estate agent needed to see. I was asked to send all sorts of documents, from passport details to bank statements, often over e-mail. As someone keen to sell a flat, I did it without question of course — we all want the…

By , July 19, 2016

When it comes to some of the world’s finest Cognac and spirits, many of us turn to offerings from Rémy Cointreau. As one of the world’s leading alcoholic beverage brands, Rémy Cointreau employs 1,800 people all over the world and has more than $1 billion in annual sales. Rémy Cointreau recently chose Centrify to enable secure access to apps from any device, anywhere in the world.  When Chief Technology Officer Sébastien Huet joined Rémy Cointreau in 2015, one of his primary objectives was to help transform the company into a more agile organization. A key component of that transition would be…

By , June 28, 2016

In part one of Securing Enterprise Identities For Dummies, we covered how the traditional network perimeter is inadequate for today’s apps and infrastructure which are increasingly cloud and mobile. We also covered steps to securing enterprise identities so that any user can obtain secure access to any resource. These steps included: Taking stock of your existing enterprise users, apps and infrastructure Considering the role of identity in cybersecurity Architecting security using identity Deploying an identity platform for security Part 1 of this blog concluded that an identity platform can provide you with a unified and integrated set of tools, auditing, reporting…

By , June 27, 2016

When I was a kid, I remember arguing with friends about… everything. I’m difficult that way. But in this specific argument, we were arguing about amounts. If I can recall, my seven-year-old stance was this: “A couple” meant two. Period. Always. No matter what. “A few” could mean two, or it could mean more, but it was always less than “a lot.” “A lot” was — well, you know, as many as you can grab. My buddy was sure that “a few” meant three, like “a couple” meant two. We argued, and used examples, and then probably picked up sticks…