Centrify

Displaying 1-24 of 24 results

  • Webcasts // Apr 2015

    On-demand Webcast: Adding Macs to Your Enterprise? Start with Identity Management

    PC shipments in the first quarter of 2015 are down. On the other hand, shipments of Macs continue their steady rise, showing an 8.9 percent increase over the same quarter a year ago. If you manage PCs in your enterprise, you're undoubtedly seeing more and more Macs. It's no...

    Sponsored By Centrify

  • Webcasts // Feb 2015

    On-demand Webcast: Mobile devices, wearables, and the future of identity

    For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and even all your private communications. Today, the very concept of digital identity is under fire. Every week, we read about a new...

    Sponsored By Centrify

  • White Papers // Feb 2015

    Simplifying the Management of Macs and Mobile Devices

    A single, unified solution for managing Macs and mobile devices, Centrify Identity Service, Mac Edition, helps you meet the challenges of consumerization and an increasingly mobile workforce. While most solutions require setup of a parallel infrastructure for managing Macs, Centrify provides seamless, centralized management of Macs from Active Directory,...

    Sponsored By Centrify

  • White Papers // Feb 2015

    Buyer Pulse Buyer Case Study: Grand Island Public Schools Implements Identity Solution to Centralize Management and Increase Security

    Read this IDC Buyer’s Case Study focused on how Grand Island Public Schools (GIPS), a prekindergarten through grade 12 school district located in Grand Island, Nebraska, implemented the Centrify Identity Service for Mac and Mobile to integrate the school system's fleet of Mac computers with Active Directory and provide unified...

    Sponsored By Centrify

  • Webcasts // Feb 2015

    On-demand Webcast: Single Sign On: Past, Present, and Future

    Since the invention of the second app, IT has had to implement single sign on to eliminate the hassles of multiple passwords. But can we leverage what we have learned about on-premises SSO to solve today’s cloud and mobile identity challenges? And how can we deploy solutions today that don’t...

    Sponsored By Centrify

  • Webcasts // Nov 2014

    On-demand Webcast: SaaS Apps? BYOD? Take Cloud Control

    Centrify User Suite Puts IT Back in the Driver’s Seat Cloud apps continue to find their way into enterprises, promising productivity but often causing headaches. Each app has its own set of login credentials for people to forget or re-use, IT has no centralized way to grant and revoke access...

    Provided By Centrify

  • Webcasts // Oct 2014

    On-demand Webcast: Centrify and Dropbox for secure collaboration

    Dropbox for Business lets organizations better access and control company data, with admin features that make it easy to deploy, provision, and manage effectively. Centrify offers an easy-to-deploy cloud service that delivers the industry's most comprehensive solution for Active Directory-based single sign-on, access control, and mobile device management for thousands...

    Provided By Centrify

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Product Overview

    The idea that employees may be storing corporate data together with their vacation photos on their smartphones is enough to give IT administrators and corporate compliance managers nightmares. At the same time, nobody wants to lug around separate devices for work and home use, and BYOD makes workers happier and...

    Provided By Centrify

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Spotlight

    Employees are clamoring for BYOD; regulators and industry groups are clamoring for tighter security and stronger data protection measures. There is a way to balance these seemingly divergent demands: integrated access control and mobile device management. Samsung Knox and Centrify have partnered to deliver secure container environments inside mobile...

    Provided By Centrify

  • White Papers // Nov 2013

    An Overview of Samsung KNOX Active Directory and Group Policy Features

    Samsung KNOX is a set of business focused enhancements to the Android mobile environment for selected Samsung mobile devices. One of the most important new enterprise features provided with KNOX is the ability for KNOX devices to be joined, secured and managed by a Microsoft Active Directory infrastructure. An important...

    Provided By Centrify

  • White Papers // Nov 2013

    Samsung KNOX: An Overview for Business Customers

    Samsung, the mobile device market leader, has introduced Samsung KNOX™ for its Android-based mobile platforms to satisfy the device management and security needs of business and government customers. This document provides a more detailed overview of the enterprise integration and management features in Samsung KNOX with a focus on its...

    Provided By Centrify

  • White Papers // Nov 2013

    Enterprise Identity Where You Want It

    Gartner ranked Cloud-based Identity and Access Management as the largest market segment in this year's $2 billion cloud-based security services market. Gartner raised some concerns about cloud identity with a focus on where identity is stored. Tom Kemp, CEO of Centrify, explores this issue in more detail and correlates this...

    Provided By Centrify

  • Podcasts // Sep 2013

    Implementing Single Sign-On for Office 365: Why must it be so complex?

    Learn more from Microsoft expert Randy Franklin Smith. View the webinar now!

    Provided By Centrify

  • White Papers // Sep 2013

    Identity and Access Management in the Cloud Era

    The explosion of mobile devices, fragmented network access and multiple operating systems makes identity management a big challenge. Centrify through its wide range of products is able to provide firms both basic and advanced identity access management solutions making a fully integrated security possible – across all platforms, across all...

    Provided By Centrify

  • White Papers // Apr 2013

    Office 365 Single Sign-On: High Availability without High Complexity

    For most organizations, the move to Office 365 (O365) is a leap forward in user experience, productivity, it simplification, and savings. But organizations that fail to implement Single Sign-On (SSO) reliably can slip backwards in several key areas. Risk can actually increase and productivity suffer. Learn why SSO for...

    Provided By Centrify

  • White Papers // Jan 2013

    Windows Least Privilege Management and Beyond

    Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has its own access control list and the myriad of OS level rights and integrity levels vary by Windows version). For Windows environments it is critical that organizations can delegate administration and establish...

    Provided By Centrify

  • White Papers // Jan 2013

    Stop Password Sprawl with SaaS Single Sign-On via Active Directory

    Organizations are rushing to SaaS in an effort to move business initiatives along faster than the traditional cycle of implementation, integration and on-going maintenance associated with on-premise applications. But, executives and IT managers are realizing that SaaS adoption is part of a larger set of trends where mobile devices and...

    Provided By Centrify

  • White Papers // Nov 2012

    Enforcing Enterprise-out Security for Cloud Servers

    Cloud-based computing models offer the promise of a highly scalable compute infrastructure without having to acquire, install and maintain any additional hardware. However, implementing this new compute model using even the most trusted service providers requires a security solution that empowers IT to maintain control over user and network access...

    Provided By Centrify

  • White Papers // Nov 2012

    Centrally Controlling, Securing and Auditing Access to Cross-Platform Systems and Applications Using the Centrify Suite

    For most IT organization, a mixture of Windows UNIX, Linux and Mac OS X platforms is simply a fact of life. However, reducing IT complexity has become a critical issue in the past few years as an uncertain economy has put renewed focus on reducing expenses and leveraging existing investments....

    Provided By Centrify

  • White Papers // Nov 2012

    Improving Mobile Device Security and Management with Active Directory

    As more and more workers bring personal devices to work for increased productivity and mobile access organizations must quickly respond to the security and compliance risks posed by largely unmanaged access to corporate information. Enterprises can expect to see tablet sales alone increase by 250% in 2012, primarily iPads, which...

    Provided By Centrify

  • White Papers // Nov 2012

    Using Microsoft Active Directory to Address Payment Card Industry (PCI) Data Security Standard Requirements in Heterogeneous Environments

    The stiff penalties defined by PCI members are designed to ensure that all merchants and service providers work to maintain consumer trust of payment cards since that loss would impact the revenues of all merchants and financial institutions. This white paper examines the compelling business and technical case for...

    Provided By Centrify

  • White Papers // Nov 2012

    Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security

    Capturing the detailed actions of privileged users is even more critical in today's business environment that is driving cost efficiencies through IT outsourcing, off-shoring and supplementing IT staff with contractors. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation...

    Provided By Centrify

  • White Papers // Nov 2012

    Enforcing Enterprise-out Security for Cloud Servers

    Cloud-based computing models offer the promise of a highly scalable compute infrastructure without having to acquire, install and maintain any additional hardware. However, implementing this new compute model using even the most trusted service providers requires a security solution that empowers IT to maintain control over user and network access...

    Provided By Centrify

  • Webcasts // Jan 2010

    Centrify Security Solutions for PCI Compliance

    The attendee of this webcast will learn how Centrify helps corporate IT security managers address the key provisions of Sections 7, 8 and 10 of the PCI Data Security Standard for their UNIX and Linux systems.

    Provided By Centrify

  • White Papers // Feb 2015

    Simplifying the Management of Macs and Mobile Devices

    A single, unified solution for managing Macs and mobile devices, Centrify Identity Service, Mac Edition, helps you meet the challenges of consumerization and an increasingly mobile workforce. While most solutions require setup of a parallel infrastructure for managing Macs, Centrify provides seamless, centralized management of Macs from Active Directory,...

    Sponsored By Centrify

  • White Papers // Feb 2015

    Buyer Pulse Buyer Case Study: Grand Island Public Schools Implements Identity Solution to Centralize Management and Increase Security

    Read this IDC Buyer’s Case Study focused on how Grand Island Public Schools (GIPS), a prekindergarten through grade 12 school district located in Grand Island, Nebraska, implemented the Centrify Identity Service for Mac and Mobile to integrate the school system's fleet of Mac computers with Active Directory and provide unified...

    Sponsored By Centrify

  • Webcasts // Feb 2015

    On-demand Webcast: Single Sign On: Past, Present, and Future

    Since the invention of the second app, IT has had to implement single sign on to eliminate the hassles of multiple passwords. But can we leverage what we have learned about on-premises SSO to solve today’s cloud and mobile identity challenges? And how can we deploy solutions today that don’t...

    Sponsored By Centrify

  • Webcasts // Feb 2015

    On-demand Webcast: Mobile devices, wearables, and the future of identity

    For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and even all your private communications. Today, the very concept of digital identity is under fire. Every week, we read about a new...

    Sponsored By Centrify

  • Webcasts // Apr 2015

    On-demand Webcast: Adding Macs to Your Enterprise? Start with Identity Management

    PC shipments in the first quarter of 2015 are down. On the other hand, shipments of Macs continue their steady rise, showing an 8.9 percent increase over the same quarter a year ago. If you manage PCs in your enterprise, you're undoubtedly seeing more and more Macs. It's no...

    Sponsored By Centrify

  • Webcasts // Jan 2010

    Centrify Security Solutions for PCI Compliance

    The attendee of this webcast will learn how Centrify helps corporate IT security managers address the key provisions of Sections 7, 8 and 10 of the PCI Data Security Standard for their UNIX and Linux systems.

    Provided By Centrify

  • White Papers // Nov 2012

    Centrally Controlling, Securing and Auditing Access to Cross-Platform Systems and Applications Using the Centrify Suite

    For most IT organization, a mixture of Windows UNIX, Linux and Mac OS X platforms is simply a fact of life. However, reducing IT complexity has become a critical issue in the past few years as an uncertain economy has put renewed focus on reducing expenses and leveraging existing investments....

    Provided By Centrify

  • White Papers // Nov 2012

    Improving Mobile Device Security and Management with Active Directory

    As more and more workers bring personal devices to work for increased productivity and mobile access organizations must quickly respond to the security and compliance risks posed by largely unmanaged access to corporate information. Enterprises can expect to see tablet sales alone increase by 250% in 2012, primarily iPads, which...

    Provided By Centrify

  • White Papers // Nov 2012

    Using Microsoft Active Directory to Address Payment Card Industry (PCI) Data Security Standard Requirements in Heterogeneous Environments

    The stiff penalties defined by PCI members are designed to ensure that all merchants and service providers work to maintain consumer trust of payment cards since that loss would impact the revenues of all merchants and financial institutions. This white paper examines the compelling business and technical case for...

    Provided By Centrify

  • White Papers // Nov 2012

    Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security

    Capturing the detailed actions of privileged users is even more critical in today's business environment that is driving cost efficiencies through IT outsourcing, off-shoring and supplementing IT staff with contractors. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation...

    Provided By Centrify

  • White Papers // Nov 2012

    Enforcing Enterprise-out Security for Cloud Servers

    Cloud-based computing models offer the promise of a highly scalable compute infrastructure without having to acquire, install and maintain any additional hardware. However, implementing this new compute model using even the most trusted service providers requires a security solution that empowers IT to maintain control over user and network access...

    Provided By Centrify

  • White Papers // Nov 2012

    Enforcing Enterprise-out Security for Cloud Servers

    Cloud-based computing models offer the promise of a highly scalable compute infrastructure without having to acquire, install and maintain any additional hardware. However, implementing this new compute model using even the most trusted service providers requires a security solution that empowers IT to maintain control over user and network access...

    Provided By Centrify

  • White Papers // Jan 2013

    Stop Password Sprawl with SaaS Single Sign-On via Active Directory

    Organizations are rushing to SaaS in an effort to move business initiatives along faster than the traditional cycle of implementation, integration and on-going maintenance associated with on-premise applications. But, executives and IT managers are realizing that SaaS adoption is part of a larger set of trends where mobile devices and...

    Provided By Centrify

  • White Papers // Sep 2013

    Identity and Access Management in the Cloud Era

    The explosion of mobile devices, fragmented network access and multiple operating systems makes identity management a big challenge. Centrify through its wide range of products is able to provide firms both basic and advanced identity access management solutions making a fully integrated security possible – across all platforms, across all...

    Provided By Centrify

  • Podcasts // Sep 2013

    Implementing Single Sign-On for Office 365: Why must it be so complex?

    Learn more from Microsoft expert Randy Franklin Smith. View the webinar now!

    Provided By Centrify

  • White Papers // Apr 2013

    Office 365 Single Sign-On: High Availability without High Complexity

    For most organizations, the move to Office 365 (O365) is a leap forward in user experience, productivity, it simplification, and savings. But organizations that fail to implement Single Sign-On (SSO) reliably can slip backwards in several key areas. Risk can actually increase and productivity suffer. Learn why SSO for...

    Provided By Centrify

  • White Papers // Nov 2013

    An Overview of Samsung KNOX Active Directory and Group Policy Features

    Samsung KNOX is a set of business focused enhancements to the Android mobile environment for selected Samsung mobile devices. One of the most important new enterprise features provided with KNOX is the ability for KNOX devices to be joined, secured and managed by a Microsoft Active Directory infrastructure. An important...

    Provided By Centrify

  • White Papers // Nov 2013

    Samsung KNOX: An Overview for Business Customers

    Samsung, the mobile device market leader, has introduced Samsung KNOX™ for its Android-based mobile platforms to satisfy the device management and security needs of business and government customers. This document provides a more detailed overview of the enterprise integration and management features in Samsung KNOX with a focus on its...

    Provided By Centrify

  • White Papers // Nov 2013

    Enterprise Identity Where You Want It

    Gartner ranked Cloud-based Identity and Access Management as the largest market segment in this year's $2 billion cloud-based security services market. Gartner raised some concerns about cloud identity with a focus on where identity is stored. Tom Kemp, CEO of Centrify, explores this issue in more detail and correlates this...

    Provided By Centrify

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Product Overview

    The idea that employees may be storing corporate data together with their vacation photos on their smartphones is enough to give IT administrators and corporate compliance managers nightmares. At the same time, nobody wants to lug around separate devices for work and home use, and BYOD makes workers happier and...

    Provided By Centrify

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Spotlight

    Employees are clamoring for BYOD; regulators and industry groups are clamoring for tighter security and stronger data protection measures. There is a way to balance these seemingly divergent demands: integrated access control and mobile device management. Samsung Knox and Centrify have partnered to deliver secure container environments inside mobile...

    Provided By Centrify

  • Webcasts // Nov 2014

    On-demand Webcast: SaaS Apps? BYOD? Take Cloud Control

    Centrify User Suite Puts IT Back in the Driver’s Seat Cloud apps continue to find their way into enterprises, promising productivity but often causing headaches. Each app has its own set of login credentials for people to forget or re-use, IT has no centralized way to grant and revoke access...

    Provided By Centrify

  • Webcasts // Oct 2014

    On-demand Webcast: Centrify and Dropbox for secure collaboration

    Dropbox for Business lets organizations better access and control company data, with admin features that make it easy to deploy, provision, and manage effectively. Centrify offers an easy-to-deploy cloud service that delivers the industry's most comprehensive solution for Active Directory-based single sign-on, access control, and mobile device management for thousands...

    Provided By Centrify

  • White Papers // Jan 2013

    Windows Least Privilege Management and Beyond

    Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has its own access control list and the myriad of OS level rights and integrity levels vary by Windows version). For Windows environments it is critical that organizations can delegate administration and establish...

    Provided By Centrify