Category: Centrify
Centrify Extends Industry-Leading PAM Deployment Options with Hyper-Scalable Privileged Access Service
In the 20.3 product release for Centrify Privileged Access Service (PAS), we unveiled a new architecture offering that allows hyper-scalable installations of PAS for on-premises deployments. This solution was built […]Centrify’s Channel Leaps Forward with Reliance Program, New Distributors
So far, the first half of 2020 has been busy at Centrify. We have focused on talking with our partners and customers to build a world-class channel providing Identity-Centric PAM […]Keep Laser-Focused on Securing Access to Your Datacenter Servers and Apps
Don’t Ignore Major Attack Surfaces Like Tenable and ServiceNow. A scary stat we’ve heard for a few years now is that around 80% of data breaches involve compromised privileged credentials, […]Cloud Changes Everything When it Comes to PAM
My role as Director of Corporate Communications at Centrify requires me to wear many hats. One of them is heading up our public relations program and making sure we get […]IDSA Report Reveals Continued Over-Confidence in Securing Privileged Identities
The Identity Defined Security Alliance (IDSA) recently published a new report titled, “Identity Security: A Work in Progress,” about the exponentially-growing number of workforce identities, and the challenges this growth brings […]Secure Remote Access Blog Part 2: The Best Approach
Welcome back! This is the second part of a blog about Secure Remote Access for IT Administrators, which highlights Good/Better/Best methods. In case you missed the first part, you can […]Centrify a LEADER in the 2020 KuppingerCole Leadership Compass for PAM
Centrify is honored and pleased to once again be named a LEADER in the recently-published 2020 KuppingerCole Leadership Compass for Privileged Access Management! We were also recognized as a leader […]Gartner Reports Outline the Path to PAM Maturity
Over the past couple of years, it’s been very satisfying to see the increased coverage for Privileged Access Management (PAM) from the industry analyst community. This was evidenced in December […]Secure Remote Access Blog Part 1: There are Better Approaches Than a VPN
As the full implications of the Coronavirus pandemic became clear to businesses in March, understandably there was a scramble to enable remote access for entire workforces – overnight! While many […]Just-in-Time (JIT) Access Series Part 3: Zero Standing Privileges
Welcome back to the conclusion of our three-part series on Just-in-Time (JIT) access. In part 1 we discussed what Just-in-Time access is and where it fits in to our Privileged […]Load More