Centrify named a Visionary in brand new Gartner Access Management Magic Quadrant

Centrify has been identified by Gartner, Inc. as a visionary in the 2017 Magic Quadrant for Access Management. Centrify received the honor for our ability to execute and our completeness of vision, which is evaluated based on a deep understanding of the industry, product innovation, and marketing, sales, and geographic strategy. At a time when cyber breaches are rising in volume and velocity, Centrify represents a massive rethink of security. It is the only complete platform that stops breaches through a trifecta of Identity Services for applications, endpoints and infrastructure — both on premises and in the cloud. Unlike other…

Time to Ditch Passwords: Taking the Centrify Message to Infosecurity Europe

London Olympia will again be the venue this week as experts from around the world flock to the capital for the annual Infosecurity Europe show. With over 13,000 visitors expected over the three days, this is one of the biggest industry events around. Centrify will be there on Stand C65 to share why we think our range of advanced identity services are the only way IT leaders can secure their hybrid enterprise against modern threats. Attendees also have a great opportunity to hear first-hand from customer Remy Cointreau on the challenges of becoming a more secure and agile organisation through…

How Can User Behavior Analytics Kill the Password?

Last time, I wrote about adaptive authentication and briefly touched on behavior analytics being an integral part of adaptive authentication. For true behavior analytics, you need some smart AI powered multi-factor authentication (MFA). Now, if you think about it and put the pieces of the puzzle together you might be able to kill passwords altogether. Wouldn’t that be nice? You no longer need to remember any passwords and all you need is access to one of your MFA tools when authenticating. With the increased use of smart phones and other devices for MFA, businesses now more than ever have the…

Am I Affected by the European General Data Protection Regulation?

It’s a year until the biggest shakeup to Europe’s privacy laws in nearly a generation takes effect. The European General Data Protection Regulation (GDPR) will bring sweeping new rules into force, including new consumer rights over how personal data is used, and mandatory 72-hour data breach notifications. Yet there’s still confusion over which companies and what types of data are covered by the law. With firms currently complying with less than 40% of GDPR principles on average, time is running out. That’s why Centrify is running a new monthly blog series designed to raise awareness about the GDPR, as the clock…

What is Adaptive Authentication?

Adaptive Authentication: Why Should You Care? Before going into what adaptive authentication is I want to answer why you should care first. In today’s IT world, relying on a simple username and password authentication is not enough to protect critical business data and systems against the growing number of sophisticated cyber attacks. Just do a quick search online or have a look at one of my previous blogs, “How Much Does It Cost to Protect an Organization from Cybercrime?” to get an idea of how expensive a hack can be and how sophisticated attacks have become. That ever-growing number of…

Why Organizations Need Adaptive Multi-factor Authentication (MFA)

We hear about high profile security breaches frequently. Most of these breaches exploit the system login credentials of end users to get into the company’s network. Leading organizations are recognizing this and are beginning to focus on better securing end user identities. Multi-factor authentication (MFA) is becoming a very popular method for doing this as MFA requires a user to provide more than just a password to access the network. These additional factors of authentication require the user to provide something that only the user knows, has and is. As a best practice, when implementing MFA, it should be setup across…

3 Ways to Ensure You Are Not the Next Company Breached

There is a superstition that bad things happen in “threes.” This month, we mourned the loss of three national icons — Astronaut, John Glenn, Actor, Alan Thicke and TNT Sideline Reporter, Craig Sager. Similarly, this week, I received an email from Yahoo! announcing they had been breached again — affecting over 1B users — including me. On Friday, I received another notification from Bleacher Report, informing me that their users had been compromised. Do you see where this is going?… STOP! Is this Superstition True? The short answer is No. Are superstitions true? Most rational people would agree that they…

How to Prevent Another SFMTA Ransomware Attack

By now, many have heard about the recent ransomware attack against the San Francisco’s “Muni” system on Black Friday where the hacker locked out the railway’s system and demanded 100 BTC as payment. The second, less known, part of the story was published by Brian Krebs on his blog yesterday: “On Monday, KrebsOnSecurity was contacted by a security researcher who said he hacked this very same cryptom27@yandex.com inbox after reading a news article about the SFMTA incident. The researcher, who has asked to remain anonymous, said he compromised the extortionist’s inbox by guessing the answer to his secret question, which then allowed him to reset the attacker’s…

Achievement Unlocked! Multi-factor Authentication Everywhere

I was recently talking to a CISO for a major airline. We had been discussing innovations in security, when he sighed and said that his budget was strong, but employees were overwhelmed by the constant barrage of breach news. This resulted in a user base that was slow to adopt, and didn’t feel a personal sense of agency in many security solutions. We had been discussing some pretty behind-the-scenes solutions, and it was actually his idea that we move to something much more “in your face” for employees. Something that lets them take a proactive part in security. Something that…