Centrify Perspective

Centrify Perspective

As a leader in unified identity management, Centrify offers helpful information for organizations to enable greater user productivity, improved IT efficiency, better regulatory compliance and lower TCO of their identity infrastructure.


By , April 23, 2019

KuppingerCole recently published its 2019 KuppingerCole Leadership Compass for Privileged Access Management (PAM), again recognizing Centrify as a Leader as it did in the previous iteration in June 2017. This marks the third major PAM Market research report in the past 6 months where Centrify was recognized as a Leader, following the same recognition in The Forrester Wave: Privileged Identity Management (PIM), Q4 2018 and the Gartner Magic Quadrant for Privileged Access Management, Q4 2018. We’re honored to go “3 for 3,” and believe this is a strong validation of Centrify’s Zero Trust Privilege approach. A complimentary version of this report…

By , March 20, 2019

At Centrify we are proud of our customers and the success they experience with our solutions. Today we are proud that our customers are speaking out and providing valuable insights to the market about their experience with Centrify. This morning, Gartner announced that Centrify has been recognized as a March 2019 Gartner Peer Insights Customers’ Choice for Privileged Access Management. In its announcement, Gartner explains, “The Gartner Peer Insights Customers’ Choice is a recognition of vendors in this market by verified end-user professionals, taking into account both the number of reviews and the overall user ratings.” To ensure fair evaluation,…

By , March 5, 2019

Today at the RSA Security Conference, we announced Centrify’s Cloud-Ready Zero Trust Privilege Services architecture, including a wide range of enhancements that redefine legacy Privileged Access Management (PAM). If you are at the show, we hope you pay us a visit in Booth 6445 where we can demo a range of DevOps, Automation, hybrid cloud, and infrastructure security protections for PAM. I’ve been going to RSA on and off for 22 years. Of course, the show is quite a different beast now. In 1997, the show was hosted for the first time at the Fairmont Hotel in San Francisco. It…

By , February 26, 2019

I’m both a technology guy, and a numbers guy. I have Bachelor of Science degrees in both Accounting and Computer Science. I’ve held the CFO and VP of Finance titles at technology companies throughout my career, including at Centrify where I was CFO for 7 years before becoming CEO in January. But I’ve never painted myself as only a numbers guy because I’ve always had a very keen eye on the technology and operations. As CEO, now more than ever, I’m laser-focused on our innovation and ability to execute on our vision, which is to redefine legacy PAM with cloud-ready…

By , February 21, 2019

Last June at the 2018 Gartner Security & Risk Management Summit, the analyst firm issued a “Smarter with Gartner” paper outlining the Top 10 security projects for 2018, which included Privileged Account Management. While Gartner clarified that the ten projects were in no particular order, PAM was right there at the top. This was not a surprise to Centrify, as we’ve seen global cybersecurity spending reach $124 billion but privileged credential abuse is still the leading attack vector. Forrester estimates that 80% of breaches involve a privileged identity, and that 66% of companies have been breached five times or more….

By , January 8, 2019

The privacy and security concerns associated with digital patient records make the healthcare industry one of the most regulated industries in the United States. Regulations such as the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health (HITECH) Act create a much higher standard of scrutiny than other verticals with regards to privacy and disclosure requirements. However, being compliant doesn’t mean you’re secure. Traditionally, healthcare providers’ mission is to save lives. As a result, IT security departments are typically not a top priority when it comes to budget dollars and are often…

By , December 18, 2018

As CEO of Centrify, I have been writing about “CEO Fraud” — whereby scammers send emails that impersonate senior executives to obtain money or data — for well over three years now. I have blogged about it based on first-hand encounters, presented on it and the broader topic of “business email compromise” (BEC) at the 2016 RSA Conference, and was even interviewed on a nightly news show about it (scroll to 18:30 to see yours truly wax poetic). But I am not the “vox clamantis in deserto” (“voice crying out in the wilderness” for those that know Latin, or you…

By , December 12, 2018

Every year when the holidays roll around, I’m amazed at the way shopping deals dominate the headlines. Black Friday and Cyber Monday are annual juggernauts that produce some amazing opportunities for shoppers and retailers alike. Yet this year, even the mighty shopping season has taken back-seat to the continuing domination of security breaches in the press. With $114 billion being spent on Information Security products and services in 2018, as estimated by Gartner, we should see the frequency of data breaches going down. Instead, rather than seeing fewer headlines, we’re seeing more. In the past two weeks alone we’ve seen…

By , December 7, 2018

On December 3, 2018 Gartner released The Magic Quadrant for Privileged Access Management, Q4 2018. Evaluating 14 vendors, Gartner positioned Centrify in the LEADERS quadrant. Here at Centrify, we believe this is a strong validation of Centrify’s Zero Trust Privilege approach to privileged access management. A complimentary version of this report is available for download here. As breaches and attacks grow, the market is finally realizing that importance of PAM not just for compliance, but as a strong security control. At Gartner’s Security and Risk Management Summit in June 2018, Neil MacDonald noted in the keynote that PAM was one of the Top…

By , November 8, 2018

Cyber attackers long ago figured out that the easiest way to gain access to sensitive data is by compromising an end user’s identity and credentials. According to the Verizon 2017 Data Breach Investigation Report, 81% of hacking-related breaches leverage either stolen, default, or weak credentials. Often these credentials belong to privileged users, providing cyber adversaries the “keys to the kingdom” and providing them a perfect camouflage for their data exfiltration efforts. Betting on the human factor and attacking the weakest link in the cyber defense chain, credential harvesting has become the base of most cyber-attacks. Recent reports of a newly-detected Smoke…