Hot Topics

Hot Topics

Centrify’s industry experts discuss the biggest issues and hottest topics around the convergence of identity and compliance for data center, cloud and mobile users and applications across devices.


By , July 30, 2019

Over the first half of 2019, Centrify issued two research reports about the adoption of Privileged Access Management (PAM) solutions and the maturity of organizations on the path to Zero Trust Privilege. The first report, “Privileged Access Management in the Modern Threatscape” published in February 2019, surveyed 1,000 IT decision makers in the U.S. and U.K. The main takeaway from that report is that 74% of respondents whose organization had been breached acknowledged it involved access to a privileged account. This was important because it validated Forrester’s long-held estimate that 80% of breaches involve privileged access abuse. The second report,…

By , June 20, 2019

June has been a busy month in the cybersecurity space! It started off with InfoSec Europe and SailPoint Navigate, next week we’ll wrap up the month with AWS Re:Inforce – Amazon’s inaugural security-focused event – and Identiverse – the premier identity industry event. That’s a lot! We love these opportunities to come together with our friends, partners, and colleagues and in the cybersecurity space and demonstrate how we’re redefining legacy Privileged Access Management (PAM) with Centrify cloud-ready Zero Trust Privilege. AWS Re:Inforce Centrify will be in booth 814 in the Security Learning Hub at AWS Re:Inforce, demos and swag in…

By , June 4, 2019

You know when you’re hanging out with friends, maybe doing a little drinking, and somebody suggests that you go to a karaoke bar? “Heck yeah! Sounds fun, I’m a GREAT singer!” The letdown is always when somebody records your performance and you listen to it (or worse, watch it on YouTube or social media) the next day…. “Oh, I’m not as good as I thought I was, but I’m still not willing to take any voice lessons.” The same could be said about Privileged Access Management. We all know it’s a good thing to do, but we tend to be…

By , April 26, 2019

Centrify received exciting news this week that we are now FedRAMP Authorized! For those who don’t know about FedRAMP, it is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. FedRAMP Authorization is an important qualification that significantly smooths the process of selling cloud technology solutions to government agencies. We have been trying to get this authorization for years, so this is a BIG win for Centrify, our partners, and our customers. View our FedRAMP Authorization: https://marketplace.fedramp.gov/#/product/centrify-identity-services–centrify-privilege-services?sort=productName Privileged access abuse is the leading attack vector, estimated to be involved…

By , March 1, 2019

If there was one clear takeaway from the 2018 RSA Conference, it was that Zero Trust was ready to take off. It seemed like everywhere you turned, Zero Trust was staring you in the face. Oh wait, that was just the Centrify marketing blitz that overtook San Francisco and Moscone Center last April! ZERO TRUST, 10 MONTHS LATER Fast-forward 10 months ahead and here we are, heading back to Moscone for the annual cybersecurity event. And what’s even more clear: Zero Trust has arrived. Many vendors in the industry have jumped on the Zero Trust bandwagon (whether they have a…

By , February 28, 2019

As organizations struggle to protect the ever-expanding attack surface, they not only have to secure access to infrastructure, databases, and network devices, but also extend security controls to cloud environments. The modern threatscape now includes Big Data projects, DevSecOps, and hundreds of containers or microservices that represent what used to be a single server. At Centrify, we believe that legacy PAM solutions simply are not capable of securing modern enterprise attack surfaces. That’s why we have a vision of redefining legacy PAM with cloud-ready Zero Trust Privilege. Yet, as with anything, knowing how, when and where to start or progress…

By , February 5, 2019

The 2019 RSA Conference is just around the corner, coming up March 4-8 at the Moscone Center in San Francisco! If you’ve never attended an RSA show before, this is the security event of the year and the best opportunity you’ll find to network with over 40,000 other security professionals — exchanging ideas, learning the latest trends and finding solutions that empower you to stay ahead of rapidly-evolving and increasingly-costly cyber threats. As usual, Centrify will have a significant presence at the event. We’ve moved from the South Hall into the North Hall, and will be offering demos, theater presentation and great…

By , January 15, 2019

In 2018, Zero Trust Security gained a lot of popularity, as more organizations recognized the merit of the Zero Trust approach to security. We saw the term go from being a buzzword to an actual security approach that organizations have engaged and started to implement. That’s the good news. The bad news is that when it comes to actually implementing a Zero Trust Security model, many still don’t know where to start. And there are several misconceptions surrounding Zero Trust that further impede adoption. This might explain why, despite the rise in awareness about Zero Trust Security, an incredible 66%…

By , November 14, 2018

Today Forrester Research released The Forrester Wave™: Privileged Identity Management, Q4 20181. Evaluating 11 vendors, Forrester named Centrify a Leader. Here at Centrify, we believe this is a strong validation of Centrify’s Zero Trust Privilege approach to privileged identity management. A complimentary version of this report is available for download here. Centrify is redefining the legacy approach to Privileged Identity Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a “never trust, always verify, enforce least privilege” approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the…

By , October 22, 2018

On October 29-30, Centrify will proudly sponsor the second SecurIT: the Zero Trust Summit for CIOs and CISOs in New York City. Produced by CIO and CSO from IDG in partnership with Centrify, the two-day event will focus on how to capitalize on the adoption wave of Zero Trust to stay ahead of the security curve. The summit will be held at the Grand Hyatt New York, which is the only hotel connected to the majestic Grand Central Terminal. It’s an amazing venue that visually stuns with ballrooms evoking the history and splendor of New York and its amazing skyline….