Centrify

Displaying 1 - 10 of 35 results

  • Centrify Platform eBook

    Ebooks // Mar 2018 // provided by Centrify

    Despite spending tens of billions of dollars on cybersecurity, there’s been no shortage of headlines about massive security breaches. But while most security companies focus on how the breach happened, they’re missing a critical part of the story. They’re not talking about what’s being targeted in order to get to ...

    View this now
  • Selecting the Right IDaaS for Zero Trust Security

    Webcasts // Feb 2018 // provided by Centrify

    Today’s sprawling workforce, mobile devices, and growing reliance on cloud infrastructure and applications play a critical role in why companies are moving away from a traditional, perimeter-based security approach. This approach is being replaced by a “Zero Trust” model with identity at its core. The Zero Trust approach starts by ...

    Watch Now
  • Zero Trust Security: A New Paradigm for a Changing World

    White Papers // Feb 2018 // provided by Centrify

    The Centrify Zero Trust Security model assumes that untrusted actors already exist both inside and outside the network. Trust must therefore be entirely removed from the equation. Zero Trust Security requires powerful identity services to secure every user’s access to apps and infrastructure.

    Download Now
  • Security's Password Crisis

    Ebooks // Apr 2018 // provided by Centrify

    This ebook helps you determine whether your company has an access issue and outlines ways to lower your risk of getting breached by increasing your identity and access (IAM) maturity through adopting a Zero Trust approach with the right IDaaS solution. You’ll learn the best practices to establish identity assurance, ...

    View this now
  • Security's Privilege Crisis

    Ebooks // Apr 2018 // provided by Centrify

    With compromised credentials as today’s #1 threat vector, and the premium hackers place on privileged access, status quo is a treacherous security path to remain on. This eBook looks at what’s behind the privilege crisis, helps you assess how your privileged access management strategy stacks up and proposes a rethink ...

    View this now
  • Zero Trust Identity and Access Management - A Fundamental Mind Shift

    Webcasts // Apr 2018 // provided by Centrify

    Watch the On-Demand webinar to hear Centrify's Chief Product Officer, Bill Mann and Forrester Principal Analyst, Chase Cunningham in a lively discussion how Zero Trust concepts can be applied to Identity and Access Management.

    Watch Now
  • 5 Tips to Zero Trust Security

    Webcasts // Apr 2018 // provided by Centrify

    Watch this webinar On-Demand: Cybersecurity is broken. Trust is the enemy. An entirely new approach is required — one based on Zero Trust. Championed by industry leaders including Google, Forrester, Gartner and Centrify, Zero Trust Security verifies every user, their device, and gives just enough access and privilege.

    Watch Now
  • Identity Services Buyers’ Guide

    White Papers // Apr 2018 // provided by Centrify

    A Zero Trust approach to security requires a combination of Identity Services to deliver identity assurance, trusted endpoints, conditional policy and least privilege. This guide identifies the specific capabilities you need within four key areas of identity and helps you compare capabilities across major vendors with respect to Application Services, ...

    Download Now
  • CEO Disconnect is Weakening Cybersecurity

    White Papers // Apr 2018 // provided by Centrify

    As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection ...

    Download Now
  • Securing Enterprise Identities for Dummies

    Ebooks // May 2016 // provided by Centrify

    According to Mandiant, 100% of recent data breaches were tied to compromised identity credentials.* Two key reasons for this are a dissolving security perimeter, and the fact that enterprise organizations have not taken a comprehensive approach to fighting against the fastest-growing vector for cyber attacks. Access this go-to guide to ...

    View this now