Centrify Receives 2019 Cloud Computing Security Excellence Award

January 23, 2020

We’re starting off the new year at Centrify with exciting news – TMC, a global, integrated media company, has named Centrify as a 2019 Cloud Computing Security Excellence Award winner!

Cloud Computer Award Cropped

The Cloud Computing Security Excellence Award, presented by Cloud Computing Magazine, recognizes companies that have most effectively leveraged cloud computing in their efforts to bring new, differentiated offerings to market.

The cloud’s availability, accessibility, scalability, and speed of delivery make it an attractive option to deliver IT services more efficiently and affordably. But, for years, one of the reasons many organizations have delayed their cloud migrations has been security. This is exemplified in our recent report, “Reducing Risk in Cloud Migrations,” where 60% of respondents identified security as the top challenge in migrating to the cloud.

Centrify helps customers enable cloud transformation by bringing market leading access controls to the critical compute infrastructures moving to cloud, lowering customers’ overall risk.   This is the lowest hanging fruit and a huge opportunity for organizations given that 68% are still not implementing Privileged Access Management (PAM) best practices in cloud environments. Our Identity-centric PAM solutions can help keep cloud infrastructure and applications secure by controlling privileged access to cloud administrative accounts and workloads based on unique, entitled identities, not shared or root passwords.

BUT WAIT, THERE'S MORE

It’s one of the reasons we were recognized with this honor, as well as being named a finalist in the 2020 SC Awards for Best Cloud Computing Security Solution. We hope to bring home that hardware as well next month at the 2020 RSA Conference in San Francisco.

How can you be a hero to your organization by enabling cloud transformation with confidence rather than concerns about security? It’s time to rethink your enterprise security strategies and move to an identity-centric approach based on Zero Trust: never trust, always verify, employ least privilege. This approach should be implemented throughout the entire organization, and extended to the organization’s partners and outsourced IT. Join many of the world’s largest companies who have successfully paved their journey to the cloud with Centrify.

For more information about Centrify, visit www.centrify.com