Mobile Frontier

Mobile Frontier

Mobile platforms are the de-facto end points for accessing enterprise information and cloud apps. Centrify’s industry experts discuss important information and topics for any organization with users accessing information from mobile devices.


By , September 26, 2017

It’s that time of year again: time for all the latest and greatest from our friends in Cupertino. Last week, Apple released iOS 11 and this week Apple released the latest update for macOS, the 10.13 High Sierra release. We here at Centrify are excited for the new capabilities, new look of iOS 11 and the significant performance improvements with macOS High Sierra; so, we have made sure that our customers are able to move forward with day one support for both offerings. Our day one support for is effective across the product line, including our Centrify Endpoint Services, Centrify…

By , June 6, 2017

My phone currently sits in my pocket, and as I write this blog, it vibrates silently — reassuring me that I have not lost it, providing updates from friends and family and reminding me of emails and chats I still need to respond to. Because of the inherent convenience and increased productivity they provide, our phones have become indispensable. It’s no wonder company leadership typically embraces the idea of a mobile-enabled workforce. However, mobile access should be tempered by the current security landscape, where the perimeter has shifted to the cloud. Security teams should take note that even with large investments,…

By , January 30, 2017

Before we go into how Multi-factor authentication (MFA) has changed, let’s have a quick look at what MFA is. With MFA, users must provide two or more “factors” of authentication when they access applications, networks and resources. MFA implementations use a combination of the following factors: Something you know: such as a username, password, PIN or the answer to a security question. Something you have: such as a smartphone, one-time pass token or smart card. Something you are: biometrics like your fingerprint, retina scans or voice recognition.   Now that we understand what MFA is, I’d like to point out that in today’s IT…

By , November 2, 2016

The Growing Threat of Mobile Malware The world’s projected population by 2020 is 7.8 billion people. By 2020, the expectation is that the population will have 11.6 billion mobile-connected devices, more than 1 device per person. As a result, mobile malware is becoming an increasing threat as cybercriminals seize the opportunity to access personal information for monetary gain and damage to both personal and business reputation. The proliferation of mobile devices has meant that mobile security risks are growing by the day, and businesses are recognising the increased threats they present to sensitive information as more and more companies allow…

By , June 20, 2016

Recently, when I was watching ESPN, it played a humorous bit involving NFL insider Adam Schefter’s kitchen shaking as if experiencing an earthquake, only instead it was just the cumulative rattling and vibrating from his 5 or 6 cell phones on the table. Of course the engineer in me immediately noted the impracticality of someone needing so many smart phones; however, this was not always the case in the early days of mobile computing. I met plenty of IT folks during the late 90’s who carried multiple cell phones and multiple pagers, since this was before true “smart” technology put a…

By , February 23, 2016

What is a derived credential anyway? You may have heard that Centrify announced support for “derived credentials,” in conjunction with its smart card offering. If you aren’t in the federal or ultra-secure enterprise space, you’ve probably never heard of derived credentials. So what’s so special about it? Users that are issued smart cards as their primary means of authentication have to physically insert a card into a reader on their desktop/laptop and then enter a PIN. This form of authentication replaces the username and password, and also covers the 2-factor requirement as well. (The card is something you have, and…

By , December 17, 2015

I just got back from the Gartner IAM Summit in Las Vegas. As always, it was a great summit chockfull of impressive speakers, informative content and valuable networking opportunities. In many of the sessions that I attended, a common theme was the convergence of identity and mobility. It was great to hear Gartner validating what we at Centrify have believed for quite some time. In fact, we were the first to deliver an integrated Identity-as-a-Service (IDaaS) and Enterprise Mobility Management (EMM) service back in 2012. Back then IDaaS and EMM were very distinct markets addressing different customer problems. So, why did we…

By , November 25, 2015

Last week I attended an executive forum hosted by Centrify and our partners, Google and Vox Mobile. We had a great lineup of speakers, including Andrew Toy (Android for Work Product Management Director), Jim Haviland (Chief Strategy Officer of Vox Mobile) and our very own Bill Mann. As the speakers shared their perspectives and insights on where mobility is going and what’s needed to get there, a few things really hit home for me. Mobility ≠ the latest phone or email We’ve only just scratched the surface of how mobility can truly transform business. Yes, email and other productivity apps…

By , November 5, 2015

I’ve worked in security companies nearly my whole career, so I understand why building security into our solutions is important. However, for some it can be a challenge, because the details of security can sometimes be complicated and difficult to understand. It’s our job as a security company to make these things easier to understand, but also to make sure security is something that “just works,” and isn’t a reactive function. Let’s talk about an example that should make this more clear. Recently, the team here at Centrify alerted me to a news report that a security researcher, Lookout, had…

By , October 21, 2015

It’s Halloween time, which means new candy from Google in the form of Android 6, and a few new Nexus devices (this time with fingerprint readers). The mobile team at Centrify has also been hard at work on some really great features — some of which work to manage and secure some of the fancy new capabilities of the new Android devices. It’s all in the hands In the November release, we will have full support for the new native fingerprint readers that should become ubiquitous on Android devices over the coming year.  Google is banking on this fingerprint technology being…