Centrify Cyber Intelligence Tour Empowers Organizations with Zero Trust Security
Multi-City Executive Roadshow Provides Expert Updates on Cyber Threats and Attainable Solutions to Stop the Breach with Next-Gen Access
April 05, 2018
Santa Clara, CA — Centrify, a leading provider of Zero Trust Security through the power of Next-Gen Access, today announced a multi-city series of briefings offering attendees research on the top threats facing their organizations and information about how to protect valuable corporate data against unauthorized access, disclosure or misuse — especially as threats from cyber criminals grow in scale. The event series began in Chicago on March 21 and now moves to San Francisco, Dallas, Boston, and Atlanta with more to follow.
“High-profile breaches over the past year profoundly illustrated that the status quo is not working. The common denominator across the Yahoo, Equifax and Uber breaches was compromised identity,” said Rhonda Shantz, chief marketing officer at Centrify. “Bringing together the nation’s most authoritative cyber experts to discuss the true looming threats and how Zero Trust Security is attainable today will enable CISOs to better position their organizations in mitigating these attacks.”
Featured speaker and Zero Trust expert, Dr. Chase Cunningham, a principal security analyst at Forrester Research, will also provide his expertise related to security operations center (SOC) planning and optimization, counter-threat operations, encryption, network security, and Zero Trust concepts and implementation.
“Any organization considering a Zero Trust security strategy should also consider the application and use of next-generation access (NGA) technology,” wrote Cunningham. “Focusing solely on the network or data leaves gaping holes in security controls and will ultimately fail to fulfill any strategic security goals, much less a Zero Trust approach. NGA technologies enable better insight and better situational awareness of who is doing what in a network and enforce the policies that should be in place for data access, all key components of a Zero Trust strategy1.”
The rise of new legislation such as the Graham-Klobuchar Amendment, the Cyber Shield Act and the Paper Act is igniting a national dialogue around empowering private and public sector companies to secure their organizations and protect their employees, customers, and partners. Centrify delivers Zero Trust Security through the power of Next-Gen Access by verifying every user, validating their devices, and limiting access and privilege. Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a-Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM).
C-level executives interested in receiving an invitation to upcoming Centrify Cyber Intelligence Tour events can contact Centrify at ExecBriefings@centrify.com.
To learn more about Centrify Zero Trust Security, click here.
Centrify delivers Zero Trust Security through the power of Next-Gen Access. The Centrify Zero Trust Security model assumes that users inside a network are no more trustworthy than those outside the network. Centrify verifies every user, validates their devices, and limits access and privilege. Centrify also utilizes machine learning to discover risky user behavior and apply conditional access — without impacting user experience. Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a-Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). Over 5,000 worldwide organizations, including over half the Fortune 100, trust Centrify to proactively secure their businesses.
Centrify is a registered trademark of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.
Ready to Protect Against the #1 Attack Vector?
Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.