• 451 Research: Centrify goes “all in” on the zero-trust movement with its Next-Gen Access platform

    White Papers · Jun 2018 · Provided By Centrify

    Centrify is pleased to be recognized by 451 Research as one of the early vendors to embrace the ‘zero trust’ concept, a new conceptual framework on the rise as traditional security tactics that follow a hardened perimeter approach have failed. This report examines Centrify’s Zero Trust Security approach, as well...

    Download Now
  • Zero Trust Security: A New Paradigm for a Changing World

    White Papers · May 2018 · Provided By Centrify

    The Centrify Zero Trust Security model assumes that untrusted actors already exist both inside and outside the network. Trust must therefore be entirely removed from the equation. Zero Trust Security requires powerful identity services to secure every user’s access to apps and infrastructure.

    Download Now
  • CEO Disconnect is Weakening Cybersecurity

    White Papers · Apr 2018 · Provided By Centrify

    As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection...

    Download Now
  • Identity Services Buyers’ Guide

    White Papers · Apr 2018 · Provided By Centrify

    A Zero Trust approach to security requires a combination of Identity Services to deliver identity assurance, trusted endpoints, conditional policy and least privilege. This guide identifies the specific capabilities you need within four key areas of identity and helps you compare capabilities across major vendors with respect to Application Services,...

    Download Now
  • Best Practices for Multi-factor Authentication

    White Papers · May 2016 · Provided By Centrify

    With so many stolen passwords and breaches involving stolen passwords, only a small number of security professionals believe that passwords are an adequate form of protection. Many organizations have turned to multi-factor authentication (MFA) or two-factor authentication (2FA) to reduce the risk of stolen passwords. This paper provides best practices...

    Download Now
  • Enterprise Identity Where You Want It

    White Papers · Nov 2013 · Provided By Centrify

    Gartner ranked Cloud-based Identity and Access Management as the largest market segment in this year's $2 billion cloud-based security services market. Gartner raised some concerns about cloud identity with a focus on where identity is stored. Tom Kemp, CEO of Centrify, explores this issue in more detail and correlates this...

    Read More
  • Identity and Access Management in the Cloud Era

    White Papers · Sep 2013 · Provided By Centrify

    The explosion of mobile devices, fragmented network access and multiple operating systems makes identity management a big challenge. Centrify through its wide range of products is able to provide firms both basic and advanced identity access management solutions making a fully integrated security possible – across all platforms, across all...

    Read More