centrify corporation

Results 1 - 19 of 19Sort Results By: Published Date | Title | Company Name
Published By: Centrify Corporation     Published Date: Jun 07, 2018
Centrify is pleased to be recognized by 451 Research as one of the early vendors to embrace the zero trust concept, a new conceptual framework on the rise as traditional security tactics that follow a hardened perimeter approach have failed. This report examines Centrifys Zero Trust Security approach, as well as explores its Next-Gen Access platform, which provides a solid foundation for enterprises setting out on their zero-trust journey.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: May 22, 2018
A significant paradigm shift occurred in the last few years. Much like other technological shifts of the last decade when cloud computing changed the way we do business, agile changed the way we develop software and Amazon changed the way we shop Zero Trust presents us with a new paradigm in how we secure our organizations, our data and our employees. While difficult to identify the precise tipping point, one thing is certain: what were once extraordinarily high-profile, damaging breaches are no longer extraordinary. In just the last 18 months, Yahoo, Accenture, HBO, Verizon, Uber, Equifax, Deloitte, the U.S. SEC, the RNC, the DNC, the OPM, HP, Oracle and a profusion of attacks aimed at the SMB market have all proven that every organization public or private is susceptible. The epiphany behind the paradigm shift is clear: Widely-accepted security approaches based on bolstering a trusted network do not work. And they never will. Especially when businesses are dealing with skill
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: May 03, 2018
"Watch the On-Demand webinar to hear Centrify's Chief Product Officer, Bill Mann and Forrester Principal Analyst, Chase Cunningham in a lively discussion how Zero Trust concepts can be applied to Identity and Access Management. "
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: May 03, 2018
Watch this webinar On-Demand: Cybersecurity is broken. Trust is the enemy. An entirely new approach is required one based on Zero Trust. Championed by industry leaders including Google, Forrester, Gartner and Centrify, Zero Trust Security verifies every user, their device, and gives just enough access and privilege.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 13, 2018
This ebook helps you determine whether your company has an access issue and outlines ways to lower your risk of getting breached by increasing your identity and access (IAM) maturity through adopting a Zero Trust approach with the right IDaaS solution. Youll learn the best practices to establish identity assurance, limit lateral movement, enforce least privilege and audit everything. Discover how to avoid a Password Crisis.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 13, 2018
With compromised credentials as todays #1 threat vector, and the premium hackers place on privileged access, status quo is a treacherous security path to remain on. This eBook looks at whats behind the privilege crisis, helps you assess how your privileged access management strategy stacks up and proposes a rethink in your approach one that better addresses the needs of the hybrid enterprise. It explores ways to strengthen your companys identity maturity with a Zero Trust approach and proven best practices that reduce your risk of a security breach.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains.This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 13, 2018
A Zero Trust approach to security requires a combination of Identity Services to deliver identity assurance, trusted endpoints, conditional policy and least privilege. This guide identifies the specific capabilities you need within four key areas of identity and helps you compare capabilities across major vendors with respect to Application Services, Endpoint Services, Infrastructure Services and Analytics Services.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Jan 22, 2018
Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure every users access to apps and infrastructure in todays boundaryless hybrid enterprise through the power of identity services.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Jan 22, 2018
Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure every users access to apps and infrastructure in todays boundaryless hybrid enterprise through the power of identity services.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Dec 04, 2014
The number of identities that an organization must control and secure is exploding as companies support the evolution of business. Traditional users, customers and partners, outsourced or offshore IT, support and development teams, and new users from mergers and acquisitions are working from increasingly distributed locations and devices and to be efficient they need the right set of privileges across a diverse set of servers and applications. So, how can an organization successfully control privilege for all of these identities to mitigate identity-related risk without slowing down the business? From this webinar you will learn: Forresters predictions for next generation privileged identity management. How best-in-class organizations are successfully controlling privilege and mitigating risks
Tags : 
identity management, it support, security, identity management, controlling privilege, enterprise applications
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Privileged access management can not only reduce your enterprises exposure to these risks but also improve IT reliability and reduce IT costs. Download the white paper: Three Important Reasons for Privileged Access Management (and One Surprising Benefit). Youll discover how a privilege access management solution can ensure: Comprehensive compliance such as the Sarbanes-Oxley Act for responsible governance. Ensure business integrity and responsible business processes. Tackle security risks, both inside and outside the organization. Realize bottom-line IT cost benefits.
Tags : 
privileged access management, it cost benefits, comprehensive compliance, business processes, it reliability, it management
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in todays business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of todays demanding IT environment.
Tags : 
privileged user activity, enterprise compliance, security, third party access, it environment, it management, enterprise applications
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Nov 12, 2014
Centrify provides Red Hat Linux integration with Active Directory. The Centrify Suite centrally secures and manages Red Hat Linux systems along with 450 other versions of Linux and Unix by integrating them with your existing Microsoft Active Directory services. Centrify provides Active Directory Group Policy-based configuration to control the security settings of Red Hat systems and provides IT with the benefit of leveraging a familiar tool. Learn more about why you need Centrify for Red Hat.
Tags : 
security, management, integration, it benefits, configuration, enterprise applications
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Dec 08, 2010
This white paper also describes Centrify DirectSecure's innovative, software-based approach to deploying a peer-to-peer IPsec solution that can dynamically isolate cross-platform systems and enable end-to-end encryption of data in motion.
Tags : 
centrify corporation, sensitive information, data protection, privacy and security, ipsec-based serve, domain isolation, microsoft active directory, data encryption
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, describes how Centrify's integrated architecture enables you to extend Active Directory to your non-Microsoft platforms, and describes the Centrify Suite's unique benefits.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, using Centrify's DirectControl to extend Active Directory authentication and access control to your UNIX, Linux and Mac OS systems and applications, and using Centrify's DirectAudit to log user activity to provide you a clear picture of end user actions on all UNIX and Linux systems.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
    
Centrify Corporation
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.