Smart Card Login to Cloud-Based Apps and Privileged Identity Management Services
I am excited to announce that Centrify has added Smart Card login as a core feature of our Cloud Identity Platform supporting both the Centrify Identity Service as well as the Centrify Privilege...
View Article5 Nuggets of Wisdom from the Gartner IAM Conference
The Gartner IAM conference was such a whirlwind earlier in December. I was fortunate to attend a number of sessions from Gartner analysts and guest speakers. Let me break down some of the key takeaways...
View ArticleOutsourced IT Part Deux
Let’s continue our purely fictional story from last time, where we stepped into the shoes of our IT consultant, Tony. You may recall he works for ACME Consulting who provides outsourced IT services to...
View ArticleBasic Human Needs — Identity Management in the Home
It’s Saturday morning in sunny California, but it’s raining; and, because it is raining, the Internet is down. Since, today in my house the lack of Internet access has become the top of Maslow’s...
View ArticleWhy Outsourced IT Deserves As Much (Or More) Security Than Internal IT
This is a very short blog. Short on text, that is. Long on value. If you’re in IT, especially in IT management, please click on the following link to see the many ways — some unique to Centrify —...
View ArticleABC…Easy as 1-2-3 (When it Comes to Passwords Anyway)
The new year usually brings new intentions and often changes to old habits. But it seems that old habits die hard, especially when it comes to changing our passwords. According to SplashData’s list of...
View ArticleWhat is a Derived Credential Anyway?
What is a derived credential anyway? You may have heard that Centrify announced support for “derived credentials,” in conjunction with its smart card offering. If you aren’t in the federal or...
View ArticleBlackberry Partners with Centrify for Derived Credential Support on Good...
Live from Mobile World Congress in Barcelona! Today, I am pleased to share that Blackberry has partnered with Centrify to provide an even greater level of security for highly regulated customers in the...
View ArticleCentrify and Yubico Partner to Bring Context-Based Adaptive Authentication to...
Have you ever reported to the police that someone else’s car was stolen or burglarized? You haven’t? Certainly you have heard a car alarm. Why did you fail to act when the car alarm sound blared...
View ArticleMulti-Factor Authentication Everywhere
I am pleased to write that Centrify announced today our Multi-Factor Authentication Everywhere initiative (aka “MFA Everywhere”) that is aimed at further securing enterprise identities against today’s...
View ArticlePasswords Are Dead. Why Smart Companies are Benefiting from Multi-Factor...
In a recent Wall Street Journal op-ed, President Obama announced the launch of a new national awareness campaign to “encourage more Americans to move beyond passwords — adding an extra layer of...
View ArticleDear Taxpayer: We Still Can’t Guarantee Your Security
2015 was the year of the U.S. Internal Revenue Service (IRS) Get Transcript identity theft. Since the spouse and I were affected by this breach last year, I figured I’d better have a look into any...
View ArticleMFA for VPN with Centrify — Compatibility at its Best
As Senior Director of IT for Centrify, I sometimes enjoy early access to new features of our products. We use the full suite for our own identity management needs, and after over a year of experience...
View ArticleChain Reaction — Strengthening the Weakest Link with Third Party Identity...
Dealing with third parties is an inevitability of modern day business, and so too is the risk of a data breach. Unfortunately, the two often go hand in hand. Organisations are subject to the security...
View ArticleBillions of Dollars in Infosec Spending Wasted on Legacy, Network Security
The Vormetric 2016 Data Threat Report published in January 2016 provides valuable insight into trends in encryption and data security. The 2016 report surveyed over 1100 global security executives in...
View ArticleHow Centrify Solutions Address Security Recommendations from the M-Trends...
IT security teams are struggling to prevent data breaches in cloud, mobile and data center environments and compromised user identity is the leading cause of data breaches. Traditional...
View ArticlePasswords Suck! It’s Time to Kill the Password.
Passwords are meant to protect the sensitive information from the bad guys who want to steal or exploit it. They’re supposed to keep our identities and data safe. And they’re supposed to help keep our...
View ArticleCentrify Announces Global Channel Partner Award Winners
It’s industry standard for vendors to hand out annual awards, and Centrify is no different. The Centrify Channel Partner Network (CCPN) was launched in January of 2014 and is focused heavily on core...
View ArticleFor PCI Multi-Factor Authentication is Now Required for Everyone…and You...
The “Payment Card Industry Data Security Standard” (PCI DSS) has long been a security and compliance driver for merchants, banks, hospitals, governments and anyone else that handles payment card...
View ArticleIs Multi-factor Authentication Adoption Finally Picking Up Speed?
Enterprise adoption of multi-factor authentication has been slow, with many organizations disregarding its value. But has Amazon triggered a change in momentum? Despite best intentions, few in the...
View Article