Centrify

Displaying 11 - 20 of 25 results

  • Best Practices for Multi-factor Authentication

    White Papers · May 2016 · Provided By Centrify

    With so many stolen passwords and breaches involving stolen passwords, only a small number of security professionals believe that passwords are an adequate form of protection. Many organizations have turned to multi-factor authentication (MFA) or two-factor authentication (2FA) to reduce the risk of stolen passwords. This paper provides best practices...

    Download Now
  • Securing Enterprise Identities for Dummies

    Ebooks · May 2016 · Provided By Centrify

    According to Mandiant, 100% of recent data breaches were tied to compromised identity credentials.* Two key reasons for this are a dissolving security perimeter, and the fact that enterprise organizations have not taken a comprehensive approach to fighting against the fastest-growing vector for cyber attacks. Access this go-to guide to...

    View this now
  • Cloud IAM is Set to Break the Sound Barrier

    Videos · Jul 2015 · Provided By Centrify

    Cloud apps and mobile devices are screaming their way into the enterprise like jet fighters, bringing employees more access than ever — and more passwords as well. IT is caught in the turbulence — trying to balance employee productivity with enterprise security. What tools has IT got today to get...

    Watch Now
  • Webcast: Single Sign-On: Past, Present, and Future

    Videos · Jul 2015 · Provided By Centrify

    Since the invention of the second app, IT has had to implement single sign on to eliminate the hassles of multiple passwords. But can we leverage what we have learned about on-premises SSO to solve today’s cloud and mobile identity challenges? And how can we deploy solutions today that don’t...

    Watch Now
  • The Cloud is Casting a Shadow Over IT

    Videos · Jul 2015 · Provided By Centrify

    In today's cloud world, a credit card is all it takes to feel like a business app buyer. Line of business teams are adopting apps without consulting IT, putting corporate data at risk. It's shadow IT, and it's growing fast. Of course, when those deployments grow too difficult for line...

    Watch Now
  • Mobile Devices, Wearables and the Future of Identity

    Videos · Jul 2015 · Provided By Centrify

    Today, the very concept of digital identity is under fire. Every week, we read about a new hack, a new attack, a new financial and public relations disaster for a company we previously thought of as rock-solid and well-managed. But when "bad guys" can spoof the identity of someone with...

    Watch Now
  • 2015 - Already the New Year of the Breach?

    Videos · Jul 2015 · Provided By Centrify

    2014 has been referred to in the media as “the year of the breach” with millions of credentials, credit cards, and corporate information stolen. How will 2015 be different? What can you do to prevent your business from becoming the next headline? Since users and data are officially “everywhere” —...

    Watch Now
  • Centrify and Morehouse College: Unified Identity

    Videos · Jul 2015 · Provided By Centrify

    Is your organization in the process of adopting cloud and mobile applications at an increasing pace? Does the thought of dozens of new silos of user-managed passwords keep you up at night? In the process of upgrading traditional user apps to cloud solutions — including the replacement of Microsoft Exchange...

    Watch Now
  • Centrify for Samsung Knox - Spotlight

    Webcasts · Sep 2014 · Provided By Centrify

    Employees are clamoring for BYOD; regulators and industry groups are clamoring for tighter security and stronger data protection measures. There is a way to balance these seemingly divergent demands: integrated access control and mobile device management. Samsung Knox and Centrify have partnered to deliver secure container environments inside mobile...

    View This Now
  • Centrify for Samsung Knox - Product Overview

    Webcasts · Sep 2014 · Provided By Centrify

    The idea that employees may be storing corporate data together with their vacation photos on their smartphones is enough to give IT administrators and corporate compliance managers nightmares. At the same time, nobody wants to lug around separate devices for work and home use, and BYOD makes workers happier and...

    View This Now