Featured Posts

Combat Data Breaches, Weak Passwords, and Phishing Attacks with Multi-Factor Authentication
Forrester Research has estimated that 80 percent of security breaches involve weak, default, stolen, or otherwise compromised privileged...
Read More

Securing DevOps with Centrify Delegated Machine Credentials
At its core, DevOps focuses on delivering faster time to market with more reliability and efficiency through a cycle of rapid, continuous...
Read More

Solving the Achilles’ Heel of Password Vaulting with the Centrify Client
Assuring high availability of computers, applications, and services to keep the business running, is one of the many tasks of information...
Read More

Centrify Extends Industry-Leading PAM Deployment Options with Hyper-Scalable Privileged Access Service
In the 20.3 product release for Centrify Privileged Access Service (PAS), we unveiled a new architecture offering that allows hyper-scalable...
Read More

Modern Phishing Campaigns and Effective Prevention
The last few months have definitely not been business as usual. Threat actors are taking full advantage of these uncertain times by...
Read More

Centrify’s Channel Leaps Forward with Reliance Program, New Distributors
So far, the first half of 2020 has been busy at Centrify. We have focused on talking with our partners and customers to build a world-class...
Read More