Hot Topics

Hot Topics

Centrify’s industry experts discuss the biggest issues and hottest topics around the convergence of identity and compliance for data center, cloud and mobile users and applications across devices.


By , September 19, 2018

It’s that time of year again: time for all the latest and greatest from our friends in Apple Park (or the Apple Spaceship as locals call it). This week, Apple released iOS 12 and next week Apple will release the latest update for macOS, 10.14 Mojave. We here at Centrify are excited for the new capabilities, the new look of iOS 12, and the new features and improvements with macOS Mojave. To that point, we have made sure that our customers are able to move forward with day-one Centrify support for both offerings. Our day-one support is effective across Centrify’s…

By , September 12, 2018

Gartner just released their first ever “Critical Capabilities for Access Management, Worldwide, 2018” report, and we are proud to see that Centrify has scored the highest of any vendor in 2 out of 3 Use Cases including “Workforce Users Accessing SaaS” (3.78 out of 5.0) and “Business-to-Business” (3.52 out of 5.0). Gartner evaluated 15 vendors’ services on nine critical capabilities including Event Logging and Reporting, SaaS Application Enablement, User Authentication Methods, and Authorization and Adaptive Access and three common Use Cases: Workforce Users Accessing SaaS, Business-to-Business, and Business-to-Consumer. We believe this validates our unique ability to secure access to apps…

By , August 6, 2018

This week, BlackHat USA commemorates its 21st year, taking over the Mandalay Bay Convention Center in Las Vegas to present trainings as well as recent developments and research about cybersecurity trends, best practices, and more. Centrify will once again be present to carry the flag for Next-Gen Access as an empowering force behind Zero Trust Security. You can find us at booth #2410 in the Oceanside Ballroom of the Business Hall, BlackHat’s latest euphemism for the vendor Expo. For more details about Centrify’s presence and other fun things happening at our booth, please read Michele Hayes’s blog from last week….

By , August 1, 2018

BlackHat USA 2018 kicks off in Las Vegas next week, the 21st year that the information security event has brought together thousands of cybersecurity professionals. BlackHat is always a unique event in that it devotes a heavier portion of its agenda to technical trainings, skill-building, and research briefings for practical cybersecurity learning, followed by a shorter main conference we typically encounter at a “trade show.” It’s also co-located with DEFCON, a hacker convention that takes place immediately following BlackHat – that’s always interesting. Whether you go to the whole event, just the technical sessions, or the Business Hall (aka The…

By , July 23, 2018

Security breaches are now all too commonplace — 58% of organizations have experienced at least one in the past 12 months. As a result, IT security leaders are urgently scrambling to defend attacks at every entry point. Worse yet, traditional approaches to security, based on the notion that you can keep out the “bad guys” out while letting in the good guys, have proven ineffective.  Access control strategies that focus on separating trusted from untrusted users are missing the whole point. Mobile proliferation, reliance on outsourced partners and cloud technologies, and the regular occurrence of insider attacks mean that there…

By , June 25, 2018

Last week, Amazon Web Services hosted its AWS Public Sector Summit in Washington, DC. In its 9th year, the event attracted thousands of global leaders and IT security practitioners from government, education, and non-profit organizations to learn how to start their path to the cloud or how to maintain momentum once they’ve begun the transformation. BULLISH OUTLOOK FOR CLOUD ADOPTION IN GOVERNMENT The meeting rooms and exhibit hall were humming and regularly required the organizer to cordon off access to the different floors due to reaching the facility’s capacity. The dramatic increase in attendees compared to prior years illustrates the…

By , June 20, 2018

Download the 2018 Gartner Magic Quadrant for Access Management Centrify has been named a Visionary by Gartner, Inc. in the 2018 Magic Quadrant for Access Management, Worldwide. According to Gartner, “visionaries are noted for their innovative approach to access management technology, methodology and/or means of delivery.” We believe being recognized as a visionary in access management is a testament to the progress Centrify has made in delivering an innovative and class-leading solution while validating Centrify’s position as a top vendor in the access management market. Centrify’s innovative approach to access management is rooted in our Zero Trust Security approach and…

By , June 8, 2018

451 Research recently published an impact report recognizing Centrify as one of the early vendors to embrace the Zero Trust concept, which is a new conceptual framework on the rise as traditional security models that follow a hardened perimeter approach have failed. The author, 451 analyst Garrett Bekker, notes these failures and states that “the very concept of trust is called into question, in favor of assuming all users and assets are by definition untrusted” and that “the notion of trust is no longer based on where you are, but more on who you are, and what you are allowed…

By , May 30, 2018

The General Data Protection Regulation, or GDPR for short, is a major new European privacy law that went into effect on May 25. GDPR will radically reframe our relationship with the organisations that store and process our data. From Amazon to the UK National Health Service (NHS), organisations around the world are desperately racing to ensure compliance, even after the deadline. Yet despite these efforts, just one in ten consumers have heard of the data protection regulation. That’s a shame, because this is a huge piece of legislation which will impact virtually every industry in its bid to make the…

By , May 23, 2018

Over the past 12 months during this blog series I’ve tried to provide insight into some of the key aspects of the GDPR and how organisations can better prepare for the big compliance deadline day of 25 May. Now that day is almost upon us, the question many organisations are asking is, “what happens next?” The truth is that, despite having had years of notice, many are only now waking up to the reality of the new regulatory regime. A recent survey of RSA attendees found just 14% claimed they were fully prepared for the GDPR. So what can we…