Centrify is a company that offers Identity and Access Management and Privileged Identity Management to secure access across computer network and cloud computing environments. The company was formed in 2004. It is located in Santa Clara, California.

Wikipedia
Centrify Corporation
Centrify Corporation
Blog Post
Centrify Corporation
Centrify Corporation
Blog Post
  • A German court has ruled that an employee can be held liable for damages caused by instances of CEO fraud that affect their employer. In October 2017, the Regional Labor Court of Saxony ruled that a financial director can be partially liable for the damage caused by a case of CEO fraud. Their accountability was ultimately limited however, the court found, because the liability privilege developed ...

Centrify Corporation
Centrify Corporation
Blog Post
  • Whenever I speak about IT security vendor consolidation, I am encountered by confusion-ridden looks from the business fraternity. Businesses are grappling with the challenge of selecting an appropriate security vendor(s) in such an ever-changing IT environment — zero-ing on single vendor’s capabilities does not appear to be the right approach! Information technology has come a long way, and the de...

Centrify Corporation
Centrify Corporation
Blog Post
  • ‘Tis the season of holiday cookies, warm sweaters hot cocoa and… holiday shopping deals. According to Deloitte, retailers can expect to see holiday sales growth as much as 4.5 percent and could top $1 trillion between the months of November and January this year. It’s even looking better for online shopping. “E-commerce sales… are expected to increase 18 to 21 percent during the 2017 holiday seaso...

Centrify Corporation
Centrify Corporation
YouTube Video
  • Balance security and productivity with conditional access to corporate resources. Provide seamless SSO access to corporate resources in low risk environments while challenging users with MFA or blocking access in medium to high risk environments.

Centrify Corporation
Centrify Corporation
Blog Post
  • In 2016 over $80B have been spent on Security, yet 66% of companies were still breached and 81% of breaches involved compromised credentials in the form of either stolen or weak passwords. I covered in one of my previous blogs the cost of protecting yourself, which according to a study by Ponemon Institute in 2015, the mean annualized cost for 58 benchmarked organizations is $15 million per year. ...

Centrify Corporation
Centrify Corporation
Blog Post
  • Over the past few months, it seems Centrify can’t escape the winner’s circle. This all began with positive recognition from revered industry analyst firm Forrester when they positioned Centrify as leaders in both of the Privileged Identity Management and recent IDaaS Waves. In fact, we are the only identity vendor who appears in both Waves, let alone be positioned as leaders in both. The winning s...

Centrify Corporation
Centrify Corporation
Blog Post
  •   Every now and then, this situation presents itself infront of me:     -Is it possible for me to send one or more roles as a SAML attribute, inside of a SAML Assertion?   The answer to this question is yes, and here's how you do it:   Sending One Role: Sending one role is much simpler than sending multiple roles.  It doesn't require an array, or any of that fancy stuff.  It requires one line of...

Centrify Corporation
Centrify Corporation
Blog Post
  • The theft of highly sensitive personal information on 57 million Uber drivers and customers in the Uber data breach — and its subsequent cover-up — is in many ways what the GDPR was invented for. Here is a multi-billion dollar US tech company that reportedly protected access to key data in the cloud by using just static log-ins. Not only did its data protection controls therefore fall short of the...

Centrify Corporation
Centrify Corporation
Blog Post
  • Employee on-boarding, transitions and departures often require manual and time consuming user administration tasks performed between HR and IT. Generally, identity originates in the HRIS system when the candidate becomes an employee. Coordinate between HR to IT is done such that, IT can create accounts for the new hire in Active Directory and every application required for their job. Similarly, du...

Centrify Corporation
Centrify Corporation
YouTube Video
  • Through a case study of a high-profile national event, the 2012 Republican National Convention, explore how you can duplicate, build and scale a corporate risk and security program for your environment. Specifically, this plan identifies how to define and build a program in critical infrastructure environments. Using a risk-based approach and folliing security frameworks and best practices designe...

Centrify Corporation
Centrify Corporation
YouTube Video
  • While virtually every organization struggles with developing and maintaining a healthy culture, Capitol Hill may arguably be one of the most challenging environments to build a culture of trust. Being the Inspector General, whose primary role is to audit congress, only exacerbates this trust conundrum. During this inspirational, charming and extremely insightful Keynote, we hear from the U.S. Hous...

Centrify Corporation
Centrify Corporation
Blog Post
  • Yes, you read it correctly. Centrify, the only identity services provider to be evaluated in and positioned as a leader in both The Forrester Wave™: Identity-As-A-Service, Q4 2017 and The Forrester Wave™: Privileged Identity Management, Q3 2016 has also been identified by Forrester as a Strong Performer in The Forrester Wave™:  Enterprise Mobility Management, Q4 2017. A complimentary version of th...

Centrify Corporation
Centrify Corporation
Blog Post
  • Boom! Centrify Identity Services are now available on AWS Marketplace. A big week for Centrify and its partnership with AWS. To recap: Centrify announced it is now an Advanced Technology Partner in the AWS Partner Network. Centrify is also exhibiting and presenting as a gold sponsor at AWS re:INVENT this week. Of these developments the most significant is the availability of Centrify Identity Serv...

Centrify Corporation
Centrify Corporation
YouTube Video
  • Today’s CISO must defend their organization in an environment flooded with vendors and products while facing a shortage of skilled cybersecurity practitioners. During this session, we hear how one of the largest financial institutions in the world has developed a mature program which leverages multiple security technologies and is transforming indicators of compromise into triggers for automated r...

Centrify Corporation
Centrify Corporation
YouTube Video
  • For years we've head that 'identity is the new perimeter', yet organizations still struggle with managing network access, authenticating users, and preventing breaches which originate from compromised credentials. In order to address this well-understood problem, organizations must look at how they are managing their users and modernize both the culture and technology within their ecosystem vis-a-...

Centrify Corporation
Centrify Corporation
YouTube Video
  • In today's global economy, organizations face unique threats and security challenges which require innovative strategies to overcome. This includes not only digital threats, but navigating international law, cultural barriers, and other considerations. This panel of cybersecurity leaders will share their experiences and insights on how to manage international risk, navigate foreign cultural and le...

Centrify Corporation
Centrify Corporation
YouTube Video
  • Engineers, IT executives, and even business leaders are slowly waking up to the fact that until we address the issue of poorly designed and built applications, systems, and devices, we will continue to play ‘catch-up’ with APTs determined to exploit our digital vulnerabilities. During this “Fireside Chat,” we speak with one of the most respect thought leaders in the field of cybersecurity to hear ...

Centrify Corporation
Centrify Corporation
YouTube Video
  • Cyber incidents and data theft have both tangible results and geopolitical implications. While China and Russia are by far the most active and sophisticated adversaries threatening America, mercenary, criminal, jihadist, and Hail-Mary actors from countries like Iran, North Korea, and other European, Middle Eastern and South American countries also pose a significant threat. During this explosive s...

Centrify Corporation
Centrify Corporation
YouTube Video
  • Customers looking to migrate to the Amazon Web Services (AWS) Cloud often have security at the front of their list of concerns. When presented with security concerns AWS works to help customers understand how they can achieve their desired security profiles on the AWS cloud. In this presentation we will talk about common security challenges customers have when migrating to AWS and security best pr...

Centrify Corporation
Centrify Corporation
YouTube Video
  • The Mirai botnet's attack on DNS hosting provider Dyn in October 2016 was one of the highest profile, global cybersecurity incidents in history and demonstrated the potential of a successful, widespread DDoS attack and the importance of IoT security. Hear one of the world's leading DNS experts break down what happened during this historic incident and, perhaps most importantly, share insights on w...

Centrify Corporation
Centrify Corporation
YouTube Video
  • The Healthcare sector is one of the most heavily attacked by adversaries using the latest tools and techniques which are often later used in other sectors, similar to the recent uptick in ransomware attacks experienced around the world. As a result, non-healthcare sector organizations have a significant opportunity to study how the health sector responds to threats and identify best practices and ...

Centrify Corporation
Centrify Corporation
YouTube Video
  • Digitization is invading all aspects of business, government and daily living. Now more than ever, security must be addressed pervasively – we must know who is touching, viewing or altering our connected devices and information. Inside the digital vortex in which we live, the lines across global consumers, enterprises and governments are increasingly blurred. Join one of the world's leading securi...

Centrify Corporation
Centrify Corporation
YouTube Video
  • Chris Novak, Global Director of the Verizon Threat Research Advisory Center, will walk through some of the research that they have been doing over the last 10+ years around data breach investigations and threat actor attribution. The research has been published on an annual basis for each of the last 10 years, with contributing data from various other institutions around the globe. The intent is t...

Centrify Corporation
Centrify Corporation
YouTube Video
  • Current threats and today's hybrid IT environment require changes to current security models. Over $80B is spent on security today but over 2/3rds of companies are still breached. Find out why from co-founder and CEO of Centrify who will share how Identity Services can defend your organization against the majority of cyberattacks.

Centrify Corporation
Centrify Corporation
YouTube Video
  • Artificial Intelligence and specifically machine learning (ML) is often cited as providing great promise for cyber security controls and capabilities and representing the future. Jim is going to share his journey in pursuit of ML driven security controls and how his initial assumptions changed dramatically. The talent development implications of model driven security are significant and Jim will s...

Centrify Corporation
Centrify Corporation
YouTube Video
  • In this captivating Keynote, retired General Keith B. Alexander, former director of the NSA and Commander, U.S. Cyber Command, offers a though provoking, raw and visionary assessment of the digital threats facing our Nation and what business and technology leaders must do in order to defend our institutions, protect intellectual property, and ultimately ensure our way of life.

Centrify Corporation
Centrify Corporation
Blog Post
  • We are proud to announce that Centrify has met the requirements and is now an Advanced Partner within the AWS Partner Network. Is this just another Partner announcement or is there something more here? What This Means for Customers First, for customers, Centrify becoming an Advanced Technology Partner means that they have been so rigorously tested that AWS personnel can recommend Centrify to AWS c...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.