Driving Cloud-Based Agility at Rémy Cointreau with Centrify

Business requirements and information security priorities have always had a tough time aligning. It’s even become something of a cliché these days to say that security is a block on agility, productivity and growth. Yet it doesn’t have to be that way. Rémy Cointreau’s recent collaboration with Centrify is a great example of how, when implemented correctly, security can actually support the business: in this instance, our move to a more agile, cloud-based infrastructure.  On the opening day of Infosecurity Europe in London, I explained to a packed audience exactly how the Centrify Identity Service is helping our employees work…

Strategically Moving Towards a Secure Hybrid IT

Owing to lack of strategic foresight or sheer laziness, security has traditionally taken a back seat in IT Systems integrations. Lack of security foresight in IT endeavors can impact businesses in the course of time, thus it is recommended to look into security related aspects from the very start — be it at the time of integration, upgrades or migration of IT tool or solutions. Nowadays, security considerations such as in Software Development Life Cycle are integrated into each layer of technology engagement. With that backdrop, security loopholes and cyber vulnerabilities are becoming complex, leading to obstructing identity, data and information…

Cyberthreats to SAP Require a Next-Generation Identity Platform

With over 320,000 customers worldwide, SAP is one of the most critical business applications in the market. Because of the information that it contains, it is also one of the most targeted applications and systems for cyberthreats. Over the past few years, the SAP landscape has expanded beyond legacy ERP systems into technologies such as cloud, mobile, big data and the Internet of Things (IoT), while at the same time broadening the attack surface for SAP applications. According to a Ponemon Institute survey released earlier this year: Two of three SAP platforms were likely breached between 2014 and 2015. 75%…

SSO for Cloud-Based Apps a Key to Collaboration Success for Shiseido

At the end of last year, PC Magazine published an article about the five collaboration trends to expect in 2016. The article stated that, “Distributed teams have more ways than ever to communicate and collaborate in real time, and 2016 is set to bring another wave of innovation around cloud-based connectivity, cross-platform integration, and next-generation multimedia conferencing.” They were pretty accurate. Collaboration between employees and contractors — working from anywhere but the office – is more common every day. And, as the article predicted, “cloud-connected everything” (the #2 trend) and “seamless interoperability” (#4) are the name of the game. But building a truly collaborative…

How Centrify Can Help AWS Customers Comply with New HIPAA CSP Regulations

New HIPAA regulations are driving heightened security around electronic protected health information (ePHI) and Cloud Service Providers (CSP). These regulations detail the types of security for data in the cloud, as you might expect, but they also focus on securing and controlling the access to cloud systems, infrastructure and data. In the simplest terms, this means healthcare companies and their business associates (BA), need to focus on securing and managing resources IN the cloud, as well as securing and managing access TO the cloud. This can be broken down to mean that healthcare companies need to: Ensure cloud resources are…

How To Prevent Cybercrime: CFO Insights for Mid-Market and SMB Companies

Cybersecurity Risk From the Break Room to the Board Room How can CFO’s enable an organization to effectively combat cybercrime, while reducing IT security budgets? If this sounds too good to be true, let me explain how it can be done. Cyber risk is present at every level in every company from the break room to the board room. In retail, data breaches occur in companies of every size; from Yellowfront, a one-store grocer in Maine to the massive Home Depot and Target breaches. Cyber awareness of social engineering attack modes is a management priority, and all employees have responsibility in preventing…

The Government Cloud is Coming

If you’re like me, you’ve been hearing the phrase, “the cloud is coming” for years before you ever learned that winter was too. I never read any of the books, which first came out in 1996, so it wasn’t until the Game of Thrones TV series started in 2011 that I first heard the phrase “winter is coming.” So, when did I start hearing of the cloud’s inevitability? For me, the “cloud” started when people began insisting that it didn’t really exist, like Oracle’s Larry Ellison did back in 2008. And I distinctly remember thinking that ‘ol Larry had a point….

Cloudbound? How to Secure Your Migration to AWS

I’ve always enjoyed hearing grand stories of moving workloads to the cloud. This allows sharing resources you no longer have to manage and you gain access to all the processing power needed to finish jobs in an efficient manner. The best part is that you pay only for what you use. This explains Amazon Web Services (AWS) Elastic Compute Cloud (EC2) success.  In simple terms, move workloads to the cloud and you’ll be happy! This is awesome — yet, there is one question I often have. How will you secure this? Verizon’s 2016 Data Breach Investigations Report states 63% of data breaches involve compromised passwords. Amazon knows this and has done a fine job of building a…

Using the Centrify Developer Platform

As my colleague Ben points out, the world of software has become one of interoperability and interaction through APIs.  Using libraries and APIs to construct a user experience is no longer the specialized domain of ISV’s building something specific and targeted at a distinct set of users.  Instead, everyone from application developers to IT and security professionals regularly look to integrate directly with the products they use at a programmatic level. For IT and security professionals, the ability to tightly integrate and leverage a vendor’s product as a tool in their own workflow is paramount to their ability to service customers, whether it is…

Forrester Study: Managing Privileged Access Security in a Hybrid IT World

We recently commissioned a Forrester study to find out how IT decision makers deal with privileged access security in hybrid IT environments. The survey tested the hypothesis that as organizations open up access to remote users and move more of their workloads to the cloud, their privileged identity management (PIM) solutions should also move to the cloud. The results are in! Having a PIM solution that is purely on-premises is no longer enough to secure privileged access to hybrid infrastructure and applications. The survey data shows that 92% of organizations are either currently outsourcing, or planning to outsource at least one…