Stay Secure With Day One Support for iOS 11 and macOS High Sierra

It’s that time of year again: time for all the latest and greatest from our friends in Cupertino. Last week, Apple released iOS 11 and this week Apple released the latest update for macOS, the 10.13 High Sierra release. We here at Centrify are excited for the new capabilities, new look of iOS 11 and the significant performance improvements with macOS High Sierra; so, we have made sure that our customers are able to move forward with day one support for both offerings. Our day one support for is effective across the product line, including our Centrify Endpoint Services, Centrify…

Reflecting on Centrify’s Rethink Security Approach

In the last 12 months, Centrify is the only company to be acknowledged for it’s  vision and leadership in the Gartner Magic Quadrant for Identity and Access Management-as-a-Service,  The Forrester Wave: Privileged Identity Management, and in the Gartner Critical Capabilities for IDaaS Research for Workforce to SaaS, 2016. These acknowledgements demonstrate our growing influence in the industry with a unique point of view for customers who recognize the increased value in securing access for all enterprise identities in one, built from the ground up platform vs. the point solutions offered by others in the industry. Our mantra has been and…

Centrify Invests in Educating Cyber Leaders on Cutting Edge Defenses

As a leader in the industry, we at Centrify feel it is our corporate responsibility to provide truly objective thought leadership, education and guidance to empower cyber security leaders with the tools necessary to defend against digital adversaries. To support this goal, I’d like to invite you to CyberConnect, a two day security conference convening executives from some of the world’s biggest organizations in New York City November 6 and 7th. We have one simple, yet powerful motivation behind CyberConnect: To educate and better secure the companies, people and data within the critical infrastructure of the country. It is undeniable…

Addressing the Top Five App Risks in Business

It’s a time of conflict There’s a battle within businesses, and the battleground is your applications. Employees – in the name of productivity – are adopting new cloud and mobile applications every day.  IT – in the name of security – is trying keep private data secure against breaches. Both groups often think the other “doesn’t get it.”  Users complain about complex password policies, and security-related “hoops” they have to jump through.  IT complains about endless helpdesk calls for password resets, shadow IT introducing risk, and an inability to secure an ever-changing hybrid environment. But both groups have more common…

Modernizing Legacy Apps to Boost Security: Part II

As we discussed in part I of this article, many companies are still in the process of modernizing their legacy apps. There are a number of reasons to do this, but securing your environment is typically the main goal. We’ve already identified that a (software) token-based system as essential. Let’s continue with a couple more best practices. Provide for User Provisioning An application needs user data — not for authentication, but because it needs to know the role and responsibilities of the person logging in so that privileges inside the app can be managed and regulated. Therefore, a database of…

SSO for Cloud-Based Apps a Key to Collaboration Success for Shiseido

At the end of last year, PC Magazine published an article about the five collaboration trends to expect in 2016. The article stated that, “Distributed teams have more ways than ever to communicate and collaborate in real time, and 2016 is set to bring another wave of innovation around cloud-based connectivity, cross-platform integration, and next-generation multimedia conferencing.” They were pretty accurate. Collaboration between employees and contractors — working from anywhere but the office – is more common every day. And, as the article predicted, “cloud-connected everything” (the #2 trend) and “seamless interoperability” (#4) are the name of the game. But building a truly collaborative…

Five Steps to Stay Secure in the Mobile Age

Least surprising note of the day: I am a huge geek. See my picture up there? Nerd beard. Enough said. My current geek obsession is focused on mobile devices. I just upgraded my fantastic and near-new Google Nexus 6P to a Google Pixel XL. Why? Because NEW PHONE. And Google AI Assistant. But mostly, NEW PHONE. And if you’re wondering, it is indeed a fantastic device, and of course it’s secured by Centrify. I had the new phone shipped to me here at work, so I could “move in” right away. As I compared the new and old devices, and…

Centrify Expands It’s Developer Program to Make it Easier to Add MFA, SSO and Access Control to Apps

Single sign-on, social login, multi-factor authentication (MFA), password reset and access control can now be easily integrated into cloud, mobile and behind the firewall apps from third party developers by integrating Centrify APIs. Application developers are in a modern day wonderland where they can build multifaceted and intricate apps that function across user devices without having to build much computing or coding infrastructure.  It is now taken for granted that developers tap into well known APIs like Twitter, Facebook, Google or eBay to enrich their apps with new layers of context, function and integration. The API economy essentially allows developers to outsource some…