Centrify

Displaying 1 - 10 of 26 results

  • Best Practices for Multi-factor Authentication

    White Papers // May 2016 // provided by Centrify

    With so many stolen passwords and breaches involving stolen passwords, only a small number of security professionals believe that passwords are an adequate form of protection. Many organizations have turned to multi-factor authentication (MFA) or two-factor authentication (2FA) to reduce the risk of stolen passwords. This paper provides best practices ...

    Download Now
  • Securing Enterprise Identities for Dummies

    Ebooks // May 2016 // provided by Centrify

    According to Mandiant, 100% of recent data breaches were tied to compromised identity credentials.* Two key reasons for this are a dissolving security perimeter, and the fact that enterprise organizations have not taken a comprehensive approach to fighting against the fastest-growing vector for cyber attacks. Access this go-to guide to ...

    View this now
  • Cloud IAM is Set to Break the Sound Barrier

    Videos // Jul 2015 // provided by Centrify

    Cloud apps and mobile devices are screaming their way into the enterprise like jet fighters, bringing employees more access than ever — and more passwords as well. IT is caught in the turbulence — trying to balance employee productivity with enterprise security. What tools has IT got today to get ...

    Watch Now
  • Webcast: Single Sign-On: Past, Present, and Future

    Videos // Jul 2015 // provided by Centrify

    Since the invention of the second app, IT has had to implement single sign on to eliminate the hassles of multiple passwords. But can we leverage what we have learned about on-premises SSO to solve today’s cloud and mobile identity challenges? And how can we deploy solutions today that don’t ...

    Watch Now
  • The Cloud is Casting a Shadow Over IT

    Videos // Jul 2015 // provided by Centrify

    In today's cloud world, a credit card is all it takes to feel like a business app buyer. Line of business teams are adopting apps without consulting IT, putting corporate data at risk. It's shadow IT, and it's growing fast. Of course, when those deployments grow too difficult for line ...

    Watch Now
  • Mobile Devices, Wearables and the Future of Identity

    Videos // Jul 2015 // provided by Centrify

    Today, the very concept of digital identity is under fire. Every week, we read about a new hack, a new attack, a new financial and public relations disaster for a company we previously thought of as rock-solid and well-managed. But when "bad guys" can spoof the identity of someone with ...

    Watch Now
  • 2015 - Already the New Year of the Breach?

    Videos // Jul 2015 // provided by Centrify

    2014 has been referred to in the media as “the year of the breach” with millions of credentials, credit cards, and corporate information stolen. How will 2015 be different? What can you do to prevent your business from becoming the next headline? Since users and data are officially “everywhere” — ...

    Watch Now
  • Centrify and Morehouse College: Unified Identity

    Videos // Jul 2015 // provided by Centrify

    Is your organization in the process of adopting cloud and mobile applications at an increasing pace? Does the thought of dozens of new silos of user-managed passwords keep you up at night? In the process of upgrading traditional user apps to cloud solutions — including the replacement of Microsoft Exchange ...

    Watch Now
  • Buyer Pulse Buyer Case Study: Grand Island Public Schools Implements Identity Solution to Centralize Management and Increase Security

    White Papers // Feb 2015 // provided by Centrify

    Read this IDC Buyer’s Case Study focused on how Grand Island Public Schools (GIPS), a prekindergarten through grade 12 school district located in Grand Island, Nebraska, implemented the Centrify Identity Service for Mac and Mobile to integrate the school system's fleet of Mac computers with Active Directory and provide unified ...

    Read more
  • Simplifying the Management of Macs and Mobile Devices

    White Papers // Feb 2015 // provided by Centrify

    A single, unified solution for managing Macs and mobile devices, Centrify Identity Service, Mac Edition, helps you meet the challenges of consumerization and an increasingly mobile workforce. While most solutions require setup of a parallel infrastructure for managing Macs, Centrify provides seamless, centralized management of Macs from Active Directory, ...

    Find out more