1 2 3 4 5 next
Archived Centrify News Articles
10 Jun 2017
open to premium members only
Centrify named a Visionary in brand new Gartner Access Management Magic Quadrant [64117]
Centrify, June 10th 2017

Corey Williams blogs, "Centrify has been identified by Gartner, Inc. as a visionary in the 2017 Magic Quadrant for Access Management. Centrify received the honor for our ability to execute and our completeness of vision, which is evaluated based on a deep understanding of the industry, product innovation, and marketing, sales, and geographic strategy.

At a time when cyber breaches are rising in volume and velocity, Centrify represents a massive rethink of security. It is the only complete platform that stops breaches through a trifecta of Identity Services for applications, endpoints and infrastructure - both on premises and in the cloud. Unlike other vendors that solely address a subset of the secure access market, Centrify is the only provider to deliver an integrated platform that can secure access for a company's entire identityscape, including end users, B2B, B2C and privileged users - who are the most critical access management use case today..."
(Get More Information . .)

05 Jun 2017
open to premium members only
Centrify Enables Organizations to Stop Breaches That Start on Mac Endpoints [64116]
Centrify, June 5th 2017

Centrify, the leader in securing hybrid enterprises through the power of identity services, today announced enhancements to the that delivers local administrator password management for Macs and comprehensive Mac application management and software distribution via turnkey integration with the Munki open source solution. These new capabilities enable Mac administrators to solve critical challenges by implementing best practices for controlling privileged access on Macs while at the same time simplifying management of Mac endpoints.
(Get More Information . .)

31 May 2017
open to premium members only
Do You Know How Easy It Is to Guess Your Password? (Hint: You Don't Want to Read This!) [63953]
Centrify, May 31st 2017

The number of account credentials that has been stolen in the last 10 years has exploded to a degree that is unprecedented. It is now a fait accompli that many of the security tools out there can't help you as 81% of data breaches come from compromised credentials.

Let's delve into how easy it is to break into almost any account. Hackers have invented the digital equivalent of a master key.
(Get More Information . .)

23 May 2017
open to premium members only
What are CDM and CRED? [63759]
Centrify, May 23rd 2017

The Continuous Diagnostics and Mitigation (CDM) Task Order for CREDMGMT provides guidance and tools to federal civilian agencies to fulfill the Manage Credentials and Authentication (CRED) Function. This functional area is designed to prevent

  • the binding of credentials
  • the use of credentials by anyone other than the rightful owner (person or service).

The approved tools provide careful management of credentials, preventing attackers from using hijacked credentials to gain unauthorized control of resources, especially administrative rights.
(Get More Information . .)

18 May 2017
open to premium members only
Controlling Access is the Key to Cyber Security [63536]
Centrify, May 18th 2017

Access is the greatest opportunity and the greatest threat for businesses engaging with the online economy. Increasingly, our business systems gather, digest and disperse data throughout our operations, including confidential details about customers, employees and business partners. Mature cyber security processes are vital to protect this confidential information from unauthorised access, which can expose businesses to punishing and potentially lethal brand damage. In fact, even a cursory review of 2016 cybersecurity breaches - including the Yahoo! billion-user revelations, the DNC hack during the U.S. presidential election and the $81 million malware attack against a Bangladeshi bank - reveal their unprecedented size and impact.
(Get More Information . .)

15 May 2017
open to premium members only
Centrify-Commissioned Ponemon Study Finds Stock Prices Fall an Average of 5 percent, Customer Churn Can Increase as Much as 7 percent and Brand Reputation is Tarnished After a Data Breach is Disclosed [63535]
Centrify, May 15th 2017

Centrify, the leader in securing hybrid enterprises through the power of identity services, commissioned a new Ponemon research study that revealed data security breaches can negatively impact an entire organization - including sales, marketing and IT - and have a significant negative impact on company finances and shareholder value. Specifically, the study found that the stock value index of 113 companies declined an average of five percent the day the breach was disclosed and experienced up to a seven percent customer churn.

What's more, thirty-one percent of consumers impacted by a breach stated they discontinued their relationship with an organization that experienced a data breach. And while the study found a data breach has a significant impact on brand reputation, a surprising 66 percent of IT practitioners don't believe their company's brand is their responsibility...
(Get More Information . .)

 
 1 2 3 4 5 next