Secure Identity to Protect Your Reputation

Reputation is built on trust – yet the paradox in the age of access is that the only way we can build trust is to eschew it. That age-old tool of identification–the password–no longer provides any level of security and, in fact, depending upon a password for protection is probably the worst mistake one can make. Likewise, relying on technology alone, such as firewalls, malware detectors and anti-virus programs, can create a false sense of security that often causes more problems than it solves. LESSONS FROM AUSTRALIA If you doubt that assumption, look at the volume of business disruption that…

Real-Life Exposed Privileged Identity Theft

Have you ever had your identity stolen? Credit cards obtained under your name that were not yours? Most of us have, and what a pain it can be to stop excess charges, get reimbursed, close down those accounts, and repair your damaged credit. It can take years to recover from such an invasion. While we know what it’s like in our personal lives, many of us don’t pay attention to the damage that could be caused in our professional careers, especially with privileged accounts like database access. One reason for this disconnect is because the breaches typically are not financial…

Frost & Sullivan Recognizes Centrify for IDaaS and PIM Leadership

Today Frost & Sullivan, a leading analyst firm and growth partnership company, announced that Centrify has earned the North American Product Leadership Award for its Next-Gen Access Solution for Zero Trust Security. The report specifically noted Centrify’s success as a security company comes by challenging traditional approaches to security and using a unique philosophy to address the problem. Centrify helps its customers identify and follow a set of best practices that are grounded in Zero Trust Security—through verifying all users, validating their devices, and limiting access and privilege—to reduce risks related to breaches. The author of the report, Sankara Narayanan,…

C-Suite Disconnect is Weakening Cybersecurity

Today, Centrify announced a new research study conducted with Dow Jones Customer Intelligence titled, “CEO Disconnect is Weakening Cybersecurity.” The report sheds light on what’s going on inside the enterprise that’s enabling significant increases in the number of successful, high-profile breaches. At Centrify, we see Zero Trust Security as the most promising cybersecurity model to emerge in decades, and as the solution to the majority of these breaches. We’ve designed our solutions to help organizations adopt a Zero Trust Security model through a single platform consisting of Identity-as-a-Service (IDaaS), multi-factor authentication (MFA), enterprise mobility management (EMM) and privileged access management…

Centrify Identity Services: Securing Docker and Containers

Introduction We are excited to announce that Centrify now supports CoreOS Container Optimized Linux which several of our customers are using as part of their adoption of containerization for their application deployments. But first, let’s start with an overview of how Centrify can help you protect access to these containerized platforms and the applications that run on them. As organizations embrace hybrid cloud environments moving their applications and other workloads to public clouds such as AWS, Azure and Google, application developers building custom apps inevitably rework their applications to take advantage of the hosting platform capabilities such as auto-scaling enabling…

Centrify Announces Infrastructure Services 2017.3

I hope everyone is enjoying a happy and prosperous holiday season. It’s been another very good year at Centrify. We’re growing, we’re the only vendor in the world to hold three simultaneous leadership positions in PIM and IDaaS, and we’re focused (as always) on the thing that makes our company great — our customers. We’re finishing up the last round of updates for Centrify software and services in the calendar year of 2017. This week, I’m happy to announce the general availability of Centrify Infrastructure Services (CIS) 2017.3. CIS is the product formerly known as Centrify Server Suite. The 2017.3…

Centrify Selected as a Box Trust Partner

Over the past few months, it seems Centrify can’t escape the winner’s circle. This all began with positive recognition from revered industry analyst firm Forrester when they positioned Centrify as leaders in both of the Privileged Identity Management and recent IDaaS Waves. In fact, we are the only identity vendor who appears in both Waves, let alone be positioned as leaders in both. The winning streak continues! Centrify is proud to announce that we have been selected to join the Box Trust ecosystem. To show real dedication in keeping their customers’ data safe, Box has assembled a network of hand-selected…

A Leader! Forrester Wave Names Centrify Leader For Identity-as-a-Service

Today Forrester Research released The Forrester Wave™: Identity-As-A-Service, Q4 2017. Evaluating the “seven vendors that matter”, Forrester named Centrify a Leader. Here at Centrify, we believe this is a strong validation of Centrify’s zero-trust approach to securing access to apps and systems. A complimentary version of this report is available for download here. Centrify provides the industry’s only single platform to secure each user’s access to apps and infrastructure through the power of identity services. With this recent report from Forrester, Centrify becomes the only identity services provider to be evaluated in and positioned as a leader in both IDaaS…