Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Centrify

Below you will find reports with the source of “Centrify”

image from Privileged Access Management In The Modern Threatscape

Privileged Access Management In The Modern Threatscape

Privileged access remains the preferred vector for attackers, and most organizations aren’t taking the very basic steps to secure it

(more available)
Added: April 19, 2019
image from Best Practices For Privileged Identity Management In The Modern Enterprise

Best Practices For Privileged Identity Management In The Modern Enterprise

In this paper, they explore the modern enterprise — a hybrid organization with infrastructure spread across on-premises data centers as well as hosted in the cloud and one where IT functions are split between internal and 3rd-party administrators. They look at these and related trends impacting our data security and specifically, best practices on how to manage and govern privileged user access to mitigate these risks.

(more available)
Added: October 26, 2018
image from Who Moved My Secure Perimeter

Who Moved My Secure Perimeter

In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service.

(more available)
Added: October 18, 2018
image from Top Six Things To Consider With An Identity As A Service Solution For Zero Trust Security

Top Six Things To Consider With An Identity As A Service Solution For Zero Trust Security

As we look to redefine security where every access is authenticated and authorized, selecting the right IDaaS vendor becomes a critical decision to make. Identity-as-a-Service (IDaaS) is an emerging solution category for managing and simplifying access to apps, but there are a number of feature, architecture and maturity considerations when selecting an IDaaS. This paper will discuss six of the top considerations.

(more available)
Added: October 17, 2018
image from Six Best Practices For Securing Amazon Web Service

Six Best Practices For Securing Amazon Web Service

This paper offers some solutions to the best practices for securing Amazon Web Services.

Added: October 16, 2018
image from Security Privacy And The Next Generation Workforce

Security Privacy And The Next Generation Workforce

Based on this research on the growing age gaps in the workforce, Centrify has been able to identify some key recommendations that senior decision makers can follow to help bridge the gap and harmonise approaches to data security and privacy in the workplace.

(more available)
Added: October 15, 2018
image from Secure The Vote With Zero Trust Security

Secure The Vote With Zero Trust Security

This report focusses on the election of 2016 and offers some solutions for protecting an election from hackers.

Added: October 14, 2018
image from Equifax: A Cautionary Tale

Equifax: A Cautionary Tale

Rather than dismiss the Equifax incident as something that “could never happen to us,” know that it absolutely could. The only way to avoid a devastating breach is through a meticulous prevention strategy and a strong security posture. Once the iceberg’s been hit, the response by employees, investors and even executives will surprise you. Here’s a breakdown of what happened to one of the largest credit agencies on the planet.

(more available)
Added: October 13, 2018
image from GDPR Headlines

GDPR Headlines

Centrify has worked with the specialist law firm, Cordery, to develop this headline summary of when the GDPR applies, the key impacts and what you need to do to comply with the GDPR.

(more available)
Added: October 12, 2018
© Cyentia Institute 2025
Library updated: June 30, 2025 20:08 UTC (build b1d7be4)