why Centrify

At Least Get A Vault

At Least Get A Vault

A Zero Trust Approach to Eliminating Password Spreadsheets

Forrester estimates that at least 80% of security breaches involve privileged credentials1. A recent Centrify survey of 1,000 IT decision makers places that number at 74%, and shows that:

  • 52% do not have a password vault
  • 65% are still sharing root or privileged access to systems and data at least somewhat often
  • 21% have not implemented Multi-Factor Authentication (MFA) for privileged admin access
  • 63% cannot turn off privileged access for an employee within a day

Something needs to change!

While Zero Trust is continuing to gain attention, many are just beginning to explore the concept and taking their first steps to implement a Zero Trust approach. One roadblock to implementation: knowing where to start.

Watch on-demand as Dr. Chase Cunningham, Forrester Principal Analyst and Dr. Torsten George, Centrify Cyber Security Evangelist, discuss:

  • Why a password vault and MFA are must-haves for Zero Trust Privilege
  • How Privileged Identity Management protects the ‘keys to the kingdom’
  • Where to start to achieve Zero Trust Security
  • Simple, easy steps to strengthen your security posture

SPEAKERS

Torsten George

Dr. Torsten George, Cyber Security Evangelist, Centrify

Torsten George is a cyber security evangelist at Centrify. He also serves as strategic advisory board member at vulnerability risk management software vendor, NopSec. He is an internationally recognized IT security expert, author, and speaker. Torsten has been part of the global IT security community for more than 25 years and regularly provides commentary and publishes articles on data breaches, insider threats, cyber warfare, incident response, and IT security best practices, as well as other cyber security topics in media outlets. He is also the co-author of the Zero Trust Privilege For Dummies book.

Chase Cunningham

Dr. Chase Cunningham, Principal Analyst, Forrester

¹“The Forrester Wave™: Privileged Identity Management, Q4 2018”

The form could not be loaded. This is most likely due to strict tracking protection in your browser.

Ready to Protect Against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial