Centrify Closes Out a Busy June at AWS Re:Inforce and Identiverse

June has been a busy month in the cybersecurity space! It started off with InfoSec Europe and SailPoint Navigate, next week we’ll wrap up the month with AWS Re:Inforce – Amazon’s inaugural security-focused event – and Identiverse – the premier identity industry event. That’s a lot! We love these opportunities to come together with our friends, partners, and colleagues and in the cybersecurity space and demonstrate how we’re redefining legacy Privileged Access Management (PAM) with Centrify cloud-ready Zero Trust Privilege. AWS Re:Inforce Centrify will be in booth 814 in the Security Learning Hub at AWS Re:Inforce, demos and swag in…

Minimizing Exposure to Ransomware Attacks with Centrify Zero Trust Privilege

Ransomware attacks like the ones that wreaked havoc in Baltimore, Maryland, Albany, New York, and Genesee County, Michigan are dominating the headlines in 2019. Holding someone or something for ransom is a simple yet effective strategy that has been used by criminals for many years. Today, cyber criminals are applying these ancient techniques to modern technologies. This raises issues such as what organizations need to know regarding ransomware attacks and what they can do to minimize the risk of being victimized. Ransomware, which encrypts a victim’s data and demands a ransom to unlock it, can have a major impact on…

New Centrify Report: Stop Putting Up with Bad Karaoke and Start Learning about Zero Trust Privilege

You know when you’re hanging out with friends, maybe doing a little drinking, and somebody suggests that you go to a karaoke bar? “Heck yeah! Sounds fun, I’m a GREAT singer!” The letdown is always when somebody records your performance and you listen to it (or worse, watch it on YouTube or social media) the next day…. “Oh, I’m not as good as I thought I was, but I’m still not willing to take any voice lessons.” The same could be said about Privileged Access Management. We all know it’s a good thing to do, but we tend to be…

NASCIO CIO Top Priorities in a Zero Trust World

Many state CIOs are struggling to manage the onslaught of priorities that are captured in the NASCIO Top 10 Policy and Technology Priorities for 2019, ranging from enabling cloud services to the digital government to IT governance. While their mission mandates tackling these priorities, they cannot solely focus on their implementation, but must also bolster cyber security and abide by stringent compliance mandates (e.g., FISMA, HIPAA, NIST SP 800-Series). This is a tall order to deal with. To add to this challenge, the attack surface of state governments has changed dramatically. Today state agencies must not only control access to…

Centrify Achieves FedRAMP Authorization

Centrify received exciting news this week that we are now FedRAMP Authorized! For those who don’t know about FedRAMP, it is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. FedRAMP Authorization is an important qualification that significantly smooths the process of selling cloud technology solutions to government agencies. We have been trying to get this authorization for years, so this is a BIG win for Centrify, our partners, and our customers. View our FedRAMP Authorization: https://marketplace.fedramp.gov/#/product/centrify-identity-services–centrify-privilege-services?sort=productName Privileged access abuse is the leading attack vector, estimated to be involved…

Centrify Empowers Our Partners to Unleash P.E.A.K. Performance

I’m thrilled today to debut Centrify P.E.A.K. Performance, our new partner program! This launch is the culmination of a long period of listening. We’ve spent months listening to our partners, customers, and internal stakeholders to construct a program from the ground up that we feel empowers the channel to successfully sell Centrify’s cloud-based Zero Trust Privilege services. First, a step back. Why are we changing our partner program? Quite simply, a lot has changed over the past 6-12 months. Centrify has changed. We’re now solely focused on stopping the leading cause of data breaches: privileged access abuse. The market has…

Centrify RSA Booth 6445: Where Zero Trust Privilege Partners Take the Stage

If there was one clear takeaway from the 2018 RSA Conference, it was that Zero Trust was ready to take off. It seemed like everywhere you turned, Zero Trust was staring you in the face. Oh wait, that was just the Centrify marketing blitz that overtook San Francisco and Moscone Center last April! ZERO TRUST, 10 MONTHS LATER Fast-forward 10 months ahead and here we are, heading back to Moscone for the annual cybersecurity event. And what’s even more clear: Zero Trust has arrived. Many vendors in the industry have jumped on the Zero Trust bandwagon (whether they have a…

Start Your Engines! It’s Zero Trust Privilege Test Drive Season!

As organizations struggle to protect the ever-expanding attack surface, they not only have to secure access to infrastructure, databases, and network devices, but also extend security controls to cloud environments. The modern threatscape now includes Big Data projects, DevSecOps, and hundreds of containers or microservices that represent what used to be a single server. At Centrify, we believe that legacy PAM solutions simply are not capable of securing modern enterprise attack surfaces. That’s why we have a vision of redefining legacy PAM with cloud-ready Zero Trust Privilege. Yet, as with anything, knowing how, when and where to start or progress…

NEW CENTRIFY SURVEY: Too Much Privilege, Not Enough PAM Powered by Zero Trust

I’m both a technology guy, and a numbers guy. I have Bachelor of Science degrees in both Accounting and Computer Science. I’ve held the CFO and VP of Finance titles at technology companies throughout my career, including at Centrify where I was CFO for 7 years before becoming CEO in January. But I’ve never painted myself as only a numbers guy because I’ve always had a very keen eye on the technology and operations. As CEO, now more than ever, I’m laser-focused on our innovation and ability to execute on our vision, which is to redefine legacy PAM with cloud-ready…

Gartner Names PAM a Top Security Project (AGAIN!) in 2019

Last June at the 2018 Gartner Security & Risk Management Summit, the analyst firm issued a “Smarter with Gartner” paper outlining the Top 10 security projects for 2018, which included Privileged Account Management. While Gartner clarified that the ten projects were in no particular order, PAM was right there at the top. This was not a surprise to Centrify, as we’ve seen global cybersecurity spending reach $124 billion but privileged credential abuse is still the leading attack vector. Forrester estimates that 80% of breaches involve a privileged identity, and that 66% of companies have been breached five times or more….