Forrester Research has estimated that 80 percent of security breaches involve weak, default, stolen, or otherwise compromised privileged...Read More
The last few months have definitely not been business as usual. Threat actors are taking full advantage of these uncertain times by...Read More
The Identity Defined Security Alliance (IDSA) recently published a new report titled, "Identity Security: A Work in Progress," about the...Read More
Welcome back to the conclusion of our three-part series on Just-in-Time (JIT) access. In part 1 we discussed what Just-in-Time access is and...Read More
If you leave your house, there’s a good chance that you always lock and bolt the front door. But would you leave the back door unlocked for...Read More
According to Gartner, cyber security is one of the top risks for businesses in the Middle East. Within that region, Saudi Arabia is one of...Read More
A great benefit of Centrify’s Privileged Access Service (PAS) is that, as a native SaaS service, there’s an agile development process behind...Read More
Centrify VP of Marketing Andy Smith spoke at the inaugural Chrysalis Conference by Techvision Research, and shares 3 key takeaways in a new...Read More
Centrify's new report details risks organizations are facing in migrating to cloud, specifically with controlling privileged access to cloud...Read More
Ready to Protect Against the #1 Attack Vector?
Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.