Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • The Multi-factor Authentication (MFA) Debate
    A recent FCW article authored by Derek Handova provides expert opinions from experienced and well respected “identity” professionals: Paul Grassi, Sr. Standards & Technology Adviser at NIST, Jeremy Grant former Sr. Executive Advisor for Identity Management at NIST and now Venable’s managing director for technology business strategy.  Mr. Terry Halvorsen, former CIO for the Department of Defense an...
Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • Centrify Invests in Educating Cyber Leaders on Cutting Edge Defenses
    As a leader in the industry, we at Centrify feel it is our corporate responsibility to provide truly objective thought leadership, education and guidance to empower cyber security leaders with the tools necessary to defend against digital adversaries. To support this goal, I’d like to invite you to CyberConnect, a two day security conference convening executives from some of the world’s biggest or...
Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • Winter Has Come for Passwords
    The recent security breach at HBO of confidential data including Game of Thrones scripts, cast personal details and administrator passwords highlights the vulnerability of password-only protection. The breach involved hackers stealing about 1.5 terabytes of data from HBO systems — more than seven times as much as the 200 gigabytes taken in the 2014 Sony hack — including scripts for five Game of Th...
Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • [How to] Salesforce Mobile App Configuration push deployment guide
    The Salesforce Mobile App Configuration push deployment guide is a step by step guide on how to configure a mobile app configuration schema that pushes application settings for the Salesfore1 mobile application for iOS devices during installation. With the application configuration pushed to the mobile device the user can make use of zso without having to configure any settings on the Salesforce1 ...
Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • 6 Reactions to the Cisco 2017 Midyear Cybersecurity Report: Part 2
    Last week, I discussed the first three reactions I had to the “Cisco 2017 Midyear Cybersecurity Report.” I discussed how vendor consolidation is increasing, how spyware is being branded as malware and how detection of threats is continuously improving. DevOps as a Target In the Vulnerabilities section of the document, Rapid7 describes how DevOps is a target and vulnerability for many companies tha...
Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • 6 Reactions to the Cisco 2017 Midyear Cybersecurity Report: Part 1
    When reading this year’s “Cisco Midyear Cyber Security Report,” a few things jump out that bear discussion. Vendor Consolidation First, one of the key findings is related to the “fragmented security toolbox,” and from it, having so many point solutions solving for security gaps actually creates problems. If they are layered effectively, integrated fully and managed appropriately, point solutions a...
Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • Post-Brexit Data Flows: Why There’ll be No Place for UK Firms to Hide from GDPR
    As with most aspects of the EU, unhindered cross-border data flows are something most U.K. firms just take for granted these days. Thanks to the cloud, huge volumes of corporate data is stored in third party providers’ data centres, frequently not even in the UK. Aside perhaps from those in highly regulated sectors, corporate users don’t think twice about accessing that data, and sending it to and...
Centrify Corporation
Centrify Corporation
YouTube Video

New YouTube videos detected.

  • Centrify Auditing and Monitoring Service
    This use case-based demonstration shows how Centrify’s Advanced Monitoring capability enables real-time alerting when an SSH key is installed, triggering immediate IT security action. This video will also demonstrate full session recording of SSH key activity that is attributed to the individual user for auditing, corrective action and compliance reporting.
Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • Four Things You Don’t Know About Cybersecurity… That You Should
    Ponemon Institute recently conducted a survey, sponsored by Centrify, designed to more deeply understand the current state of cybersecurity. The Impact of Data Breaches on Reputation & Share Value: A Study of U.S. Marketers, IT Practitioners and Consumers examines differing perspectives across a number of security topics. I’d like to focus on IT professionals at this time, as I believe the results...
Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • How are CFOs Affected By a Security Breach?
    Centrify teamed up with security researcher Ponemon Institute to survey a large group of IT, information security, senior marketing and communication professionals as well as a healthy number of consumers. A key objective of the study was to get a handle on the financial impact of a cyber security breach on a typical organization. The bottom line (no pun intended) is that, the day the breach makes...
Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • Racing Towards a Zero Trust Access Control Model
    Drag racing. From 0 to 60 in less than 2 seconds. It’s all about controlled speed. Success depends on maximizing power, minimizing weight and drag, and no obstacles in the way! In IT when the pressure’s on, admins also want to avoid obstacles. They need to get the job done fast whether it’s an OS refresh, new corporate apps rolling out, or fixing a network outage. For this, they too need power (ac...
Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • Centrify Wins PC Magazine’s 2017 Identity Management Solutions Editor’s Choice Award
    PC Magazine recently published a review of the top 2017 Identity Management Solutions and we are pleased to announce that Centrify was one of only three vendors that received the Editors’ Choice Award! The Editors’ Choice is awarded annually to products/services that rise above similar products in their categories and the products under consideration have been reviewed by expert analysts in PCMag ...
Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • Brexit Means Brexit … Means GDPR Compliance
    The long-awaited negotiations governing the UK’s divorce from the EU officially began on 19 June, marking arguably the most important period in the country’s history since the Second World War. What follows remains to be seen, but given Brexit is now a reality, many UK organisations may be wondering/hoping whether this means they’ll be spared the sweeping new data protection regulation directed fr...
Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • Centrify named “Overall Leader” in KuppingerCole IDaaS Leadership Compass
    Centrify is pleased to announce that KuppingerCole Identity as a Service (IDaaS) Leadership Compass Report names Centrify “Overall Leader.” The report also highlights Centrify’s leadership in innovation, product features and market reach. KuppingerCole is a leading analyst covering Identity and Access Management (IAM). This report is the most current and comprehensive look at the IDaaS market, whi...
Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • 3 Implementations for Federal Assessment & Authorization
    Inevitably, if you work anywhere in the Federal space, you have had some involvement with the process of getting an IT system accredited for use. The names and processes have changed slightly over the years and the governance depends on what agency you support. While NIST SP 800-37, “Guide for Applying the Risk Management Framework to Federal Information Systems A Security Life Cycle Approach” is ...
Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • Breaches Rank in Top Three Negative Impacts on Brand Reputation – Above CEO Scandal
    A recent Ponemon Institute study set out to examine the attitudes and perspectives of three key stakeholder populations inside a business environment: Marketing practitioners, IT practitioners and consumers. A key objective of the Centrify-sponsored study was to understand the impact of a data breach on a company’s customers, stock price and overall brand reputation. Among the survey’s key finding...
Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • Is It Time for a Mac Attack?
    After years of successfully dodging the vast majority of viruses, spyware, ransomware and other malware typically directed at PCs, it seems that Mac may be nearing the critical mass necessary to attract cyberthieves. It’s definitely getting closer. According to AppleInsider, “In the fourth quarter of 2016, Apple saw a 4.5 percent increase in shipments…as the wider PC market fell further into the r...
Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • [Labs] Using Centrify MFA to secure AWS WorkSpaces with Simple AD
    Background AWS WorkSpaces "allows customers to launch cloud-based desktops that allow end-users to access the documents, applications, and resources they need with the device of their choice, including laptops, iPads, Kindle Fire, or Android tablets" a cost effective way to manage these desktops is to use SimpleAD (an AWS-hosted Samba4-based directory that provides similar capabilities as Microsof...
Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • [Mac] How to push a shared WiFi password through an AD group policy
    Step 1. Use Apple Configurator 2 to create the desired WiFi setting, then export the profile. 1. Launch Apple Configurator and select File > New Profile. 2. Enter a display name for the profile in General.  3. In the left column, select WiFi, click the Configure button, then enter your WiFi settings. 4. Once you have completed your configuration, go to File > Save.   Step 2. Upload the saved mobil...
Centrify Corporation
Centrify Corporation
Blog Post
Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • How to Analytics- Custom Query with custom Filter's and available tools
    Use case is to find out the most launched application ( last 30 days) and within that find the Person who used/launched  that application with existing tools.  Prerequisites   :            Need to have Analytics Entitlement. If you do not see one please request one from your account representative.
Centrify Corporation
Centrify Corporation
Blog Post

New blog articles detected.

  • Centrify Privilege Service Deployment Checklist
    Your Centrify Privilege Service (CPS) deployment could go a lot smoother with this checklist. This checklist is a high overview of the necesarry tasks to prepare, deploy, configure, and validate a CPS environment.

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.