Centrify is a company that offers Identity and Access Management and Privileged Identity Management to secure access across computer network and cloud computing environments. The company was formed in 2004. It is located in Santa Clara, California.

Wikipedia
Centrify Corporation
Centrify Corporation
Blog Post
  • Over the past 12 months during this blog series I’ve tried to provide insight into some of the key aspects of the GDPR and how organisations can better prepare for the big compliance deadline day of 25 May. Now that day is almost upon us, the question many organisations are asking is, “what happens next?” The truth is that, despite having had years of notice, many are only now waking up to the rea...

Centrify Corporation
Centrify Corporation
Blog Post
  • Centrify and Palo Alto Networks have announced another important integration that can help customers quickly and decisively discover anomalies that are a security threat. Building on our past partnership, both companies collaborated anew around the Centrify Analytics Service and the Palo Alto Networks App Framework to more-readily share threat intelligence. When security stalwarts like Centrify an...

Centrify Corporation
Centrify Corporation
Blog Post
Centrify Corporation
Centrify Corporation
Blog Post
  • Como configurar la integración entre DirectAudit y Splunk Parte1 - Iniciar grabación de sesiones al realizar elevación de privilegios Resumen Se realizará la configuración de un perfil para iniciar las grabaciones de las sesiones a partir de la elevación de privilegios y se realizará la integración con splunk de forma que se puedan visualizar las sesiones de auditoria directamente desde el Porta...

Centrify Corporation
Centrify Corporation
Blog Post
  • Today, Centrify is proud to announce the integration of the Centrify Privileged Access Service with SailPoint® Technologies IdentityIQ™ solution. This integration provides joint customers with a single pane of glass for a privileged user’s entitlements and enables issuing access requests for accounts, systems, and existing roles that are controlled by the Centrify Privileged Access Service. This a...

Centrify Corporation
Centrify Corporation
Blog Post
  • 1. Login to the Centrify Admin Portal. 2. Go to Core Services > Policies. 3. Edit an existing policy by clicking on the name of the policy or create one. 4. Go to Endpoint Policies > Common Mobile Settings and click on Common. By default, it is set to "Yes" and you will be able to see Passcodes on an Enrolled device. 5. If you want to disable the “Passcodes” you will need to select No in the “Sh...

Centrify Corporation
Centrify Corporation
Blog Post
  • An easy way for a cyber-attacker to gain access to sensitive data is by compromising an end user’s identity and credentials. Things get even worse if a stolen identity belongs to a privileged user, who has even broader access, and therefore provides the intruder with “the keys to the kingdom.” As a result, it’s not surprising that, according to Forrester, 80 percent of breaches involve privileged ...

Centrify Corporation
Centrify Corporation
Blog Post
  •  Today we are going to use two Centrify GPOs to create a custom krb5.conf file and distribute it to our Unix/Linux systems: ComputerConfiguration -> Policies -> CentrifySettings -> Common UNIX Settings -> "Copy files" ComputerConfiguration -> Policies -> CentrifySettings -> DirectControlSettings -> "Add centrifydc.conf properties" Step 1 Our first action is to create the

Centrify Corporation
Centrify Corporation
Blog Post
  • End-users are seeking modern ways to interact with IT and other shared services groups across their organization. They look for self help — where they can get secure access to apps, manage their own passwords, search for known apps or servers, request access to services that they need. IT-users need to automate tasks like account provisioning and password resets, and manage privileged access to on...

Centrify Corporation
Centrify Corporation
Blog Post
  • [How to] – Have the Welcome Text in the Language That the Device Is Set To. Log into the Centrify Admin Portal. Go to Core Services > Policies. Edit an existing policy by clicking on the name of the policy or create one. Go to Endpoint Policies > Device Enrollment Settings, then select Yes in the “Show welcome screen on enrollment drop down”. By default, it is set to Yes. Go to Settings > Endpo...

Centrify Corporation
Centrify Corporation
Blog Post
  • Happy World Password Day! Ok, I’ll admit until a few days ago, I wasn’t aware this was a thing. As with most events in my life, if Outlook or Android doesn’t serve me a popup reminder, I’m oblivious to it. But this one commanded my attention, not only because of the never-ending news coverage we see about high-profile breaches, but also because I now know that 4 out of 5 are due to weak, default, ...

Centrify Corporation
Centrify Corporation
Blog Post
  • As customers move more and more to the cloud, many customers are leveraging AWS Workspaces as a Desktop as a Service Solution (DaaS) to provide end users access to corporate resources at any time from any where.  Given Workspaces are available to anyone, from anywhere, a key consideration to moving to AWS Workspaces, is of course Security.  AWS Workspaces can be configured to require Multi-Factor...

Centrify Corporation
Centrify Corporation
Blog Post
  • The 2018 Verizon Data Breach Investigation Report (DBIR) was published in early April, reporting on 53,308 security incidents and 2,216 data breaches from 67 contributors in 65 countries. It’s an important read for organizational leaders, and cyber professionals to find data-driven evidence of industry-specific incident patterns. It’s also important to distinguish incidents from breaches. A breach...

Centrify Corporation
Centrify Corporation
Blog Post
  • Nearly 1,200 security professionals recently attended the DevOps Connect: DevSecOps Day at the 2018 RSA Conference at San Francisco’s Moscone Center. Now in its fourth year, DevSecOps Day featured presentations and panel discussions on the role of security in the world of DevOps. DevOps thought leaders, security experts, and vendors shared success stories, insights, and challenges they faced in th...

Centrify Corporation
Centrify Corporation
YouTube Video
  • Learn the results of a new Centrify research study with Dow Jones Customer Intelligence, “CEO Disconnect is Weakening Cybersecurity,” which reveals that a misalignment between CEOs and Technical Officers is weakening enterprise cybersecurity postures. The study – a survey of 800 enterprise executives including CEOs, Technical Officers, and CFOs – highlights that: • 62 percent of CEOs cite malwar...

Centrify Corporation
Centrify Corporation
Blog Post
  • With the GDPR compliance deadline of May 25 almost upon us, recent events have highlighted the importance of locking down third-party risk. Attacks on supply chain partners, Facebook’s data leak scandal and a new report from the National Cyber Security Centre (NCSC) have all come at an opportune time to illustrate the potential liabilities facing firms. The GDPR will require much stricter due dili...

Centrify Corporation
Centrify Corporation
Blog Post
Centrify Corporation
Centrify Corporation
Blog Post
  • As Infrastructure and Application Development continue to converge in a Dev Ops world, container technology is being heavily adopted by organizations.  As a trusted security partner, Centrify customers and prospects are asking how can Centrify secure this new dynamic container based eco system?   covered in his article how Centrify can control both access and privileges across a containerized eco...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.