Centrify Corporation
Centrify Corporation
Blog Post
  • Without a doubt, the most frustrating fact I face every day is this: Companies spend a meager 4.7% of their total security budgets on identity and access management (IAM) – while compromised identities are responsible for 80 percent of all data breaches. Eighty percent. This glaring disconnect is almost more than I can wrap my head around. Here’s the math: According to Gartner’s “Forecast: Informa...

Centrify Corporation
Centrify Corporation
Blog Post
  • In the last post I mentioned naming conventions, which is a great way to organize your work and ensure you are doing the right thing. Another item you can do to make your administrative tasks easier is to use Application Categories, as well as to teach end users how to use tags to organize their own views.

Centrify Corporation
Centrify Corporation
Blog Post
  • Whether you’re a small business, a large business, an academic institution, a non-profit or a government agency, it is now absolutely critical that you weave a fabric of security throughout your organization. You’ve heard it a thousand times, but it can’t be overstated: Culture is created at the top and trickles down into the organization. Today’s executive leadership must do more than issue edict...

Centrify Corporation
Centrify Corporation
Blog Post
  • This article discusses the different approaches to populate information into the Centrify Privilege Service vault.  The stage in process of implementing a PIM solution dictates many of the strategies to be used.  At the time of this writing, we are looking at version 17.8, but as you know, releases come every month, therefore, the strategies discussed in this post are subject to change as more cap...

Centrify Corporation
Centrify Corporation
Blog Post
  • At Centrify, we highlight the idea of “the team” – we work together and collaborate on building and selling technology that keeps organizations safe from cyberattacks. And whether we work in accounting, sales, marketing or engineering, we all are part of the Centrify team and mission. With over 400 employees worldwide, we all come from different backgrounds, have unique skillsets and partake in di...

Centrify Corporation
Centrify Corporation
Blog Post
  • As each week brings the 25 May 2018 deadline for GDPR compliance closer to hand, we seem to be faced with yet another report highlighting poor levels of preparedness among organisations. Recent findings reveal that an astonishing 64% of UK firms have not yet begun preparations for the sweeping new data protection law. Yet as shocking as these stats are, a far more effective way to focus the minds ...

Centrify Corporation
Centrify Corporation
Blog Post
  • When Centrify built its Infrastructure Services product, implementation engineers came across many things that made it far easier to get the job done in the field. Through this field tested experience, Centrify built a script for that solution to automatically build sample OU's, groups, and content in Active Directory to make it far easier to manage the Centrify solution.   In our App Managemen...

Centrify Corporation
Centrify Corporation
Blog Post
  • Remember that Yahoo breach last year, how it became the largest breach in history impacted over 1 billion users and knocked $350 million dollars off of the Verizon acquisition price? Turns out that EVERY account at Yahoo! including email, Tumblr, Fantasy and Flickr were impacted by the breach. That’s all 3 billion accounts vs just the 1 billion that were announced last year. Oath, the new brand fo...

Centrify Corporation
Centrify Corporation
Blog Post
  • The following excerpts are from the Technical Controls section of Part-1 of the ICIT Equifax report entitled “America’s In-Credible Insecurity,” written by James Scott, Sr. Fellow, Institute for Critical Infrastructure (ICIT). Technical Controls Data Encryption Data should be protected according to its value and the potential harm that would result if it were stolen. Encryption does not prevent ad...

Centrify Corporation
Centrify Corporation
Blog Post
  • Help! I Love the Internet, But My Identity and Data Are Up For Grabs — Should I Just Unplug?! In honor of National Cybersecurity Awareness Month, we at Centrify are doing what we can to help you to be #CyberAware. The theme for the first week is around simple steps to online safety. Have you ever considered how to protect your privacy or identity while “online”? Have you noticed over the last few ...

Centrify Corporation
Centrify Corporation
Blog Post
  • In this article, we outline the steps to create the pre-requisite building-blocks of a test lab for Centrify Privilege Service customer-managed on-premises deployments. Overview Setup Active Directory, DNS and Certificate Services   (not covered) Setup a Management Server (consoles) Setup Shared Storage  and Disks    - Using FreeNAS    - Using Microsoft File and Storage Services    - Using NetApp...

Centrify Corporation
Centrify Corporation
Blog Post
  • By default, Centrify automatically populates the username field with the User Principal Name for SAML web logins. However some web logins use first name space last name (eg. John Smith) instead of the full UPN format (eg. john.smith@domain.com).    To configure your web app in Centrify to autopopulate with the user's first name (space) last name: 1. Edit your web app and go to Account Mapping. 2. ...

Centrify Corporation
Centrify Corporation
Blog Post
  • As CEO Tom Kemp mentioned in his recent blog post, Centrify has reengineered its annual user group event to more comprehensively tackle the many security issues facing organizations today. As the thought leader partner for CyberConnect 2017, ICIT has spent the last several months building a powerful curriculum which will empower business and technical leaders tasked with defending their organizati...

Centrify Corporation
Centrify Corporation
Blog Post
  • This article belongs to a series of blog posts related to the customer-managed version of Centrify Privilege Service. In this particular entry we center the discussion around strategies for Disaster Recovery.  If this is the first article you are reading, I recommend you go to the High Availability with Windows Server Failover Clustering post.   A quick primer on Disaster Recovery  Based on Wikipe...

Centrify Corporation
Centrify Corporation
Blog Post
  • Starting with version 17.7 of Centrify Privilege Service (customer managed/on premises), the standalone option has been removed and only highly-available configurations leveraging Windows Server Failover Clustering are supported.   This blog covers the process of upgrading Centrify Privilege Service while maintaining high-availability.   The Upgrade Process   Cluster Upgrade Requirements As of t...

Centrify Corporation
Centrify Corporation
Blog Post
  • This article belongs to a series of blogs on the Customer-managed version of Privilege Service (now part of Centrify Infrastructure Services).  The topic is high-availability and in customer managed deployments, the Windows Server Failover Service (WSFC) is the key enabler for this capability.  In this article we'll discuss and demo some of the failover tests in a lab environment to illustrate.  I...

Centrify Corporation
Centrify Corporation
Blog Post
  • As some of you know, Privilege Service (now part of Infrastructure Services) was designed as an Infrastructure-as-a-Service (IaaS) solution, and after it's relase and due to customer demand, we released a "customer-managed" version designed to be deployed and operated in an on-premises setting.   The goal of the lab is set-up the building-blocks to test the high availability capabilities of Privil...

Centrify Corporation
Centrify Corporation
Blog Post
  • This lab entry covers the installation of Centrify Privilege Service (now part of Infrastructure Services) in a customer-managed (on premises) setting.  The goal of the lab is set-up the building-blocks to test the high availability capabilities of Privilege Service by leveraging Windows Server Failover Clustering (WSFC).   Lab Design   The design of this lab is based on the following test scenari...

Centrify Corporation
Centrify Corporation
Landing Page

New mobile optimized landing page detected

 
Centrify Corporation
Centrify Corporation
Blog Post
  • Often times we get asked by our customers how to get a list of SNC enabled users in SAP ABAP for licensing purposes. Here is a command that can be used to retrieve such list.  

Centrify Corporation
Centrify Corporation
Blog Post
  • Here is the use case . Users are coming from CompanyA ( Federated Users ). IDP CompanyB is hosting  ApplicationB (SAML application or it can be any application ) Technically For Company A (IDP ) ApplicationB (is the SP) , because users are coming from IDP and needs to logon to the ApplicationB. In a typical B2B setup as outlined below https://community.centrify.com/t5/Centrify-Identity-Service-no...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.