Today’s Predictions for Tomorrow’s Internet: How To Keep Your Smart Devices Safe

When you first hire a personal assistant, they’re not all that helpful. Over time, they learn your daily routine, your needs and desires, and with that information, they make your life easier. Now, consider that your smart phone has morphed into your own mini personal assistant. Today’s smartphones are filled with potent sensors that collect data about you. Audio and image sensors, touch sensors, acceleration sensors, light, proximity, and location sensors all help your smartphone to get to know you and your habits. It knows where you go, when you go and how long you stay. It knows who you…

Stay Secure With Day One Support for iOS 11 and macOS High Sierra

It’s that time of year again: time for all the latest and greatest from our friends in Cupertino. Last week, Apple released iOS 11 and this week Apple released the latest update for macOS, the 10.13 High Sierra release. We here at Centrify are excited for the new capabilities, new look of iOS 11 and the significant performance improvements with macOS High Sierra; so, we have made sure that our customers are able to move forward with day one support for both offerings. Our day one support for is effective across the product line, including our Centrify Endpoint Services, Centrify…

How Do You Choose the Right IAM Solution? Here Are 4 Questions You Should Ask

Cloud based services dominate today’s world and over the past few years, delivering cloud based IAM solutions is no exception. The right solution can reduce risk, cut down costs and save time, but choosing the right IDaaS vendor requires careful consideration. Putting together some basic questions to ask while covering several key elements is a first step. So…where do we begin? Is It a True Hybrid Solution? Ask your prospective vendor if they truly provide a hybrid solution with control and access across on-premises and SaaS-based applications. Federation for SaaS apps is a great first step, but larger companies will…

Post-Brexit Data Flows: Why There’ll be No Place for UK Firms to Hide from GDPR

As with most aspects of the EU, unhindered cross-border data flows are something most U.K. firms just take for granted these days. Thanks to the cloud, huge volumes of corporate data is stored in third party providers’ data centres, frequently not even in the UK. Aside perhaps from those in highly regulated sectors, corporate users don’t think twice about accessing that data, and sending it to and from partners and customers on the continent. However, the U.K.’s departure from the world’s biggest trading bloc raises new questions about the legality of such transfers. In a new report, the House of…

Cyber Security that Pays for Itself in Australia

Centrify’s identity management platform is a unique product in the Australian cyber security market because of its ability to pay for itself through improved business productivity. Many customers are surprised to discover Centrify’s “secret sauce” — the value it releases through improved business process efficiency, which delivers a prompt payback. In fact, Centrify stands out as a leading identity management product that saves companies time and money in the on-boarding process, especially in relation to BYOD (Bring Your Own Device) use. In the cyber security space, when a CEO asks the age-old question, “is this product going to make me…

Mobile Device Management: Your Phone or Mine?

My phone currently sits in my pocket, and as I write this blog, it vibrates silently — reassuring me that I have not lost it, providing updates from friends and family and reminding me of emails and chats I still need to respond to. Because of the inherent convenience and increased productivity they provide, our phones have become indispensable. It’s no wonder company leadership typically embraces the idea of a mobile-enabled workforce. However, mobile access should be tempered by the current security landscape, where the perimeter has shifted to the cloud. Security teams should take note that even with large investments,…

Mirai Lingers, Passwords Fail as IoT Devices Proliferate

A few weeks ago, the Wall Street Journal ran a story about a laundromat in Carbondale, Colorado that was infected with the Mirai internet virus. Unbeknownst to the business owner, an internet-connected video recorder had been infected and was scanning the web for places to spread itself. The only sign that something was amiss was the fact that the device was regularly acting up — disconnecting the remote viewing app and forcing the owner to reconnect it by restarting the digital video recorder. While the story didn’t reveal any new developments, it does serve as an important reminder that malware…

New Trend in the Security Space: Customers Want Vendor Consolidation and a Platform Approach

Starting late last year, I kept on hearing a growing drumbeat from customers that they were highly interested in consolidating the breadth of security vendors and products that they use internally to secure their enterprise. In past years, the talk by customers regarding “vendor consolidation” typically had been more in terms of the purchasing process and not having to deal with getting contracts and negotiating with yet another vendor. This time it was different — it has become clear to customers that having disjointed point solutions leave significant air gaps with regard to securing their enterprise, and that customers are…

Top 3 Takeaways from the 2017 RSA Conference

Last week was the 2017 RSA Conference in San Francisco. Having attended, I can report that the number of vendors at the conference was nothing short of mind-boggling. While there are many challenges facing the security industry, there are also a lot of innovative ideas about how to respond to them. Here are my top takeaways from the conference: #1 Organizations Should Consolidate Security Vendors While it was great to see so many vendors at RSA, it was also indicative of just how many point security tools are on the market today — many of which provide very specific solutions…

Ponemon 2017 Report: The Need for a New IT Security Architecture

It’s annual cybersecurity reporting season and first up in 2017 is the Ponemon Global Study, “The Need for a New IT Security Architecture” sponsored by Citrix. The study reveals global trends in IT security risks and reasons why security practices and policies need to evolve in order to deal with threats from disruptive technologies, cybercrime and compliance. Changes in the workplace and problems managing IT security are also increasing risks to the organization. This report surveyed more than 4000 global IT and security practitioners and discusses the findings that concern risks created by cybercrime, employee negligence and organizational dysfunction and…