From the Cloud

From the Cloud

With no boundaries to protect, Identity as a Service (IDaaS) is the best way to manage access to and secure cloud apps. Centrify’s industry experts discuss helpful information and trends for any organization with users leveraging cloud apps.


By , September 26, 2016

If you’re like me, you’ve been hearing the phrase, “the cloud is coming” for years before you ever learned that winter was too. I never read any of the books, which first came out in 1996, so it wasn’t until the Game of Thrones TV series started in 2011 that I first heard the phrase “winter is coming.” So, when did I start hearing of the cloud’s inevitability? For me, the “cloud” started when people began insisting that it didn’t really exist, like Oracle’s Larry Ellison did back in 2008. And I distinctly remember thinking that ‘ol Larry had a point….

By , July 14, 2016

I’ve always enjoyed hearing grand stories of moving workloads to the cloud. This allows sharing resources you no longer have to manage and you gain access to all the processing power needed to finish jobs in an efficient manner. The best part is that you pay only for what you use. This explains Amazon Web Services (AWS) Elastic Compute Cloud (EC2) success.  In simple terms, move workloads to the cloud and you’ll be happy! This is awesome — yet, there is one question I often have. How will you secure this? Verizon’s 2016 Data Breach Investigations Report states 63% of data breaches involve compromised passwords. Amazon knows this and has done a fine job of building a…

By , June 13, 2016

During our conversations with customers and prospects these days, the question of implementing multi-factor authentication (MFA) usually begins with “when do you plan to?” instead of “are you planning to?” We no longer need to ask: “Are you planning to implement MFA for remote server access and application access?” “Are you planning to implement MFA for password checkout and privilege elevation?” Starting the question with “when” assumes it’s a given. It is. The power and value of MFA is now broadly recognized. More so in the U.S. now that the Payment Card Industry Data Security Standard (PCI-DSS 3.2, April 2016) has…

By , March 22, 2016

Being in tech and a self-proclaimed sports junkie, I couldn’t resist writing my blog about my favorite sporting event — March Madness. If you’re like me, you watched the selection show this past weekend and started thinking about your bracket. You said to yourself, I know the perfect bracket is impossible — but one day I’m going to get it right. Depending on who you listen to the odds range from a high of 1 in 128 billion to a low of 1 in 9.2 quintillion (yes, that’s a real number — 9 followed by 18 digits).  So, I wasn’t too…

By , February 2, 2016

We’re releasing our first Centrify Privilege Service app for ServiceNow. It’s a clean, simple integration that allows authorized IT admins to ask for access to password checkouts and remote sessions managed by Privilege Service, all from within the familiar ServiceNow user interface. All you need to make this work for your organization is (a) Centrify Privilege Service and (b) your ServiceNow ITSM portal.  Our new Privileged Access Request app for ServiceNow is free, so there’s no need for additional budget to connect these two services and start taking advantage of the app’s functionality. Here’s how it works. Configure your Privilege Service and…

By , January 12, 2016

Let’s continue our purely fictional story from last time, where we stepped into the shoes of our IT consultant, Tony. You may recall he works for ACME Consulting who provides outsourced IT services to Banzai. In a nutshell, we showed how easy it can be for Banzai to improve security, reduce risk, increase visibility, and provide secure access from anywhere, leveraging Centrify’s Privilege Service and Server Suite. Let’s peek inside Banzai’s IT world for an update from the IT Director, Tom: Well, the results came in and it’s safe to say (no pun intended) that our expectations were fully met with the…

By , January 11, 2016

So you have finally taken the plunge and decided to adopt Office 365. But as you embark on the Software-as-a-Service (SaaS) journey you come to realize that, as you adopt more and more SaaS applications, managing all these different logins could turn into a nightmare in the future. Not only would you have to touch each application when a new employee starts, but more importantly when an employee leaves. You start asking yourself questions like how do I manage to turn off access to all these cloud applications and how do I reclaim all the licenses from employees that have…

By , December 30, 2015

The Gartner IAM conference was such a whirlwind earlier in December. I was fortunate to attend a number of sessions from Gartner analysts and guest speakers. Let me break down some of the key takeaways that I learned:  1. Combining two authentication factors of the same kind does not increase security. Are you implementing two-factor (multi-factor) authentication the right way? Authentication factors require a mixture of three main types of authentication: knowledge, possession, and inherence. If we ask someone to authenticate with two knowledge factors, is this really secure? It’s easy to hack two authentication factors if they are available…

By , December 21, 2015

2015 sure has been a banner year for cloud technologies! A major development has been the mainstream adoption of containers. Google’s Kubernetes project and Docker have helped the adoption with major open source contributions in these areas. Back in 2014, we knew that Google launches more than 2 billion containers a week! More recently Docker shared that more than 1.3 billion container image downloads had been issued until November of this year, up from just over 2.75 million a year ago.  Cloud adoption for enterprises may be sooner than we expect — 34% of enterprises will have greater than 60% of their applications on cloud platforms in the next 2 years. Choice to go…

By , December 18, 2015

I am excited to announce that Centrify has added Smart Card login as a core feature of our Cloud Identity Platform supporting both the Centrify Identity Service as well as the Centrify Privilege Service. Smart Cards in physical form (CAC/PIV), derived credentials, virtual smart cards as well as USB PKI Keys (such as Yubikey or SafeNet eToken Pro) can now be used to login to your agency’s personalized Centrify cloud portal for access to SaaS applications as well as privileged user access to authorized servers and networking devices. There are several reasons that our customers are asking for this capability as they…