Last week, I discussed the first three reactions I had to the " Cisco 2017 Midyear Cybersecurity Report ." I discussed how vendor...Read More
privileged access security
When reading this year's "Cisco Midyear Cyber Security Report," a few things jump out that bear discussion. Vendor Consolidation First, one...Read More
As with most aspects of the EU, unhindered cross-border data flows are something most U.K. firms just take for granted these days. Thanks to...Read More
Ponemon Institute recently conducted a survey, sponsored by Centrify, designed to more deeply understand the current state of cybersecurity....Read More
Centrify is pleased to announce that KuppingerCole Identity as a Service (IDaaS) Leadership Compass Report names Centrify “Overall Leader.”...Read More
KuppingerCole just released the KuppingerCole Privilege Management, Leadership Compass. And I am excited to announce that Centirfy has been...Read More
Centrify has been identified by Gartner, Inc. as a visionary in the 2017 Magic Quadrant for Access Management. Centrify received the honor...Read More
A recent Forrester study examined four levels of identity and access management (IAM) maturity and found a direct correlation between the...Read More
When our baby first started crawling, we installed gates in all the doorways. This kept her in safe, baby proofed areas. We didn’t have to...Read More
Ready to Protect Against the #1 Attack Vector?
Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.