Centrify Ushers in the Era of Zero Trust Security and Next-Gen Access
Company announces industry’s first Zero Trust Summit for CIOs and CISOs
April 16, 2018
RSA CONFERENCE — SAN FRANCISCO, CA — Centrify, a leading provider of Zero Trust Security through the power of Next-Gen Access, today announced a series of firsts — including a national initiative to secure the 2018 midterm elections, new Zero Trust Security capabilities for DevOps, and the industry’s first Zero Trust Summit — all designed to enable CIOs and CISOs with attainable solutions to address new enterprise security challenges.
The 2017 Data Breach Investigation Report released by Verizon revealed that 81 percent of breaches involve weak, default, or stolen passwords. As result, organizations are adopting Zero Trust Security, which assumes that bad actors are already in the network and that known users are no more trustworthy than the unknown.
In fact, Forrester principal analyst Dr. Chase Cunningham recently published a blog stating that, “any organization considering a Zero Trust security strategy should also consider the application and use of next-generation access (NGA) technology.1”
Centrify Next-Gen Access combines Identity-as-a-Service (IDaaS), Enterprise Mobility Management (EMM) and Privileged Access Management (PAM) in an integrated solution. NGA offers a collective set of mature and proven technologies and capabilities that is aware of every device, knows every user, limits access and privilege intelligently, and allows policies to learn and adapt without impacting user experiences.
Centrify is leading the industry in defining and setting the standard for Zero Trust Security through the power of Next-Gen Access, including:
SECURIT: THE ZERO TRUST SUMMIT FOR CIOS AND CSOS
Centrify is co-hosting with IDG the first industry event of its kind, “SecurIT: The Zero Trust Summit for CIOs and CSOs,” will bring together authoritative industry experts to help explain Zero Trust Security, why it matters, and where to begin. The summit, to be held Wednesday, June 13 in San Francisco, will allow attendees to gain an up-to-the-minute understanding of Zero Trust Security and hear from other organizations that are already implementing this new framework.
SECURE THE VOTE: SAFEGUARDING THE ELECTIONS WITH CENTRIFY ZERO TRUST SECURITY
At RSA Conference, Centrify also unveiled a pioneering campaign to secure the 2018 U.S. midterm elections and help safeguard our democracy. Under the national initiative, Centrify is extending its Identity-as-a-Service and Privileged Access Management leadership to state, county, and city Election Boards and Officials for the 2018 election. Effective today, the company is providing its Next-Gen Access solutions to eligible Election Boards at no cost for the first eight months of a 12-month (or more) SaaS subscription, representing a 66 percent discount on MSRP. Centrify is also offering a 10 percent discount to new Election Board customers to take advantage of its Jump Start professional services program to ensure a smooth and successful deployment of Centrify Zero Trust Security.
CENTRIFY ZERO TRUST CYBER INTELLIGENCE TOUR
Additionally, in the wake of high-profile breaches at Equifax, Yahoo!, and Uber, Centrify is launching a multi-city Zero Trust roadshow that provides expert updates on cyber threats, as well as attainable solutions to stop breaches with Next-Gen Access. This invitation-only cyber tour includes a briefing about the top threats facing private and public sector organizations. It will also detail information about how to protect valuable corporate data against unauthorized access, disclosure or misuse—especially as threats from cyber criminals grow in scale. The event series began in Chicago and will move to San Francisco, Dallas, Boston, and Atlanta, with more to cities follow. For more information on attending, please email: [email protected].
Finally, Centrify is extending its Zero Trust Security platform to DevOps environments. Centrify customers can now reduce their exposure to common security threats in their application development pipelines without compromising security, velocity, or scalability by leveraging Centrify Next-Gen Access. This Zero Trust approach presumes that users, applications, and endpoints are not trustworthy and must be verified at every point of access so that security of the development pipeline is not compromised.
“We have entered a new era of Zero Trust Security in which untrusted actors already exist both inside and outside the network, which requires a ‘never trust, always verify’ approach to decrease the chance of a breach,” said Tom Kemp, chief executive officer at Centrify. “With Centrify Zero Trust Security, we are delivering the best approach for CIOs and CISOs to effectively protect their organizations from modern threats and stop the breach.”
Forrester’s Cunningham went on to write, “focusing solely on the network or data leaves gaping holes in security controls and will ultimately fail to fulfill any strategic security goals, much less a Zero Trust approach. NGA technologies enable better insight and better situational awareness of who is doing what in a network and enforce the policies that should be in place for data access, all key components of a Zero Trust strategy.2”
To learn more about Centrify Zero Trust Security, please visit www.centrify.com.
Centrify delivers Zero Trust Security through the power of Next-Gen Access. The Centrify Zero Trust Security model assumes that users inside a network are no more trustworthy than those outside the network. Centrify verifies every user, validates their devices, and limits access and privilege. Centrify also utilizes machine learning to discover risky user behavior and apply conditional access — without impacting user experience. Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a-Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). Over 5,000 worldwide organizations, including over half the Fortune 100, trust Centrify to proactively secure their businesses.
Centrify is a registered trademark of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.
Ready to Protect Against the #1 Attack Vector?
Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.