Resources Library

The following white papers, datasheets, online webinars, chalktalk and product demos provide easy-to-grasp overviews of Centrify solutions' features and architecture.


The Centrify Vision

Data Center, Mobile, Cloud: All Roads Lead through Identity

Technology professionals sometimes refer to "once-in-a-generation" trends that transform IT as nothing before. Today, IT is facing not one, but three such transformations: Driven by the ubiquity of Web technologies and the efficiencies of virtualization, the enterprise data center has become much more agile in responding to fast-changing business IT needs. These trends have also made IT-as-a-service possible as never before, as the Cloud enables businesses to embrace concepts from infrastructure on demand to SaaS. A new generation of mobile devices that have revolutionized personal technology and expanded the reach of business IT. These transformations have placed enormous challenges on the enterprise. In particular: How to manage security and policy across each of these environments, consistently and reliably…without breaking the bank? Join EMA Managing Research Director, Scott Crawford, and Centrify CEO, Tom Kemp, for this complimentary Webinar that will highlight one of the most important factors of any answer to that question: the central role of identity in unifying a strategy that yields consistent control over each of these disruptive domains, with tangible results.


Centrify User Suite

Identity Management "How To" for Office 365

Office 365 is one of the fastest-growing businesses in Microsoft history, and for good reason: it provides organizations of all sizes with hosted versions of Exchange, SharePoint, Lync – and much more. Before deploying Office 365, there are several options to consider for managing user identities, each with different implications for IT and users.

Corey Williams, Senior Director of Product Management at Centrify reviews how you can use Centrify to provide Active Directory-based single-sign on to enterprise and SaaS apps including Office 365, while protecting sensitive company data. He discusses Centrify single sign-on for a full range of user scenarios across PC, tablet and mobile devices.

Corey provides a demo of Centrify for Office 365, a Microsoft-validated and easy-to-deploy Azure-based solution for Active Directory-based single sign-on, user provisioning and mobile management.


Take Control of Mobile and SaaS

Mobile is driving the adoption of SaaS applications. This is good news for users because they want the latest devices and apps, but it's a management problem for IT who have to ensure that users gain productivity, without sacrificing business security.

From managing and securing the devices, to dealing with all the "I forgot the password to my favorite app" help desk tickets, mobile and SaaS can be a real time-drain for IT professionals.

Join Windows IT Pro Technical Director Sean Deuby and Centrify Senior Product Marketing Manager Chris Webber as they walk through key considerations for:

  • Single sign on for SaaS applications using Microsoft AD FS and third party solutions
  • Making the most of your existing directory
  • Managing and controlling BYOD
  • Learn how to reduce tickets from password reset, control business application access, and manage BYOD - with no need to build out more infrastructure

How to Simplify Deployment of Google Apps and Office 365

Google Apps and Microsoft Office 365 each has its own vast ecosystem, from email to office applications to identity management. Google would prefer you live entirely in the Google environment, while Microsoft would prefer you live entirely in its Exchange/Office 365/Active Directory infrastructure. You are likely using a combination of Google Apps and Office 365 or sorting out the option that is right for your organization. A key consideration for your Microsoft or Google deployment is secure identity management, admin controls and single sign-on for your SaaS and mobile apps.

CBSi is proud to present, "How to Simplify Deployment of Google Apps and Office 365", where you'll learn how simple it is to manage on-boarding, off-boarding and entitlements into target apps using Centrify's cloud service with your existing AD infrastructure or Centrify's cloud directory. Don’t miss this webinar featuring CBS Interactive's Distinguished Lecturer David Gewirtz, one of America's leading cyber-security experts, and Jeff Friedsam, Director of Product Management at Centrify, a leading provider of Identity-as-a-Service (IDaaS) solutions. Jeff will also provide a live demo on how to implement identity management and single sign-on across Google Apps and Office 365.

You will understand how to:

  • Simplify the deployment of Google Apps
  • The benefits of deploying Office 365 without ADFS
  • Automatically assign new users to existing Google Apps Groups
  • Enable single sign-on across Google Apps, while maintaining complete control of user identities
  • Provide Active Directory-based single sign-on to Google Apps
  • Implement your cloud directory in minutes

Centralized Security and Management for Macs and Mobile Devices

Centrify User Suite, Mac Edition enables organizations to easily implement Active Directory-based management for both connected and remote Mac OS X systems, as well as end-user’s mobile devices.

In this webinar you will learn:

  • Best in-class Active Directory (AD) integration with proven deployment architecture
  • Hybrid management with both on-premise and cloud-based management platform for local and remote Macs
  • Comprehensive Group Policy-based configuration and policy management
  • Automated certificate management for strong authentication to Enterprise services
  • Robust smart card support for AD login
  • Integrated Mobile security management for iOS and Android devices

With Mac Edition, authentication, policy management, single sign-on (SSO) and user self-service for popular endpoint devices are easily managed centrally from AD, enabling you to leverage your existing identity infrastructure, processes and trained IT staff to reduce costs and improve operational efficiency.


How to Integrate Google Apps with Active Directory

Join this webinar to learn from identity management product expert, Corey Williams, Sr. Director of Product Marketing for Centrify. Corey will discuss secure Identity as a Service (IDaaS) for cloud applications with a focus on Google Apps and Office 365. Corey will provide a live demo on how to implement identity management and single sign-on across cloud applications including Google Apps and Office 365. You will learn how to:

  • Simplify the deployment of Google Apps
  • The benefits of deploying Office 365 without ADFS
  • Automatically assign new users to existing Google Apps Groups
  • Provide Active Directory-based single sign-on to Google Apps
  • Implement your cloud directory in minutes

Enterprise-Proofing the Apple Ecosystem with Centrify and Aqua Connect

CBS Interactive is proud to present "Enterprise-proofing the Apple ecosystem with Centrify and Aqua Connect” an interactive webcast that will reveal how you can use one login to connect to Mac and Windows instances (as well as all your cloud services) and do so safely and securely.

  • Learn about how remote desktop OS X services can free you up from having to buy an expensive Mac for each user
  • Explore how remote desktop OS X services have provided the full Mac OS X experience from any "glass" interface, ranging from your favorite tablets to desktop PCs and laptops
  • Discover how you can protect your employees and users using a wide range of secure technologies, including single sign-on and encryption

Don't miss “Enterprise-proofing the Apple ecosystem with Centrify and Aqua Connect” featuring CBS Interactive’s Distinguished Lecturer David Gewirtz, one of America’s leading cybersecurity experts; David McNeely, Sr. Director, Product Management at Centrify, a leading provider of Identity-as-a-Service (IDaaS) solutions; and Joseph Cohen, CTO of Aqua Connect, a leading provider of OS X terminal services solutions.


Architect Cloud Applications for Secure Identity Management

Cloud-based Platform as a Service (PaaS) is transforming how enterprise applications are built, creating a challenge for Devlops and IT security teams who need to provision, control access, and integrate new services with existing identity management systems.

Centrify Single sign-on for CloudBees decreases the cost of rolling out and managing Java apps on CloudBees and other cloud applications, while at the same time improving user adoption, satisfaction and productivity.


Secure Collaboration with Huddle and Centrify SSO for SaaS and mobile

Huddle lets you collaborate with ease making storing and sharing files both intuitive and secure. More than 4 million businesses use Dropbox everyday to get their jobs done. Users benefit from using their Active Directory credentials to access Huddle and thousands of other cloud applications, while IT benefits from increased Security, reduced helpdesk calls, and happy users. Centrify User Suite for SaaS is integrated with Huddle, providing IT decision makers with the most secure solution for employee collaboration regardless of location or device. Centrify Single sign-on for Huddle decreases the cost of rolling out and managing Huddle and other cloud applications while at the same time improving user adoption, satisfaction and productivity.

To learn more view the webinar, Secure Collaboration with Huddle and Centrify SSO for SaaS and mobile.

Speaking for Centrify is Corey Williams, Sr. Director of SaaS Product Marketing and from Huddle, Andy McLoughlin


How Centrify and Zoom Can Help you Secure your Cloud and Mobile Conferencing

Don't miss "How Centrify and Zoom can help you secure your cloud and mobile conferencing" featuring CBS Interactive's distinguished lecturer David Gewirtz, one of America's leading cybersecurity experts, Corey Williams, Product Marketing Director at Centrify, a leading provider of Identity-as-a-Service (IDaaS) solutions, and Nick Chong, Head of Product for Zoom.us, a leading provider of cloud meeting solutions.

During this on-demand webinar you’ll: Learn about the capabilities and opportunities provided by secure conferencing, including all the new options available via the cloud and mobile devices. Explore the security implications and challenges caused by the availability of these new capabilities. Discover how you can protect your employees and meeting participants using a wide range of secure technologies, including single sign-on and encryption.


Overcoming the Challenges of Multi-factor Authentication

Many cloud service providers are rolling out two-factor authentication features to address the increasing challenges that come from relying on passwords alone to secure user access and company data. Multifactor authentication is a great step towards stronger security and access management. Unfortunately, for enterprises that leverage more than a few cloud apps, this can lead to extra time and resources spent managing separate multifactor authentication solutions and training users on all of these independent approaches. CBS Interactive is proud to present "Overcoming the challenges of multifactor authentication," an on-demand, interactive webcast that will explain how to get the security benefits of multifactor authentication for all of your cloud apps without tears.

  • Explore the drawbacks associated with managing various disparate solutions and trying to make them work together.
  • Discover how you can build a common multifactor authentication experience across all of your cloud apps with a single place to administer the solution, define granular authorization policies and train your users.

Don't miss "Overcoming the challenges of multifactor authentication," featuring CBS Interactive's Distinguished Lecturer David Gewirtz, one of America's leading cybersecurity experts, and Sean O'Connell, Sr. Product Marketing Manager at Centrify, a leading provider of Identity-as-a-Service (IDaaS) solutions. Sean will be demonstrating how you can deliver a single multifactor authentication solution for your users across all of your Cloud applications using the Centrify User Suite.


Identity Management "How To" for Office 365

In this webinar Paul Andrew, Senior Technical Product Manager at Microsoft, will discuss options for Office 365 identity management, with a focus on how user accounts can be synchronized with on premise Active Directory.

Corey Williams, Senior Director of Product Management at Centrify will review how you can use Centrify to provide Active Directory-based single-sign on to enterprise and SaaS apps including Office 365, while protecting sensitive company data. He will discuss Centrify single sign-on for a full range of user scenarios across PC, tablet and mobile devices. Corey will provide a demo of Centrify for Office 365, a Microsoft-validated and easy-to-deploy Azure-based solution for Active Directory-based single sign-on, user provisioning and mobile management.

This is a Spiceworks' Partner Webinar, brought to you by Centrify.


Secure Collaboration with Dropbox for Business and Centrify SSO for SaaS and Mobile

Secure Collaboration with Dropbox for Business and Centrify SSO for SaaS and mobile Dropbox for Business lets you collaborate with ease, making storing and sharing files both intuitive and secure. More than 4 million businesses use Dropbox everyday to work smarter. Centrify and Dropbox have partnered to give Dropbox for Business users single sign-on and provide IT with centralized management and security using an existing infrastructure. Centrify simplifies password management with Active Directory-based single sign-on (SSO), making users happy while giving IT centralized control over access and identity management. Centrify User Suite for SaaS is integrated with Dropbox for Business, providing IT decision makers with the most secure solution for employee collaboration regardless of location or device. To learn more join this on-demand webinar, Secure Collaboration with Dropbox for Business and Centrify SSO for SaaS and mobile. Speaking for Centrify will be Corey Williams, Sr. Director of SaaS Product Marketing, and Alex Marshall, Enterprise Solutions at Dropbox.


SaaS, Single Sign-On, and Security: How Can This Possibly Work?

Quick... how many cloud accounts do you have? How many email accounts? How many software-as-a-service accounts? How many job-specific accounts? It's a lot, right? Many of you probably even have multiple accounts for certain services. Managing all this can be a mess. It gets worse when you or your employees need to use a mix of accounts to get work done every day. Some accounts are to local network servers. Some accounts are to big, famous public cloud services. Some accounts — especially if you're in government, healthcare, or the financial industries — are to extremely secure and sensitive services. CBS Interactive is proud to present "SaaS, single sign-on, and security: how can this possibly work?," This on-demand webcast is about how you can tame all this necessary craziness using single-sign on, all the while protecting each account's security.

Featuring CBS Interactive’s Distinguished Lecturer David Gewirtz, one of America's leading cybersecurity experts, and Corey Williams of Centrify, a leading provider of identity-as-a-service solutions.


Microsoft Student Advantage, Single Sign-on and More

Please join Microsoft, ScholarBuys, and Centrify on Thursday, December 12, 2013 at 2:00 p.m. CST. In this 45 minute session Microsoft will review Office 365 and Student Advantage, and Microsoft partner Centrify will review approaches to accelerate Office 365 deployment and adoption with a focus on enabling single sign-on for end users of Office 365 and other SaaS apps.


An Insider's Guide to SaaS and Mobile Management with Centrify User Suite

Centrify has announced Centrify User Suite, SaaS Edition, the industry's first Identity-as-a-Service (IDaaS) solution to provide both robust Active Directory- and cloud-based single sign-on (SSO), access management, application management and mobile management across any cloud, mobile or on-premise application. With this release, Centrify is adding built-in multifactor authentication to its fully integrated mobile device, container, app and authentication management functionalities. Centrify now also delivers the industry's most flexible and unique mobile per-app authentication policies to restrict access or require additional authentication factors. In this webinar we'll discuss how Centrify uniquely unifies SaaS management and mobile management, password sprawl, and all the great new features Centrify has recently added.


Enterprise Mobile Security Done Right with Samsung KNOX™ and Centrify

In this Webinar Peter Havens, Sr. Product Manager at Centrify will introduce you to the features and capabilities of the Samsung KNOX platform and the Centrify for Samsung KNOX solution. Centrify for Samsung KNOX is included as a standard feature set of Samsung KNOX and provides complete Active Directory based Mobile Device Management and Zero Sign-On sign-on for KNOX devices. As a result of Centrify’s integration with KNOX, organizations can leverage Centrify’s cloud service to most comprehensively manage Android users and devices and address security and management of enterprise mobility, application access, and BYOD challenges.


Centrify for SaaS & Office 365

Centrify for SaaS is a cloud-based service that will make users happy with single sign-on and personalised self-service and make IT even happier with its ease of deployment and seamless integration to Microsoft Active Directory in minutes. Some of the features you will see demonstrated are single sign-on to cloud-based apps such as Microsoft Office 365 and a hundred of others via the self service MyCentrify User Portal. There are also self-service features, such password reset that will be demonstrated.


Implementing ADFS for Single-Sign On to Office 365: Must It Be So Complex?

Randy Franklin Smith of Ultimate Windows Security leads you through the steps of setting up Dirsync and Microsoft Active Directory Federation Service (ADFS) for federated authentication between your on-premise Active Directory and Office 365. In this on-demand webinar, Randy covers these steps in detail, discussing issues such as required firewall changes, pros and cons of an ADFS proxy, required SSL certificates, and fault-tolerance. Centrify's Corey Williams then demonstrates an alternative solution, validated by Microsoft and running on top of the same cloud infrastructure as Office 365 (Azure). A quick install of Centrify's proxy securely connects your on-premise Active Directory, via the Centrify Cloud Service, to your Office 365 for seamless single sign-on.


Security in the Age of BYOD: How Enterprises Can Manage Business and Personal Workspaces

Expert panelists from GigaOM, Samsung and Centrify first explore the challenges exposed by BYOD and then sculpt a framework for evaluating the authentication and management tools available to secure employee-owned devices. They also discuss how to tailor a BYOD strategy that works for your industry and corporate culture.


Getting Mobility Right—From Devices to the Apps; from Identity to Productivity

Experts from Box and Centrify go beyond simple device management to cover the issues, technologies and policies required for next generation management of employee or corporate-owned devices, smartphones, and tablets. They discuss how to approach identity and authentication, enterprise app management, enabling single sign-on to apps, along with policy and architectural considerations for managing mobility projects across a myriad of platforms, use cases and enterprise boundaries. Learn how you can give employees the application experience and privacy they expect, while obtaining the visibility and control IT requires. Presented by Jamie Perlman, Box Sr. Director of Business Development, Mobile and David McNeely, Centrify Sr. Director of Product Management, Mobile.

Office 365 Security: Leveraging Active Directory and Integrating with Other Clouds

Jeff Medford, technical product manager for Office 365, explains how Office 365 is deployed, how security works, and how to integrate it with your on-premise Active Directory using ADFS. David McNeely from Centrify then takes it to the next level by discussing your options for integrating Active Directory with other cloud apps like Salesforce.com, Google apps, Office365, WebEx, Box, and hundreds more. He also discusses how you might not even need to implement ADFS in order to achieve single identity between all your cloud services and your on-premise environment.


UNIX/Linux/Mac Integration with Active Directory: Understanding the Five Possible End States

Everyone has Active Directory. Active Directory is an awesome directory, especially for its ease of use and out-of-the-box fault-tolerance and bandwidth sensitivity. And maintaining duplicate user accounts, dealing with out-of-sync identity and authorization information is not fun on so many levels. So it only makes sense to integrate UNIX, Linux and Mac systems with Active Directory. Consolidating to one user account and even single-sign on has never been more doable.

But there are so many ways to skin the cat depending on whether you use Kerberos or LDAP for authentication and whether you settle for just centralizing user accounts (authentication) or whether you also move authorization (basically group membership) to Active Directory as well. In this on-demand webinar, guest speaker Randy Franklin Smith of Ultimate Windows Security explains the "Five Possible End States" for UNIX/Active Directory integration and compares a number of the technology options available to reach those end states.


Data Center, Mobile, Cloud: All Roads Lead through Identity

Technology professionals sometimes refer to "once-in-a-generation" trends that transform IT as nothing before. Today, IT is facing not one, but three such transformations: Driven by the ubiquity of Web technologies and the efficiencies of virtualization, the enterprise data center has become much more agile in responding to fast-changing business IT needs. These trends have also made IT-as-a-service possible as never before, as the Cloud enables businesses to embrace concepts from infrastructure on demand to SaaS. A new generation of mobile devices that have revolutionized personal technology and expanded the reach of business IT. These transformations have placed enormous challenges on the enterprise. In particular: How to manage security and policy across each of these environments, consistently and reliably…without breaking the bank? Join EMA Managing Research Director, Scott Crawford, and Centrify CEO, Tom Kemp, for this complimentary Webinar that will highlight one of the most important factors of any answer to that question: the central role of identity in unifying a strategy that yields consistent control over each of these disruptive domains, with tangible results.


Will the Collision of Cloud and BYOD Destroy Everything You've Worked for in Active Directory?

As IT departments and end-users embrace the cloud, a whole new generation of disconnected applications and identity stores are cropping up. And as employees bring their own devices and apps, the percentage of systems consistently and centrally controlled by Group Policy dwindles. This webinar examines the different types of technology out there in these two areas and sets forth important evaluation criteria for comparing the offerings. In particular, it discusses the need to leverage what you've already invested in Active Directory, and describes Centrify's approach toward integrating cloud applications and employee-owned devices with your existing Active Directory to present everything in a single pane of glass.


Managing BYOD in your Organization

Join Windows IT Pro News Analyst Jeff James and Contributing Editor Eric Rux as they discuss bring your own device (BYOD) trends in the enterprise. Apple's iPad, iPhone, and even the Macintosh are making impressive inroads into enterprises. Jeff and Eric will give their perspective (and practical advice) on how to best manage these devices in the workplace. Specifically, we’ll touch on the implications of establishing and enforcing a BYOD policy on corporate security that balances user productivity with security best practices. And we’ll offer tips for managing Apple devices in a Windows domain.


What is BYO? (And what you can do to make it happen)

A lot of people are talking about BYO (Bring your Own) programs so that users can bring their own phones, tablets, and laptops. If you want to do this, great! Now how do you get started? In this webcast, independent expert Brian Madden will explain how to plan for your BYO program, how to select your target users.

Brian will also look at how to set your goals and help you figure out how to deal with existing systems, users who want to use non-standard devices, and how you can still maintain control.

David McNeely, Sr. Director, Product Management for Centrify, will talk about Centrify for Mobile and show how our cloud-based mobile access management solution lets IT admins manage their BYO devices with existing AD infrastructures. The webcast wraps up with David showing Brian a demo of how this is setup on an iPad.


Centralized Mac Home Directories on Windows Servers

The Enterprise Desktop Alliance wants you to attend a new webinar about how your customers can reduce the costs of managing and administering Mac home directories by using Group Logic's ExtremeZ-IP Server and Centrify DirectControl for Mac OS X to deploy them on Windows servers. This webinar is a technical deep dive into how to set up ExtremeZ-IP and Centrify DirectControl to configure DFS-based home directories for Mac users. You'll see how to maintain the Mac client's ability to use its native AFP protocol to talk to the Windows server and how you can rely on Active Directory to manage access.


Integrating the Mac into a Windows Infrastructure - 5 Case Studies

The Enterprise Desktop Alliance wants you to attend a new webinar to help IT professionals learn how to integrate Macs into their Windows environment. Please join us to discover how organizations like yours are getting more from their Mac installations without increasing their overhead.


Simplifying Mac Smart Card Support in Windows Environments

In this on-demand webinar see how easy it is to integrate Macs with smart cards into an Active Directory domain.


Leveraging Your Windows Active Directory Infrastructure to Provide Centralized Identity Management for UNIX, Linux and Mac Systems

Researching the feasibility of leveraging your Active Directory infrastructure to centralize identity management for UNIX, Linux and Mac systems? In this podcast, senior Burton analyst Mark Diodati interviews Centrify's David McNeely on the technical and business reasons for using Active Directory to manage more of your enterprise. Diodati shares some of Burton's findings on the reasons why their customers are looking for Active Directory integration solutions. McNeely explains Centrify's recommendations for a successful integration project. They also discuss leveraging Active Directory's rich group- and role-based management capabilities for fine-grained privilege management of UNIX/Linux systems.


Simplified SSO for Web and ERP: Leveraging Active Directory-Based Single Sign-On to Address Security and Compliance for Web and Enterprise Applications

Join this event to gain a better understanding of the advantages of implementing web and enterprise application single sign-on. Learn why tying entitlements to web, enterprise and B2B applications to Active Directory accounts is a simple, cost-effective, and highly reliable method of addressing IT security best practices and regulatory compliance.


Five Top Benefits of Using Windows Group Policy to Secure and Manage UNIX, Linux and Mac Systems

In this on-demand webinar, Linux, UNIX and Mac admins get an overview of how Group Policy works from Jeremy Moskowitz, author of authoritative works on both Windows Group Policy and Windows/Linux integration. Centrify's David McNeely will then explain the workings of the Group Policy engine that is seamlessly built into DirectControl and the unique benefits of using it for non-Windows policy enforcement. He'll also demonstrate using Windows Group Policy to lock down user and security settings on a Mac desktop system.


Deploying Macs in the Enterprise

In enterprises large and small, IT managers are increasingly adopting Microsoft Active Directory-based administration tools and procedures to manage their environments. While there are several solutions for authenticating Macs through Active Directory, corporate security, regulatory compliance, and TCO concerns represent additional thorny challenges to Mac adoption. In this free webinar, top industry experts explain what IT managers need to know in order to deploy Macs securely and manage them efficiently within an Active Directory environment.


Securing Access to UNIX, Linux and Mac with Active Directory

Need a way to centralize account administration without removing the security boundaries that naturally exist around your business systems? Join David McNeely, Centrify's Director of Product Management, in this webinar as he shows you how to prove "who has access to what" when the security auditors come knocking.


Centrify Server Suite

Protecting Critical Corporate Data from Privileged Users in Windows Server

In this webinar, Darren Mar-Elia from SDM Software, Inc. examines the challenges of keeping sensitive data such as PCI-regulated data safe from administrators with “Domain Admins” or equivalent access, what you can do about those challenges and the risks of doing nothing about them.

Brad Zehring from Centrify will demonstrate an innovative way to protect Windows Servers with data subject to regulatory compliance, such as PCI data, from highly-privileged user accounts — even from Windows Domain Admins.


Shared Accounts: The Back Door That's Tough To Close

Watch Bloor Research Senior Analyst Fran Howarth in action as she discusses shared and privileged accounts along with our very own Barry Scott. You will get a chance to view a demonstration of today’s technology solutions from Centrify, as we showcase the Centrify Server Suite and discuss real-world scenarios regarding privilege elevation and auditing.

During this live webinar you will learn about:

  • Privileged accounts across multiple functional areas
  • Understanding and mitigating risks: Inadvertent or intentional
  • Why shared accounts are essential to IT infrastructure

Fill out the form and get instant access to the webinar!


Identity Related Risks: What is the Real Insider Threat?

Administrative identities are growing by orders of magnitude as server environments become increasingly heterogeneous and complex. As a result, unanticipated risks originating from more insiders with privileged access to Windows Servers raises threat exposure and the likelihood of failed regulatory audits.

Learn how to simplify the management of identity-related risks — anticipated and unanticipated — across not only Windows, but Linux and UNIX servers too, whether deployed on-premise or in the cloud.


Identity Related Risks: Have you met your Administrators?

Without a scalable model for managing the life cycle of your users' identities and their associated privileges it becomes standard practice to dole out Local/Domain Administrator accounts to users who manage a single Windows service within the Enterprise.

As a result, unanticipated risks originating from more insiders with privileged access to Windows Servers raises threat exposure and the likelihood of failed regulatory audits.

Learn how to minimize the identity related risks in your Windows Server environment – both anticipated and unanticipated – while simplifying management of Windows services without creating more Administrators.


Shared Accounts: The Back Door That's Tough to Close

In this webinar, Windows IT Pro's technical director Sean Deuby will review the reasons you may have shared accounts, the risks associated with them, and what you should be doing to both understand and mitigate those risks.

Centrify's senior product manager Brad Zehring will demonstrate how Centrify Server Suite for Windows uses privilege elevation and auditing of individual users to eliminate the risks of using shared accounts and help IT achieve its goals for auditing and regulatory compliance.


Three Important Reasons for Privileged IT Access Control (and One Surprising Benefit)

Managing administrative access to highly sensitive business systems has become an increasingly important priority for IT: Exploiting administrative privilege is one of a malicious actor’s most highly valued tools, and thus more granular visibility and control over these privileges helps keep organizations secure. In addition, Compliance mandates often require this control, not only for security but to meet related auditing and reporting objectives as well. But there is a third, somewhat surprising reason why organizations should strengthen privilege visibility and management: It supports IT’s bottom-line contribution to the organization by reducing operational costs, transforming security and compliance investments into an advantage. In this on-demand webinar, EMA Managing Research Director Scott Crawford and Centrify Senior Product Manager Brad Zehring explain how privilege visibility and management improves security, supports compliance...and contributes to more cost-effective IT operations management.


UNIX/Linux/Mac Integration with Active Directory: Understanding the Five Possible End States

Everyone has Active Directory. Active Directory is an awesome directory, especially for its ease of use and out-of-the-box fault-tolerance and bandwidth sensitivity. And maintaining duplicate user accounts, dealing with out-of-sync identity and authorization information is not fun on so many levels. So it only makes sense to integrate UNIX, Linux and Mac systems with Active Directory. Consolidating to one user account and even single-sign on has never been more doable.

But there are so many ways to skin the cat depending on whether you use Kerberos or LDAP for authentication and whether you settle for just centralizing user accounts (authentication) or whether you also move authorization (basically group membership) to Active Directory as well. In this on-demand webinar, guest speaker Randy Franklin Smith of Ultimate Windows Security explains the "Five Possible End States" for UNIX/Active Directory integration and compares a number of the technology options available to reach those end states.


Data Center, Mobile, Cloud: All Roads Lead through Identity

Technology professionals sometimes refer to "once-in-a-generation" trends that transform IT as nothing before. Today, IT is facing not one, but three such transformations: Driven by the ubiquity of Web technologies and the efficiencies of virtualization, the enterprise data center has become much more agile in responding to fast-changing business IT needs. These trends have also made IT-as-a-service possible as never before, as the Cloud enables businesses to embrace concepts from infrastructure on demand to SaaS. A new generation of mobile devices that have revolutionized personal technology and expanded the reach of business IT. These transformations have placed enormous challenges on the enterprise. In particular: How to manage security and policy across each of these environments, consistently and reliably…without breaking the bank? Join EMA Managing Research Director, Scott Crawford, and Centrify CEO, Tom Kemp, for this complimentary Webinar that will highlight one of the most important factors of any answer to that question: the central role of identity in unifying a strategy that yields consistent control over each of these disruptive domains, with tangible results.


Deal with Your (IT) Control Issues: Secure Your Heterogeneous Enterprise with Active Directory, No Therapy Required (with Centrify and Splunk)

Join us to find out how Splunk and Centrify give you increased information flows that you can analyze to ensure Active Directory is an enterprise-ready infrastructure for securing your heterogeneous enterprise.


Federal Cloud Security: Securing Cloud Systems with Active Directory and Centrify Suite

Register today for this on-demand webcast to learn about access and identity management in today's federal environment and why it's important to centralize identities and unify access management for cloud security and data consolidation.


Mobile Security and Device Management Podcast with Tom Kemp and Jack Madden

The trend of employees using mobile devices in the workplace is becoming more popular by the minute. However, it is imperative for organizations to control these mobile devices to ensure the security of their corporate data.

Listen in on this podcast, featuring Jack Madden and Tom Kemp, to hear a discussion about mobile device management and how to maintain security in the enterprise, whether employees are on their own devices or corporate owned. Discover a mobile security management solution — Express for Mobile from Centrify — that can help you mitigate risks while giving employees the freedom to choose the devices they use in the workplace.


Implementing Virtual Security Cameras to Protect Privileged Access and Enforce Accountability

Jeremy's predicament — He is an IT admin and a critical server he manages has been breached! Jeremy's co-workers and manager consider him suspect number one. But wait, IT security has recently installed a new auditing solution that will clear Jeremy's name or send him packing...watch this video to learn how Jeremy cleared his name.


Getting Federal Data Center Consolidation Right the First Time: Successful Strategies for Identity, Security & Auditing

The on-going efforts to reform Federal IT are focused on consolidation of data centers across Civilian and Defense Agencies. In the process Federal IT leaders hope to promote shared services and cloud computing models. Regardless of their location, systems and applications need to be secured, controlled and audited for compliance. Clearly, data center consolidation success requires centralization of identities on UNIX, Linux and Mac OS X systems in order to achieve compliance and enable shared services.


European Banking Compliance Complexity: A Strategy for Slaying the Beast

European Banks and other Financial Services firms are faced every day with complex and prescriptive IT compliance regulations from every level of government and industry. Compliance, Security and IT Operations professionals have responded by creating internal 'audit points' to improve visibility into their operations. But these teams are challenged by the separate and fractured identity and access management silos that create gaps in security, make compliance difficult and IT operations inefficient.


Five Steps to Securing Cloud Servers

Many organizations are facing a Catch-22 when it comes to migrating applications to the cloud. They get the biggest ROI by moving business-critical apps that need to scale rapidly and on-demand. But these are precisely the applications that need the tightest security controls. Executive management is pressing for progress on cost savings, but sorting through the variety of security issues unique to cloud environments can be dauntingly complex. The solution is to break the process of securing cloud servers into a set of well defined, achievable steps that enable IT organizations to securely extend their existing enterprise infrastructure out into their cloud environment. In this free webinar, we will initially discuss the key requirements for securing cloud systems. David McNeely, senior director of product management at Centrify, will then present a five-step process, using Amazon EC2 as an example, for automating provisioning of security policies, centralizing account and privilege management, hardening network access, auditing systems, and implementing enterprise-centric single sign-on. Uri Budnik, ISV Program Director at RightScale, will describe how RightScale's ServerTemplate and RightScripts can be used to achieve the automated provisioning and system lockdown.


Ubuntu for the Enterprise: Five Steps to Ensure Successful Adoption

In this free webinar jointly sponsored by Canonical and Centrify, you’ll learn how many organizations are enabling the broader deployment of Ubuntu by integrating it into their existing Active Directory infrastructure and management processes. By using Centrify’s Canonical-certified solution, they can go beyond simply offering transparent sign-on to Ubuntu systems and can in addition deliver on five key requirements for enterprise deployments.


Understanding Single Sign-On for UNIX/Linux-based Web Applications

In this free webinar, SSO expert Professor John Walker of ISACA will help you identify the “low-hanging SSO fruit” in your enterprise and will arm you with the business case you need to justify a lightweight SSO project. And Corey Williams of Centrify will provide the proof of concept by walking you through the simple steps required to join a UNIX or Linux host system to Microsoft Active Directory and configure the application for SSO using end-users’ existing Windows credentials.


Cloud-based Servers: Getting Security and Compliance Right the First Time

Organizations moving their IT resources to the cloud are finding it a challenge to maintain the same security posture in their virtual environments that they have adopted in their physical data centers. Cloud platforms like VMware vCloud and Amazon EC2 enable the quick and easy creation of servers in response to end-user demand. In such dynamic environments, IT security and compliance managers need an automated method for consistently provisioning user accounts and privileges and enforcing system security policies. Other unique challenges include: isolating groups of servers for compliance reasons, protecting data as it moves across the public network, and auditing user activity on off-premise, virtual systems.


The 60-Minute IT Compliance Formula (with Security Expert Rolf von Roessing)

Most security experts will tell you that the formula for success in passing regulatory compliance audits can be complex and expensive - but how complex and expensive is it really? Join us for an educational and insightful hour-long webinar in which our panel of experts will explain how requirements such as PCI DSS, Sarbanes-Oxley, FISMA and others can be broken down into their constituent parts and each element tackled with commonsense principles.


Centrify Security Solutions for PCI Compliance

Learn how Centrify helps corporate IT security managers address the key provisions of Sections 7, 8 and 10 of the PCI Data Security Standard for their UNIX and Linux systems.


Integrating Linux on System z Environments into Active Directory with Centrify Suite (cohosted by Red Hat)

In this Centrify/Red Hat webinar, you will learn how to: centrally manage Linux users from Active Directory; configure Linux using Group Policy; and implement role-based access controls and privilege management.


Implementing Least-Privilege Security Management in Complex Linux and UNIX Environments (with Security Expert Dr. Eugene Schultz)

Examines the challenges around tying entitlements to individuals instead of to root or generic accounts, explains why existing tools such as sudo fall short in complex environments, and shows the value of leveraging Active Directory's centrally managed identities and its rich group- and role-based management capabilities.


Addressing the Unique IT Security Risks Posed by the Virtual Data Center

Virtualization technology is becoming not only increasingly ubiquitous but also increasingly heterogeneous in nature as organizations deploy bare-metal hypervisors from vendors such as VMware and Citrix. Meanwhile, organizations are also leveraging virtualization technology built into the latest UNIX, Linux and Windows operating systems. In this free webinar, top industry experts will help you understand the unique security and management requirements, as well as the risks, organizations will encounter as they migrate from the physical to virtual data center.


FISMA Compliance in Cross-Platform Environments

In this on-demand webinar learn how to address FISMA's four main IT security requirements by centralizing identity and access management leveraging Active Directory.


Leveraging Your Windows Active Directory Infrastructure to Provide Centralized Identity Management for UNIX, Linux and Mac Systems

Researching the feasibility of leveraging your Active Directory infrastructure to centralize identity management for UNIX, Linux and Mac systems? In this podcast, senior Burton analyst Mark Diodati interviews Centrify's David McNeely on the technical and business reasons for using Active Directory to manage more of your enterprise. Diodati shares some of Burton's findings on the reasons why their customers are looking for Active Directory integration solutions. McNeely explains Centrify's recommendations for a successful integration project. They also discuss leveraging Active Directory's rich group- and role-based management capabilities for fine-grained privilege management of UNIX/Linux systems.


Beyond Authentication: Using Centrify DirectAuthorize for Fine-Grained Access Control and Privilege Management on UNIX & Linux

Join this event to learn why setting access controls and authorizations centrally from Active Directory accounts is a simple, cost-effective, and highly reliable method of addressing IT security best practices and regulatory compliance.


Beyond Logging: Addressing Security and Compliance with Detailed Audit Trails Linked to Active Directory

Join this event to learn about best practices in cross-platform auditing and compliance, and how Centrify's Active Directory-centric solution, DirectAudit, addresses these important issues.


Take the Pain Out of Single Sign-On for SAP on UNIX/Linux

Strengthen security and eliminate end-user frustration with non-intrusive, Active Directory-centric single sign-on for SAP


Secure, Cost-Effective Implementation of Web and Java Application SSO

Leverage Active Directory for secure and cost-effective single sign-on and federation for Apache, WebLogic, JBoss and WebSphere applications


NIS Migration and Management

Enhancing security and streamlining IT processes by replacing your legacy NIS infrastructure with centralized authentication and access control leveraging Microsoft Active Directory


Five Top Benefits of Using Windows Group Policy to Secure and Manage UNIX, Linux and Mac Systems

In this on-demand webinar, Linux, UNIX and Mac admins get an overview of how Group Policy works from Jeremy Moskowitz, author of authoritative works on both Windows Group Policy and Windows/Linux integration. Centrify's David McNeely will then explain the workings of the Group Policy engine that is seamlessly built into DirectControl and the unique benefits of using it for non-Windows policy enforcement. He'll also demonstrate using Windows Group Policy to lock down user and security settings on a Mac desktop system.


Enhancing Compliance and Troubleshooting with Detailed Auditing and Session Replay for UNIX and Linux

Centrify's Director of Product Management, David McNeely, reviews the auditing and troubleshooting challenges that today's heterogeneous enterprises face, and will demonstrate how Centrify's DirectAudit provides a next-generation solution that's secure, scalable and reliable. Register for this webcast now, and we'll also email you a copy of our free white paper, "Implementing Detailed User-Level Auditing of UNIX and Linux Systems Using Centrify DirectAudit."


Securing Access to UNIX, Linux and Mac with Active Directory

Need a way to centralize account administration without removing the security boundaries that naturally exist around your business systems? Join David McNeely, Centrify's Director of Product Management, in this webinar as he shows you how to prove "who has access to what" when the security auditors come knocking.


Active Directory Authentication for Non-Windows Systems

Centrify CTO Paul Moore and CEO Tom Kemp are featured in this on-demand video interview on Port25, Microsoft's public forum run by its Open Source Software lab. During that interview, Moore conducts an extensive whiteboard session to explain what it takes to authenticate UNIX and Linux systems using Active Directory. In a followup audio podcast, Moore returned to answer questions raised by viewers of the first event.