How Do You Choose the Right IAM Solution? Here Are 4 Questions You Should Ask

Cloud based services dominate today’s world and over the past few years, delivering cloud based IAM solutions is no exception. The right solution can reduce risk, cut down costs and save time, but choosing the right IDaaS vendor requires careful consideration. Putting together some basic questions to ask while covering several key elements is a first step. So…where do we begin? Is It a True Hybrid Solution? Ask your prospective vendor if they truly provide a hybrid solution with control and access across on-premises and SaaS-based applications. Federation for SaaS apps is a great first step, but larger companies will…

NIS Directive Compliance: It’s Just as Important as the GDPR

IT security managers have had plenty on their plate this year co-ordinating compliance efforts in advance of the forthcoming EU General Data Protection Regulation (GDPR). But while the sweeping new privacy law has dominated the headlines for the past year or more, there’s another important piece of regulation on its way from Brussels, that will apply specifically to “operators of essential services” (OES). It’s known as the EU directive on the security of Networks and Information Systems (NIS). With the same huge fines of up to £17m or 4% of global annual turnover levied for non-compliance, it’s vital that you…

6 Reactions to the Cisco 2017 Midyear Cybersecurity Report: Part 1

When reading this year’s “Cisco Midyear Cyber Security Report,” a few things jump out that bear discussion. Vendor Consolidation First, one of the key findings is related to the “fragmented security toolbox,” and from it, having so many point solutions solving for security gaps actually creates problems. If they are layered effectively, integrated fully and managed appropriately, point solutions are a winning approach. But when you look at the number of separate solutions that need individual attention to stay effective, the administrative burden deters from incident response plan. This leads to the report’s conclusion that consolidation of vendors limits this effect….

Centrify Wins PC Magazine’s 2017 Identity Management Solutions Editor’s Choice Award

PC Magazine recently published a review of the top 2017 Identity Management Solutions and we are pleased to announce that Centrify was one of only three vendors that received the Editors’ Choice Award! The Editors’ Choice is awarded annually to products/services that rise above similar products in their categories and the products under consideration have been reviewed by expert analysts in PCMag Labs. Specific features that were commended by PC Magazine were capabilities such as robust reporting, easy to use on-premises app, quick integration with user identities from social networks, and our risk-based authentication that leverages machine learning. Our user…

Centrify named “Overall Leader” in KuppingerCole IDaaS Leadership Compass

Centrify is pleased to announce that KuppingerCole Identity as a Service (IDaaS) Leadership Compass Report names Centrify “Overall Leader.” The report also highlights Centrify’s leadership in innovation, product features and market reach. KuppingerCole is a leading analyst covering Identity and Access Management (IAM). This report is the most current and comprehensive look at the IDaaS market, which is one of the fastest growing segments in the Security and Identity markets. According to Jeff Edwards of Solutions Review, The IDaaS market is exploding and it is predicted “that by 2020, 40 percent of IAM purchases will use the IDaaS delivery model,…

SPI: Centrify Professional Services are “Best of the Best”

Today, leading technology services research firm SPI named Centrify a 2017 Best-of-the-Best professional services organization. We were among 21 selected from a field of over 400 companies. SPI is a global research, consulting and training company that helps professional service organizations improve profit and productivity. The company’s PS Maturity Model™ planning and management framework has become the industry standard for service organizations. According to SPI, a key characteristic shared by this year’s winners was something Centrify genuinely strives for: A unique, employee-centric culture in an ethical work environment focused on customer satisfaction. It’s not easy to build, but it is…

What’s Next from Google Cloud: Scenes from Google Next

Google Cloud last week had their big event in San Francisco, gathering Partners, customers and Googlers alike to talk about Google Cloud and its bright future. Centrify was proud to sponsor this event, and we had a presence in the Partner Playground, which allowed us to visit with hundreds of Google Next attendees to understand what they were doing with Google Cloud. Of course we spoke with Centrify customers, Google customers and some prospective customers, but interestingly, most of these conversations were with those who are already using software as a service (SaaS) or identity as a service (IDaaS) today….

Modernizing Legacy Apps to Boost Security: Part II

As we discussed in part I of this article, many companies are still in the process of modernizing their legacy apps. There are a number of reasons to do this, but securing your environment is typically the main goal. We’ve already identified that a (software) token-based system as essential. Let’s continue with a couple more best practices. Provide for User Provisioning An application needs user data — not for authentication, but because it needs to know the role and responsibilities of the person logging in so that privileges inside the app can be managed and regulated. Therefore, a database of…

Gartner: Centrify Scores Highest for Workforce to SaaS Use Case

Gartner just released its “Critical Capabilities for Identity and Access Management as a Service” report, and we are proud to see that Centrify has scored the highest in the “Workforce to SaaS” use case. We believe this validates our unique ability to secure access to apps and infrastructure from any device for all users. Please have a look at a complimentary copy of the full report to see for yourself. Gartner defines the “Workforce to SaaS” use case as: …primarily driven by the need to extend basic IAM functions and serve employees accessing SaaS applications. We’re especially proud of this…

Shared Account Password Management in the Federal Government: Then and Now

One of my first consultant jobs involved installing agents on Unix servers, a procedure which required root access. I still remember the first time I was onsite at a military base to help a customer install the software because it was also my first experience with a physical vault that stored computer passwords. When it came time to enter in the root credentials, my client made a phone call, and then this other person comes in from down the hall, opens up a wall safe using a memorized combination and pulls out a folder. This person verifies my client’s badge…