What To Consider While Selecting a Single Endpoint Security Vendor?

Whenever I speak about IT security vendor consolidation, I am encountered by confusion-ridden looks from the business fraternity. Businesses are grappling with the challenge of selecting an appropriate security vendor(s) in such an ever-changing IT environment — zero-ing on single vendor’s capabilities does not appear to be the right approach! Information technology has come a long way, and the development has been paralleled with security considerations. For each IT capability there is a security layer to top it up with. Multiple vendors support is like multiple mini IT Security workshops, running 24×7, following their own innovative trouble shooting when a…

Zero-Trust Model: Never Trust, Always Verify

“Never trust, always verify” is the lingo floating around in the security world. It succeeds the traditional belief of “trust, but verify,” which places a fair amount of trust in the people and devices accessing resources within a protected network. Surely, with massive data breaches happening regularly, we know that network perimeters are not as robust as we once thought. Attackers use weak or stolen credentials to gain access a network as a legitimate user. When an attacker has breached the network perimeter, we also know they are able to move laterally to more valuable assets and data that are…

6 Reactions to the Cisco 2017 Midyear Cybersecurity Report: Part 1

When reading this year’s “Cisco Midyear Cyber Security Report,” a few things jump out that bear discussion. Vendor Consolidation First, one of the key findings is related to the “fragmented security toolbox,” and from it, having so many point solutions solving for security gaps actually creates problems. If they are layered effectively, integrated fully and managed appropriately, point solutions are a winning approach. But when you look at the number of separate solutions that need individual attention to stay effective, the administrative burden deters from incident response plan. This leads to the report’s conclusion that consolidation of vendors limits this effect….

Four Things You Don’t Know About Cybersecurity… That You Should

Ponemon Institute recently conducted a survey, sponsored by Centrify, designed to more deeply understand the current state of cybersecurity. The Impact of Data Breaches on Reputation & Share Value: A Study of U.S. Marketers, IT Practitioners and Consumers examines differing perspectives across a number of security topics. I’d like to focus on IT professionals at this time, as I believe the results are enlightening, to say the least. 43 Percent of IT practitioners said their organization had a data breach involving sensitive customer or business information in the past two years. This tells us that more than one in five organizations…

Centrify Wins PC Magazine’s 2017 Identity Management Solutions Editor’s Choice Award

PC Magazine recently published a review of the top 2017 Identity Management Solutions and we are pleased to announce that Centrify was one of only three vendors that received the Editors’ Choice Award! The Editors’ Choice is awarded annually to products/services that rise above similar products in their categories and the products under consideration have been reviewed by expert analysts in PCMag Labs. Specific features that were commended by PC Magazine were capabilities such as robust reporting, easy to use on-premises app, quick integration with user identities from social networks, and our risk-based authentication that leverages machine learning. Our user…

Breaches Rank in Top Three Negative Impacts on Brand Reputation – Above CEO Scandal

A recent Ponemon Institute study set out to examine the attitudes and perspectives of three key stakeholder populations inside a business environment: Marketing practitioners, IT practitioners and consumers. A key objective of the Centrify-sponsored study was to understand the impact of a data breach on a company’s customers, stock price and overall brand reputation. Among the survey’s key findings: A data breach now outranks a scandal involving the CEO in terms of adverse impact on a company’s reputation. In fact, breaches ranked in the top three most negative events, following shoddy customer service and an environmental incident. Negative Affects on…

Cyber Security that Pays for Itself in Australia

Centrify’s identity management platform is a unique product in the Australian cyber security market because of its ability to pay for itself through improved business productivity. Many customers are surprised to discover Centrify’s “secret sauce” — the value it releases through improved business process efficiency, which delivers a prompt payback. In fact, Centrify stands out as a leading identity management product that saves companies time and money in the on-boarding process, especially in relation to BYOD (Bring Your Own Device) use. In the cyber security space, when a CEO asks the age-old question, “is this product going to make me…

FedRAMP Compliance: Beyond the Letter of the Law

When I mention “compliance” to most people, I often get that cringe — the one that says “ugh, what a pain.” I’m empathetic to folks who are just trying to get the job done, and whose only interaction with compliance is being told somewhere along the line that they have got to jump through more hoops. But having lived information security for several years, and having previously had some experience with risk frameworks and compliance efforts, I’ve developed a different viewpoint. My colleagues in security immediately understand and connect with the statement that with compliance, “there is the letter of the…

Impact of Data Breaches on Reputation & Share Value (Hint: it’s HUGE)

Effective cyber risk management starts with the C-suite and belongs in the boardroom Wow, this last Friday and over the weekend we have heard about the massive cyber attack infecting thousands of organizations with ransomware in over 75 countries. In Britain, dozens of hospitals and National Health Service providers were crippled. While the ransomware was only demanding $300 worth of bitcoin the impact of the attack saw thousands of appointments canceled, phone lines down and patients turned away. Today, a brand new Ponemon study, sponsored by Centrify, was released and examines the impact of data breaches on reputation and share…

Strategically Moving Towards a Secure Hybrid IT

Owing to lack of strategic foresight or sheer laziness, security has traditionally taken a back seat in IT Systems integrations. Lack of security foresight in IT endeavors can impact businesses in the course of time, thus it is recommended to look into security related aspects from the very start — be it at the time of integration, upgrades or migration of IT tool or solutions. Nowadays, security considerations such as in Software Development Life Cycle are integrated into each layer of technology engagement. With that backdrop, security loopholes and cyber vulnerabilities are becoming complex, leading to obstructing identity, data and information…