Centrify

Displaying 1-24 of 24 results

  • Webcasts // Mar 2014

    On-demand Webcast: Enterprise-proofing the Apple ecosystem with Centrify and Aqua Connect

    Here's something new. Most IT folks are familiar with terminal services on Windows Server, but did you know you can provide remote, secure terminal services with OS X? It's not only possible; it's a technology that allows you to provide the entire Macintosh experience to neglected corporate and enterprise users...

    Sponsored By Centrify

  • Webcasts // Feb 2014

    On-demand Webcast: How Centrify and Zoom can help you secure your cloud and mobile conferencing

    The Internet makes distances disappear. Take meetings, for example. No longer do meetings among geographically diverse participants require the cost and discomfort of air travel. Now, it's simply a matter of launching an app or signing into a desktop, making sure your hair is combed, and looking into the camera....

    Sponsored By Centrify

  • Webcasts // Feb 2014

    On-demand Webcast: Overcoming the challenges of multifactor authentication

    Many cloud service providers are rolling out two-factor authentication features to address the increasing challenges that come from relying on passwords alone to secure user access and company data. Multifactor authentication is a great step towards stronger security and access management. Unfortunately, for enterprises that leverage more than a...

    Sponsored By Centrify

  • Webcasts // Dec 2013

    On-demand Webcast: Secure Collaboration with Dropbox for Business and Centrify SSO for SaaS and mobile

    Dropbox for Business lets you collaborate with ease, making storing and sharing files both intuitive and secure. More than 4 million businesses use Dropbox everyday to work smarter. Centrify and Dropbox have partnered to give Dropbox for Business users single sign-on and provide IT with centralized management and security using...

    Sponsored By Centrify

  • White Papers // Nov 2013

    An Overview of Samsung KNOX Active Directory and Group Policy Features

    Samsung KNOX is a set of business focused enhancements to the Android mobile environment for selected Samsung mobile devices. One of the most important new enterprise features provided with KNOX is the ability for KNOX devices to be joined, secured and managed by a Microsoft Active Directory infrastructure. An important...

    Sponsored By Centrify

  • Webcasts // Nov 2013

    On-demand Webcast: SaaS, single sign-on, and security: how can this possibly work?

    Quick... how many cloud accounts do you have? How many email accounts? How many software-as-a-service accounts? How many job-specific accounts? It's a lot, right? Many of you probably even have multiple accounts for certain services. Managing all this can be a mess. It gets worse when you or your...

    Sponsored By Centrify

  • Webcasts // Nov 2013

    On-demand Webcast - Enterprise mobile security done right with Samsung KNOX and Centrify

    Centrify for Samsung KNOX is included as a standard feature set of Samsung KNOX and provides complete Active Directory based Mobile Device Management and Zero Sign-On sign-on for KNOX devices. As a result of Centrify's integration with KNOX, organizations can leverage Centrify's cloud service to comprehensively manage Android users and...

    Sponsored By Centrify

  • White Papers // Nov 2013

    Samsung KNOX: An Overview for Business Customers

    Samsung, the mobile device market leader, has introduced Samsung KNOX™ for its Android-based mobile platforms to satisfy the device management and security needs of business and government customers. This document provides a more detailed overview of the enterprise integration and management features in Samsung KNOX with a focus on its...

    Sponsored By Centrify

  • White Papers // Nov 2013

    Enterprise Identity Where You Want It

    Gartner ranked Cloud-based Identity and Access Management as the largest market segment in this year's $2 billion cloud-based security services market. Gartner raised some concerns about cloud identity with a focus on where identity is stored. Tom Kemp, CEO of Centrify, explores this issue in more detail and correlates this...

    Sponsored By Centrify

  • Podcasts // Sep 2013

    Implementing Single Sign-On for Office 365: Why must it be so complex?

    Learn more from Microsoft expert Randy Franklin Smith. View the webinar now!

    Sponsored By Centrify

  • White Papers // Sep 2013

    Identity and Access Management in the Cloud Era

    The explosion of mobile devices, fragmented network access and multiple operating systems makes identity management a big challenge. Centrify through its wide range of products is able to provide firms both basic and advanced identity access management solutions making a fully integrated security possible – across all platforms, across all...

    Sponsored By Centrify

  • Webcasts // Aug 2013

    On-demand Webcast: Choosing the right online productivity suite: Office 365 vs. Google Apps

    Today's productivity suites offer far more than just word processing, spreadsheets, and email. They're also no longer restricted to the desktop. Cloud-based suites from Microsoft and Google provide the standard productivity apps as well as collaboration, conferencing, and file storage. But choosing between Office 365 and Google Apps (or whether...

    Sponsored By Centrify

  • White Papers // Apr 2013

    Office 365 Single Sign-On: High Availability without High Complexity

    For most organizations, the move to Office 365 (O365) is a leap forward in user experience, productivity, it simplification, and savings. But organizations that fail to implement Single Sign-On (SSO) reliably can slip backwards in several key areas. Risk can actually increase and productivity suffer. Learn why SSO for...

    Sponsored By Centrify

  • White Papers // Jan 2013

    Stop Password Sprawl with SaaS Single Sign-On via Active Directory

    Organizations are rushing to SaaS in an effort to move business initiatives along faster than the traditional cycle of implementation, integration and on-going maintenance associated with on-premise applications. But, executives and IT managers are realizing that SaaS adoption is part of a larger set of trends where mobile devices and...

    Provided By Centrify

  • White Papers // Jan 2013

    Windows Least Privilege Management and Beyond

    Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has its own access control list and the myriad of OS level rights and integrity levels vary by Windows version). For Windows environments it is critical that organizations can delegate administration and establish...

    Provided By Centrify

  • White Papers // Nov 2012

    Enforcing Enterprise-out Security for Cloud Servers

    Cloud-based computing models offer the promise of a highly scalable compute infrastructure without having to acquire, install and maintain any additional hardware. However, implementing this new compute model using even the most trusted service providers requires a security solution that empowers IT to maintain control over user and network access...

    Provided By Centrify

  • White Papers // Nov 2012

    Improving Mobile Device Security and Management with Active Directory

    As more and more workers bring personal devices to work for increased productivity and mobile access organizations must quickly respond to the security and compliance risks posed by largely unmanaged access to corporate information. Enterprises can expect to see tablet sales alone increase by 250% in 2012, primarily iPads, which...

    Provided By Centrify

  • White Papers // Nov 2012

    Using Microsoft Active Directory to Address Payment Card Industry (PCI) Data Security Standard Requirements in Heterogeneous Environments

    The stiff penalties defined by PCI members are designed to ensure that all merchants and service providers work to maintain consumer trust of payment cards since that loss would impact the revenues of all merchants and financial institutions. This white paper examines the compelling business and technical case for...

    Provided By Centrify

  • White Papers // Nov 2012

    Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security

    Capturing the detailed actions of privileged users is even more critical in today's business environment that is driving cost efficiencies through IT outsourcing, off-shoring and supplementing IT staff with contractors. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation...

    Provided By Centrify

  • White Papers // Nov 2012

    Enforcing Enterprise-out Security for Cloud Servers

    Cloud-based computing models offer the promise of a highly scalable compute infrastructure without having to acquire, install and maintain any additional hardware. However, implementing this new compute model using even the most trusted service providers requires a security solution that empowers IT to maintain control over user and network access...

    Provided By Centrify

  • White Papers // Nov 2012

    Centrally Controlling, Securing and Auditing Access to Cross-Platform Systems and Applications Using the Centrify Suite

    For most IT organization, a mixture of Windows UNIX, Linux and Mac OS X platforms is simply a fact of life. However, reducing IT complexity has become a critical issue in the past few years as an uncertain economy has put renewed focus on reducing expenses and leveraging existing investments....

    Provided By Centrify

  • White Papers // Feb 2012

    Improving Mobile Device Security and Management with Active Directory

    As more and more workers bring personal devices to work for increased productivity and mobile access organizations must quickly respond to the security and compliance risks posed by largely unmanaged access to corporate information. Enterprises can expect to see tablet sales alone increase by 250% in 2012, primarily iPads, which...

    Provided By Centrify

  • Webcasts // Jan 2010

    Centrify Security Solutions for PCI Compliance

    The attendee of this webcast will learn how Centrify helps corporate IT security managers address the key provisions of Sections 7, 8 and 10 of the PCI Data Security Standard for their UNIX and Linux systems.

    Provided By Centrify

  • White Papers // Oct 2008

    Using Centrify's DirectControl With Mac OS X

    This white paper provides an overview of the features and benefits of using Centrify DirectControl, and describes how an organization can realize substantial benefits by using DirectControl to integrate and centrally manage Mac OS X systems with Active Directory. Macintosh computers have found widespread usage within several industries such as...

    Provided By Centrify

  • White Papers // Nov 2013

    Samsung KNOX: An Overview for Business Customers

    Samsung, the mobile device market leader, has introduced Samsung KNOX™ for its Android-based mobile platforms to satisfy the device management and security needs of business and government customers. This document provides a more detailed overview of the enterprise integration and management features in Samsung KNOX with a focus on its...

    Sponsored By Centrify

  • Podcasts // Sep 2013

    Implementing Single Sign-On for Office 365: Why must it be so complex?

    Learn more from Microsoft expert Randy Franklin Smith. View the webinar now!

    Sponsored By Centrify

  • White Papers // Apr 2013

    Office 365 Single Sign-On: High Availability without High Complexity

    For most organizations, the move to Office 365 (O365) is a leap forward in user experience, productivity, it simplification, and savings. But organizations that fail to implement Single Sign-On (SSO) reliably can slip backwards in several key areas. Risk can actually increase and productivity suffer. Learn why SSO for...

    Sponsored By Centrify

  • White Papers // Sep 2013

    Identity and Access Management in the Cloud Era

    The explosion of mobile devices, fragmented network access and multiple operating systems makes identity management a big challenge. Centrify through its wide range of products is able to provide firms both basic and advanced identity access management solutions making a fully integrated security possible – across all platforms, across all...

    Sponsored By Centrify

  • White Papers // Nov 2013

    An Overview of Samsung KNOX Active Directory and Group Policy Features

    Samsung KNOX is a set of business focused enhancements to the Android mobile environment for selected Samsung mobile devices. One of the most important new enterprise features provided with KNOX is the ability for KNOX devices to be joined, secured and managed by a Microsoft Active Directory infrastructure. An important...

    Sponsored By Centrify

  • White Papers // Nov 2013

    Enterprise Identity Where You Want It

    Gartner ranked Cloud-based Identity and Access Management as the largest market segment in this year's $2 billion cloud-based security services market. Gartner raised some concerns about cloud identity with a focus on where identity is stored. Tom Kemp, CEO of Centrify, explores this issue in more detail and correlates this...

    Sponsored By Centrify

  • Webcasts // Feb 2014

    On-demand Webcast: Overcoming the challenges of multifactor authentication

    Many cloud service providers are rolling out two-factor authentication features to address the increasing challenges that come from relying on passwords alone to secure user access and company data. Multifactor authentication is a great step towards stronger security and access management. Unfortunately, for enterprises that leverage more than a...

    Sponsored By Centrify

  • Webcasts // Mar 2014

    On-demand Webcast: Enterprise-proofing the Apple ecosystem with Centrify and Aqua Connect

    Here's something new. Most IT folks are familiar with terminal services on Windows Server, but did you know you can provide remote, secure terminal services with OS X? It's not only possible; it's a technology that allows you to provide the entire Macintosh experience to neglected corporate and enterprise users...

    Sponsored By Centrify

  • Webcasts // Feb 2014

    On-demand Webcast: How Centrify and Zoom can help you secure your cloud and mobile conferencing

    The Internet makes distances disappear. Take meetings, for example. No longer do meetings among geographically diverse participants require the cost and discomfort of air travel. Now, it's simply a matter of launching an app or signing into a desktop, making sure your hair is combed, and looking into the camera....

    Sponsored By Centrify

  • Webcasts // Nov 2013

    On-demand Webcast - Enterprise mobile security done right with Samsung KNOX and Centrify

    Centrify for Samsung KNOX is included as a standard feature set of Samsung KNOX and provides complete Active Directory based Mobile Device Management and Zero Sign-On sign-on for KNOX devices. As a result of Centrify's integration with KNOX, organizations can leverage Centrify's cloud service to comprehensively manage Android users and...

    Sponsored By Centrify

  • Webcasts // Aug 2013

    On-demand Webcast: Choosing the right online productivity suite: Office 365 vs. Google Apps

    Today's productivity suites offer far more than just word processing, spreadsheets, and email. They're also no longer restricted to the desktop. Cloud-based suites from Microsoft and Google provide the standard productivity apps as well as collaboration, conferencing, and file storage. But choosing between Office 365 and Google Apps (or whether...

    Sponsored By Centrify

  • Webcasts // Dec 2013

    On-demand Webcast: Secure Collaboration with Dropbox for Business and Centrify SSO for SaaS and mobile

    Dropbox for Business lets you collaborate with ease, making storing and sharing files both intuitive and secure. More than 4 million businesses use Dropbox everyday to work smarter. Centrify and Dropbox have partnered to give Dropbox for Business users single sign-on and provide IT with centralized management and security using...

    Sponsored By Centrify

  • Webcasts // Nov 2013

    On-demand Webcast: SaaS, single sign-on, and security: how can this possibly work?

    Quick... how many cloud accounts do you have? How many email accounts? How many software-as-a-service accounts? How many job-specific accounts? It's a lot, right? Many of you probably even have multiple accounts for certain services. Managing all this can be a mess. It gets worse when you or your...

    Sponsored By Centrify

  • Webcasts // Jan 2010

    Centrify Security Solutions for PCI Compliance

    The attendee of this webcast will learn how Centrify helps corporate IT security managers address the key provisions of Sections 7, 8 and 10 of the PCI Data Security Standard for their UNIX and Linux systems.

    Provided By Centrify

  • White Papers // Oct 2008

    Using Centrify's DirectControl With Mac OS X

    This white paper provides an overview of the features and benefits of using Centrify DirectControl, and describes how an organization can realize substantial benefits by using DirectControl to integrate and centrally manage Mac OS X systems with Active Directory. Macintosh computers have found widespread usage within several industries such as...

    Provided By Centrify

  • White Papers // Feb 2012

    Improving Mobile Device Security and Management with Active Directory

    As more and more workers bring personal devices to work for increased productivity and mobile access organizations must quickly respond to the security and compliance risks posed by largely unmanaged access to corporate information. Enterprises can expect to see tablet sales alone increase by 250% in 2012, primarily iPads, which...

    Provided By Centrify

  • White Papers // Nov 2012

    Enforcing Enterprise-out Security for Cloud Servers

    Cloud-based computing models offer the promise of a highly scalable compute infrastructure without having to acquire, install and maintain any additional hardware. However, implementing this new compute model using even the most trusted service providers requires a security solution that empowers IT to maintain control over user and network access...

    Provided By Centrify

  • White Papers // Jan 2013

    Stop Password Sprawl with SaaS Single Sign-On via Active Directory

    Organizations are rushing to SaaS in an effort to move business initiatives along faster than the traditional cycle of implementation, integration and on-going maintenance associated with on-premise applications. But, executives and IT managers are realizing that SaaS adoption is part of a larger set of trends where mobile devices and...

    Provided By Centrify

  • White Papers // Jan 2013

    Windows Least Privilege Management and Beyond

    Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has its own access control list and the myriad of OS level rights and integrity levels vary by Windows version). For Windows environments it is critical that organizations can delegate administration and establish...

    Provided By Centrify

  • White Papers // Nov 2012

    Improving Mobile Device Security and Management with Active Directory

    As more and more workers bring personal devices to work for increased productivity and mobile access organizations must quickly respond to the security and compliance risks posed by largely unmanaged access to corporate information. Enterprises can expect to see tablet sales alone increase by 250% in 2012, primarily iPads, which...

    Provided By Centrify

  • White Papers // Nov 2012

    Using Microsoft Active Directory to Address Payment Card Industry (PCI) Data Security Standard Requirements in Heterogeneous Environments

    The stiff penalties defined by PCI members are designed to ensure that all merchants and service providers work to maintain consumer trust of payment cards since that loss would impact the revenues of all merchants and financial institutions. This white paper examines the compelling business and technical case for...

    Provided By Centrify

  • White Papers // Nov 2012

    Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security

    Capturing the detailed actions of privileged users is even more critical in today's business environment that is driving cost efficiencies through IT outsourcing, off-shoring and supplementing IT staff with contractors. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation...

    Provided By Centrify

  • White Papers // Nov 2012

    Enforcing Enterprise-out Security for Cloud Servers

    Cloud-based computing models offer the promise of a highly scalable compute infrastructure without having to acquire, install and maintain any additional hardware. However, implementing this new compute model using even the most trusted service providers requires a security solution that empowers IT to maintain control over user and network access...

    Provided By Centrify

  • White Papers // Nov 2012

    Centrally Controlling, Securing and Auditing Access to Cross-Platform Systems and Applications Using the Centrify Suite

    For most IT organization, a mixture of Windows UNIX, Linux and Mac OS X platforms is simply a fact of life. However, reducing IT complexity has become a critical issue in the past few years as an uncertain economy has put renewed focus on reducing expenses and leveraging existing investments....

    Provided By Centrify