Partner Corner

Partner Corner

Centrify shares perspectives from its growing global sales partner network and technology alliances network, and information about these partners – including its North America Channel Partner Network, and worldwide reseller and distribution partnerships.


By , June 13, 2018

The world has changed. I’m not sure if it was the HBO breach, Equifax, Yahoo, or one of the many breaches since, but after one of those we at Centrify realized it was one breach too many. As we looked at how the breaches were increasing in number, size, and severity we knew we had to do something different. How could we better protect our customers who are struggling under the weight of thousands of passwords and hundreds of ways to access applications/devices/servers? The answer lies in Zero Trust Security. The idea that we can no longer trust anyone attempting…

By , January 3, 2018

Centrify has been busy building innovative technology and powerful partnerships. This post will talk about a longtime partnership, cool tech, and a deeper level of integration. Centrify and Yubico have been partners for more than three years already and work together with joint customers, in the field, and at a corporate level. Centrify and Yubico U2F Integration To further its move towards a Zero Trust Security Model, Centrify joined the FIDO (Fast IDentity Online) Alliance and strengthened its integration with Yubico. Centrify Identity Services now provides support for the FIDO Alliance’s Universal 2nd Factor (U2F) specification, an authentication standard designed to…

By , December 12, 2017

Whenever I speak about IT security vendor consolidation, I am encountered by confusion-ridden looks from the business fraternity. Businesses are grappling with the challenge of selecting an appropriate security vendor(s) in such an ever-changing IT environment — zero-ing on single vendor’s capabilities does not appear to be the right approach! Information technology has come a long way, and the development has been paralleled with security considerations. For each IT capability there is a security layer to top it up with. Multiple vendors support is like multiple mini IT Security workshops, running 24×7, following their own innovative trouble shooting when a…

By , December 6, 2017

Over the past few months, it seems Centrify can’t escape the winner’s circle. This all began with positive recognition from revered industry analyst firm Forrester when they positioned Centrify as leaders in both of the Privileged Identity Management and recent IDaaS Waves. In fact, we are the only identity vendor who appears in both Waves, let alone be positioned as leaders in both. The winning streak continues! Centrify is proud to announce that we have been selected to join the Box Trust ecosystem. To show real dedication in keeping their customers’ data safe, Box has assembled a network of hand-selected…

By , October 2, 2017

As CEO Tom Kemp mentioned in his recent blog post, Centrify has reengineered its annual user group event to more comprehensively tackle the many security issues facing organizations today. As the thought leader partner for CyberConnect 2017, ICIT has spent the last several months building a powerful curriculum which will empower business and technical leaders tasked with defending their organizations from digital threats. The result is a program that will inspire, educate, and ultimately help bring order to organizations developing strategies to survive in today’s cyber kinetic meta war. At ICIT, we believe we’ve entered a new paradigm where old…

By , May 10, 2017

Owing to lack of strategic foresight or sheer laziness, security has traditionally taken a back seat in IT Systems integrations. Lack of security foresight in IT endeavors can impact businesses in the course of time, thus it is recommended to look into security related aspects from the very start — be it at the time of integration, upgrades or migration of IT tool or solutions. Nowadays, security considerations such as in Software Development Life Cycle are integrated into each layer of technology engagement. With that backdrop, security loopholes and cyber vulnerabilities are becoming complex, leading to obstructing identity, data and information…

By , May 2, 2017

Well, maybe we should start with, “What is innovation management anyways?” At its most basic, it is the purposeful organization and management of ideas within an organization to create meaningful change. Companies use it to gather new product ideas, improve processes and discover new markets and business models. The White House used innovation management processes to cut government spending, Home Depot used this process to identify new product lines, and the DREAMS Challenge used innovation management software to fund new projects that would halt the spread of HIV (just to name a few). But if innovation management often starts by…

By , April 25, 2017

One of the things I love about partnering with Amazon Web Services is how often they are in front of their user community. In addition to their large, annual user conference called RE:Invent, AWS hosts several smaller regional summits throughout the year. As an APN partner, Centrify had the opportunity to participate in last week’s AWS Summit in San Francisco. We were lucky to be able to visit with a nice cross-section of AWS users — users across multiple industries, many of which were in the Fortune 1000. It was great meeting with these organizations and across the board, companies…

By , December 8, 2016

With over 320,000 customers worldwide, SAP is one of the most critical business applications in the market. Because of the information that it contains, it is also one of the most targeted applications and systems for cyberthreats. Over the past few years, the SAP landscape has expanded beyond legacy ERP systems into technologies such as cloud, mobile, big data and the Internet of Things (IoT), while at the same time broadening the attack surface for SAP applications. According to a Ponemon Institute survey released earlier this year: Two of three SAP platforms were likely breached between 2014 and 2015. 75%…

By , October 11, 2016

I am excited to blog about our new association with the global cybersecurity awareness campaign STOP. THINK. CONNECT.™, which teaches digital citizens how to stay safer and securer online. Centrify always looks to align itself with like minded organizations and individuals as part of its global mission to protect companies and their users from cyberthreats. These organizations include the founders of STOP. THINK. CONNECT.: the National Cyber Security Alliance (NCSA), the APWG and the U.S. government, including the White House. The Department of Homeland Security leads the federal engagement in the campaign. Centrify is proud to work with these organizations, as well as the other 700+ members,…