Centrify Perspective

Centrify Perspective

As a leader in unified identity management, Centrify offers helpful information for organizations to enable greater user productivity, improved IT efficiency, better regulatory compliance and lower TCO of their identity infrastructure.


By , August 5, 2019

It’s hard to believe that we’re already more than halfway through 2019. Or as I like to put it, I’ve already wasted one month of summer without getting outside enough. Well, one of the reasons why is because here at Centrify we’ve been laser focused on stopping the leading cause of data breaches – privileged access abuse. We recently looked back at the first half of the year and reviewed the top breaches of 2019. It was no surprise to us that the top cyber breaches in the first half of year were related to credential abuse. The breach analysis…

By , June 19, 2019

Ransomware attacks like the ones that wreaked havoc in Baltimore, Maryland, Albany, New York, and Genesee County, Michigan are dominating the headlines in 2019. Holding someone or something for ransom is a simple yet effective strategy that has been used by criminals for many years. Today, cyber criminals are applying these ancient techniques to modern technologies. This raises issues such as what organizations need to know regarding ransomware attacks and what they can do to minimize the risk of being victimized. Ransomware, which encrypts a victim’s data and demands a ransom to unlock it, can have a major impact on…

By , May 1, 2019

Many state CIOs are struggling to manage the onslaught of priorities that are captured in the NASCIO Top 10 Policy and Technology Priorities for 2019, ranging from enabling cloud services to the digital government to IT governance. While their mission mandates tackling these priorities, they cannot solely focus on their implementation, but must also bolster cyber security and abide by stringent compliance mandates (e.g., FISMA, HIPAA, NIST SP 800-Series). This is a tall order to deal with. To add to this challenge, the attack surface of state governments has changed dramatically. Today state agencies must not only control access to…

By , April 23, 2019

KuppingerCole recently published its 2019 KuppingerCole Leadership Compass for Privileged Access Management (PAM), again recognizing Centrify as a Leader as it did in the previous iteration in June 2017. This marks the third major PAM Market research report in the past 6 months where Centrify was recognized as a Leader, following the same recognition in The Forrester Wave: Privileged Identity Management (PIM), Q4 2018 and the Gartner Magic Quadrant for Privileged Access Management, Q4 2018. We’re honored to go “3 for 3,” and believe this is a strong validation of Centrify’s Zero Trust Privilege approach. A complimentary version of this report…

By , March 20, 2019

At Centrify we are proud of our customers and the success they experience with our solutions. Today we are proud that our customers are speaking out and providing valuable insights to the market about their experience with Centrify. This morning, Gartner announced that Centrify has been recognized as a March 2019 Gartner Peer Insights Customers’ Choice for Privileged Access Management. In its announcement, Gartner explains, “The Gartner Peer Insights Customers’ Choice is a recognition of vendors in this market by verified end-user professionals, taking into account both the number of reviews and the overall user ratings.” To ensure fair evaluation,…

By , March 5, 2019

Today at the RSA Security Conference, we announced Centrify’s Cloud-Ready Zero Trust Privilege Services architecture, including a wide range of enhancements that redefine legacy Privileged Access Management (PAM). If you are at the show, we hope you pay us a visit in Booth 6445 where we can demo a range of DevOps, Automation, hybrid cloud, and infrastructure security protections for PAM. I’ve been going to RSA on and off for 22 years. Of course, the show is quite a different beast now. In 1997, the show was hosted for the first time at the Fairmont Hotel in San Francisco. It…

By , February 26, 2019

I’m both a technology guy, and a numbers guy. I have Bachelor of Science degrees in both Accounting and Computer Science. I’ve held the CFO and VP of Finance titles at technology companies throughout my career, including at Centrify where I was CFO for 7 years before becoming CEO in January. But I’ve never painted myself as only a numbers guy because I’ve always had a very keen eye on the technology and operations. As CEO, now more than ever, I’m laser-focused on our innovation and ability to execute on our vision, which is to redefine legacy PAM with cloud-ready…

By , February 21, 2019

Last June at the 2018 Gartner Security & Risk Management Summit, the analyst firm issued a “Smarter with Gartner” paper outlining the Top 10 security projects for 2018, which included Privileged Account Management. While Gartner clarified that the ten projects were in no particular order, PAM was right there at the top. This was not a surprise to Centrify, as we’ve seen global cybersecurity spending reach $124 billion but privileged credential abuse is still the leading attack vector. Forrester estimates that 80% of breaches involve a privileged identity, and that 66% of companies have been breached five times or more….

By , January 8, 2019

The privacy and security concerns associated with digital patient records make the healthcare industry one of the most regulated industries in the United States. Regulations such as the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health (HITECH) Act create a much higher standard of scrutiny than other verticals with regards to privacy and disclosure requirements. However, being compliant doesn’t mean you’re secure. Traditionally, healthcare providers’ mission is to save lives. As a result, IT security departments are typically not a top priority when it comes to budget dollars and are often…

By , December 18, 2018

As CEO of Centrify, I have been writing about “CEO Fraud” — whereby scammers send emails that impersonate senior executives to obtain money or data — for well over three years now. I have blogged about it based on first-hand encounters, presented on it and the broader topic of “business email compromise” (BEC) at the 2016 RSA Conference, and was even interviewed on a nightly news show about it (scroll to 18:30 to see yours truly wax poetic). But I am not the “vox clamantis in deserto” (“voice crying out in the wilderness” for those that know Latin, or you…