Open in app

Sign In

Write

Sign In

Centrify Medium
Centrify Medium

Home

About

Oct 2, 2020

Centrify Receives 2019 Cloud Computing Security Excellence Award | Centrify

We’re starting off the new year at Centrify with exciting news — TMC, a global, integrated media company, has named Centrify as a 2019 Cloud Computing Security Excellence Award winner ! The Cloud Computing Security Excellence Award, presented by Cloud Computing Magazine , recognizes companies that have most effectively leveraged…

Privileged Access Mgmt

2 min read

Centrify Receives 2019 Cloud Computing Security Excellence Award | Centrify
Centrify Receives 2019 Cloud Computing Security Excellence Award | Centrify
Privileged Access Mgmt

2 min read


Sep 29, 2020

Top 5 Reasons to Meet Centrify at RSA Conference 2020 | Centrify

What you get: the Monday welcome reception, full access to the Expo Hall, Partner all-access seminars, Expo Briefing Center sessions, the Wednesday afternoon pub crawl, the Women’s Networking Reception, and several other events you can learn about Centrify’s executive team will be on hand and want to talk to you…

Privileged Access Mgmt

2 min read

Top 5 Reasons to Meet Centrify at RSA Conference 2020 | Centrify
Top 5 Reasons to Meet Centrify at RSA Conference 2020 | Centrify
Privileged Access Mgmt

2 min read


Sep 29, 2020

Centrify 19.6 Release: Password Reconciliation, Passwordless Authentication and More | Centrify

A great benefit of Centrify’s Privileged Access Service (PAS) is that, as a native SaaS service, there’s an agile development process behind the scenes. This is a boon for customers, since we’re able to respond more quickly to customer-driven enhancement requests, Centrify-driven innovations, and bugs (yes, we all have them). …

Password Management

2 min read

Centrify 19.6 Release: Password Reconciliation, Passwordless Authentication and More | Centrify
Centrify 19.6 Release: Password Reconciliation, Passwordless Authentication and More | Centrify
Password Management

2 min read


Sep 29, 2020

SAMA Cyber Security Framework: Improving Cyber Resilience | Centrify

Thus, it’s not surprising that a recently published survey saw 20% of the CEOs in Saudi Arabia reach a consensus that cyber security risks are the biggest threats to their businesses today. …

Cybersecurity

2 min read

SAMA Cyber Security Framework: Improving Cyber Resilience | Centrify
SAMA Cyber Security Framework: Improving Cyber Resilience | Centrify
Cybersecurity

2 min read


Sep 21, 2020

Just-in-Time (JIT) Access Series Part 1: Is Just-in-Time Enough? | Centrify

In the Privileged Access Management (PAM) space, there are some new trends gaining traction within the market, and a big shift taking place from what has been the legacy approach to PAM. What do we mean by the legacy PAM approach? Well, 10 years ago PAM was all about password…

Privileged Access Mgmt

2 min read

Just-in-Time (JIT) Access Series Part 1: Is Just-in-Time Enough? | Centrify
Just-in-Time (JIT) Access Series Part 1: Is Just-in-Time Enough? | Centrify
Privileged Access Mgmt

2 min read


Sep 21, 2020

Just-in-Time (JIT) Access Series Part 2: JIT Approaches | Centrify

Welcome back to this blog series on Just-in-Time (JIT) access. In , we discussed what Just-in-Time access is, and where it fits into PAM strategies. In this part we’ll take a look at the different approaches to Just-in-Time access that vendors take. The approaches that we’re going to look at…

Jit

4 min read

Just-in-Time (JIT) Access Series Part 2: JIT Approaches | Centrify
Just-in-Time (JIT) Access Series Part 2: JIT Approaches | Centrify
Jit

4 min read


Sep 21, 2020

Would You Bolt Your Front Door and Leave Your Back Door Unlocked? | Centrify

Many organizations believe that Privileged Access Management (PAM) simply equates to having a password vault. In reality, they’re leaving the back door open, and are only half protected. Privilege elevation, however, enables the legitimate increase in privilege, just-in-time, for a temporary period of time, to perform administrative tasks. Another gate…

Cybersecurity

2 min read

Would You Bolt Your Front Door and Leave Your Back Door Unlocked? | Centrify
Would You Bolt Your Front Door and Leave Your Back Door Unlocked? | Centrify
Cybersecurity

2 min read


Sep 16, 2020

Just-in-Time (JIT) Access Series Part 3: Zero Standing Privileges | Centrify

In part 1 we discussed what Just-in-Time access is and where it fits in to our Privileged Access Management (PAM) strategy, then in part 2 we looked at two of the typical JIT PAM approaches that vendors take. This final part will focus on the Zero Standing Privileges (ZSP) approach. …

Jit

2 min read

Just-in-Time (JIT) Access Series Part 3: Zero Standing Privileges | Centrify
Just-in-Time (JIT) Access Series Part 3: Zero Standing Privileges | Centrify
Jit

2 min read


Sep 16, 2020

Secure Remote Access Blog Part 1: There are Better Approaches Than a VPN | Centrify

Rightfully so, another priority is securing remote access for all employees. After all, it only takes one compromised credential to potentially impact millions, in terms of revenue, shareholder value, post-breach cleanup costs, identities, intellectual property…the list goes on. Some companies, however, failed to factor in remote access for privileged users…

VPN

3 min read

Secure Remote Access Blog Part 1: There are Better Approaches Than a VPN | Centrify
Secure Remote Access Blog Part 1: There are Better Approaches Than a VPN | Centrify
VPN

3 min read


Sep 16, 2020

Gartner Reports Outline the Path to PAM Maturity | Centrify

READ THIS REPORT: https://www.centrify.com/resources/analyst-reports/gartner-report-iam-leaders-guide-to-privileged-access-management/ BEST PRACTICES FOR PRIVILEGED ACCESS MANAGEMENT THROUGH THE FOUR PILLARS OF PAM READ THIS REPORT: https://www.centrify.com/resources/analyst-reports/gartner-best-practices-four-pillars-pam/ REMOVE STANDING PRIVILEGES THROUGH A JUST-IN-TIME PAM APPROACH READ THIS REPORT: https://www.centrify.com/resources/analyst-reports/gartner-remove-standing-privileges/

Privileged Access Mgmt

1 min read

Gartner Reports Outline the Path to PAM Maturity | Centrify
Gartner Reports Outline the Path to PAM Maturity | Centrify
Privileged Access Mgmt

1 min read

Centrify Medium

Centrify Medium

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech