Do You Know How Easy It Is to Guess Your Password? (Hint: You Don’t Want to Read This!)

The number of account credentials that has been stolen in the last 10 years has exploded to a degree that is unprecedented. It is now a fait accompli that many of the security tools out there can’t help you as 81% of data breaches come from compromised credentials. Lets delve into how easy it is to break into almost any account. Hackers have invented the digital equivalent of a master key. If you look at sites like SecLists, Weakpass, and Hashes.org —  not to mention berzerk0’s probable wordlists on github which is a clever amalgam of password wordlists. Here you will find…

What’s Next from Google Cloud: Scenes from Google Next

Google Cloud last week had their big event in San Francisco, gathering Partners, customers and Googlers alike to talk about Google Cloud and its bright future. Centrify was proud to sponsor this event, and we had a presence in the Partner Playground, which allowed us to visit with hundreds of Google Next attendees to understand what they were doing with Google Cloud. Of course we spoke with Centrify customers, Google customers and some prospective customers, but interestingly, most of these conversations were with those who are already using software as a service (SaaS) or identity as a service (IDaaS) today….

Federated Identity Management vs. SSO

Last time I wrote about how much it costs to protect yourself, so I want to follow up  with another topic that hits close to home: your wallet. Federated identity management (FIM) and single sign-on (SSO) are not synonymous — FIM gives you SSO, but SSO does not give you FIM. That minor detail is very important to understand, as you make the leap to the cloud and adopt more SaaS applications. While you will have some initial startup cost with FIM by building out an identity service provider (IDP), it is cheaper in the long run than using simple SSO with FIM….

Top Three New Year’s Security Resolutions

When it comes to setting New Year’s resolutions, most people shoot for the moon. We tell ourselves we will give up carbs, go running every morning, become a vegan or even give up drinking alcohol. Inevitability, three weeks later, we find ourselves right back where we started. As security professionals, responsible for keeping the bad guys out and reducing the risk of data breaches, we find ourselves right back where we started too — we fundamentally do not really improve our security posture, and then wonder why not. We are very similar to our consumer counterparts, because we set lofty…

What is Customer Success?

Customer Success at Centrify is more than just an approach to account management or the name of a department. It is a mindset that reaches from the pre-sales process to renewal. With every interaction, Centrify’s goal is to add and drive value for our customers and partners. Centrify as a company is fully invested in the entire customer journey, as every area in the company is focused on our customers’ success, from the moment they sign-up to support and engineering, from professional services to marketing and from product management to our executive team. Every one of these areas are not just interacting…

5 Critical Topics in Cybersecurity Training

With European Cybersecurity Month in full swing, this week’s topic of discussion is “Cybersecurity Training.” Whilst cybersecurity training and awareness has undoubtedly improved, a common mistake is that it is often treated as a one-time tick-box exercise, rather than an ongoing process. As cyberthreats become part of the reality of daily business, the limitations of traditional security controls have been exposed and businesses need to recognise that cybersecurity is not simply a one-off task on the to-do list. A security breach is now assumed to be inevitable and whilst layering defensive security controls and tools are a step in the…

Comparing Cloud Identity and Access Management (IAM) Solutions

The State of the IAM Market With the huge shift to the cloud happening and the corresponding plethora of SaaS apps now invading enterprises, it is not surprising that the need for identity and access management solutions built for the cloud is rising in importance in the minds of IT buyers. This is because each newly deployed cloud-based app can become an island of identity unto itself. This in turn causes the problems of end users drowning in too many passwords (which also increases the odds of one being stolen), the inability for IT to quickly provision and de-provision users…

Gartner: Centrify Scores Highest for Workforce to SaaS Use Case

Gartner just released its “Critical Capabilities for Identity and Access Management as a Service” report, and we are proud to see that Centrify has scored the highest in the “Workforce to SaaS” use case. We believe this validates our unique ability to secure access to apps and infrastructure from any device for all users. Please have a look at a complimentary copy of the full report to see for yourself. Gartner defines the “Workforce to SaaS” use case as: …primarily driven by the need to extend basic IAM functions and serve employees accessing SaaS applications. We’re especially proud of this…

Cybersecurity Best Practices in 2016 — Start by Securing Your Identity

Each year the folks at FireEye release the M-Trends report compiled by their Mandiant Consulting arm. This outlines what last year’s IT security trends were and what we should anticipate in the coming year. While this year’s M-Trends 2016 validates what many of us have experienced firsthand, it really brings to the forefront how critically important securing identity will be this year. Within the 48-page report, there are 21 sections directly related to identity. Not to mention, a few infographics that invoke identity questions. After taking out the filler pages, identity is mentioned in almost every page. It will be…

Centrify Announces Global Channel Partner Award Winners

It’s industry standard for vendors to hand out annual awards, and Centrify is no different. The Centrify Channel Partner Network (CCPN) was launched in January of 2014 and is focused heavily on core strategic partners. Last year, we were able to launch our own CCPN awards program to honor partners that have embraced our efforts and program. Now that we are in our second year of awarding partners, there are some very obvious metrics that we have seen that drive success selling and managing Centrify’s products. There is a very high percentage of our partner community that have met the…