Centrify

Displaying 1 - 10 of 25 results

  • Cloud IAM is Set to Break the Sound Barrier

    Videos // Jul 2015 // provided by Centrify

    Cloud apps and mobile devices are screaming their way into the enterprise like jet fighters, bringing employees more access than ever — and more passwords as well. IT is caught in the turbulence — trying to balance employee productivity with enterprise security. What tools has IT got today to get ...

    Watch Now
  • Webcast: Single Sign-On: Past, Present, and Future

    Videos // Jul 2015 // provided by Centrify

    Since the invention of the second app, IT has had to implement single sign on to eliminate the hassles of multiple passwords. But can we leverage what we have learned about on-premises SSO to solve today’s cloud and mobile identity challenges? And how can we deploy solutions today that don’t ...

    Watch Now
  • The Cloud is Casting a Shadow Over IT

    Videos // Jul 2015 // provided by Centrify

    In today's cloud world, a credit card is all it takes to feel like a business app buyer. Line of business teams are adopting apps without consulting IT, putting corporate data at risk. It's shadow IT, and it's growing fast. Of course, when those deployments grow too difficult for line ...

    Watch Now
  • Mobile Devices, Wearables and the Future of Identity

    Videos // Jul 2015 // provided by Centrify

    Today, the very concept of digital identity is under fire. Every week, we read about a new hack, a new attack, a new financial and public relations disaster for a company we previously thought of as rock-solid and well-managed. But when "bad guys" can spoof the identity of someone with ...

    Watch Now
  • 2015 - Already the New Year of the Breach?

    Videos // Jul 2015 // provided by Centrify

    2014 has been referred to in the media as “the year of the breach” with millions of credentials, credit cards, and corporate information stolen. How will 2015 be different? What can you do to prevent your business from becoming the next headline? Since users and data are officially “everywhere” — ...

    Watch Now
  • Centrify and Morehouse College: Unified Identity

    Videos // Jul 2015 // provided by Centrify

    Is your organization in the process of adopting cloud and mobile applications at an increasing pace? Does the thought of dozens of new silos of user-managed passwords keep you up at night? In the process of upgrading traditional user apps to cloud solutions — including the replacement of Microsoft Exchange ...

    Watch Now
  • On-demand Webcast: Adding Macs to Your Enterprise? Start with Identity Management

    Webcasts // Apr 2015 // provided by Centrify

    PC shipments in the first quarter of 2015 are down. On the other hand, shipments of Macs continue their steady rise, showing an 8.9 percent increase over the same quarter a year ago. If you manage PCs in your enterprise, you're undoubtedly seeing more and more Macs. It's no ...

    Watch Now
  • Simplifying the Management of Macs and Mobile Devices

    White Papers // Feb 2015 // provided by Centrify

    A single, unified solution for managing Macs and mobile devices, Centrify Identity Service, Mac Edition, helps you meet the challenges of consumerization and an increasingly mobile workforce. While most solutions require setup of a parallel infrastructure for managing Macs, Centrify provides seamless, centralized management of Macs from Active Directory, ...

    Find out more
  • Buyer Pulse Buyer Case Study: Grand Island Public Schools Implements Identity Solution to Centralize Management and Increase Security

    White Papers // Feb 2015 // provided by Centrify

    Read this IDC Buyer’s Case Study focused on how Grand Island Public Schools (GIPS), a prekindergarten through grade 12 school district located in Grand Island, Nebraska, implemented the Centrify Identity Service for Mac and Mobile to integrate the school system's fleet of Mac computers with Active Directory and provide unified ...

    Read more
  • Centrify for Samsung Knox - Spotlight

    Webcasts // Sep 2014 // provided by Centrify

    Employees are clamoring for BYOD; regulators and industry groups are clamoring for tighter security and stronger data protection measures. There is a way to balance these seemingly divergent demands: integrated access control and mobile device management. Samsung Knox and Centrify have partnered to deliver secure container environments inside mobile ...

    View this now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?