Below you will find reports with the source of “Centrify” Privileged Access Management In The Modern Threatscape Privileged access remains the preferred vector for attackers, and most organizations aren’t taking the very basic steps to secure it Added: April 19, 2019 Best Practices For Privileged Identity Management In The Modern Enterprise In this paper, they explore the modern enterprise — a hybrid organization with infrastructure spread across on-premises data centers as well as hosted in the cloud and one where IT functions are split between internal and 3rd-party administrators. (more available) Added: October 26, 2018 Who Moved My Secure Perimeter In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service. (more available) Added: October 18, 2018 Top Six Things To Consider With An Identity As A Service Solution For Zero Trust Security As we look to redefine security where every access is authenticated and authorized, selecting the right IDaaS vendor becomes a critical decision to make. (more available) Added: October 17, 2018 Six Best Practices For Securing Amazon Web Service This paper offers some solutions to the best practices for securing Amazon Web Services. Added: October 16, 2018 Security Privacy And The Next Generation Workforce Based on this research on the growing age gaps in the workforce, Centrify has been able to identify some key recommendations that senior decision makers can follow to help bridge the gap and harmonise approaches to data security and privacy in the workplace. (more available) Added: October 15, 2018 Secure The Vote With Zero Trust Security This report focusses on the election of 2016 and offers some solutions for protecting an election from hackers. Added: October 14, 2018 Equifax: A Cautionary Tale Rather than dismiss the Equifax incident as something that “could never happen to us,” know that it absolutely could. The only way to avoid a devastating breach is through a meticulous prevention strategy and a strong security posture. (more available) Added: October 13, 2018 GDPR Headlines Centrify has worked with the specialist law firm, Cordery, to develop this headline summary of when the GDPR applies, the key impacts and what you need to do to comply with the GDPR. (more available) Added: October 12, 2018
Privileged Access Management In The Modern Threatscape Privileged access remains the preferred vector for attackers, and most organizations aren’t taking the very basic steps to secure it Added: April 19, 2019
Best Practices For Privileged Identity Management In The Modern Enterprise In this paper, they explore the modern enterprise — a hybrid organization with infrastructure spread across on-premises data centers as well as hosted in the cloud and one where IT functions are split between internal and 3rd-party administrators. (more available) Added: October 26, 2018
Who Moved My Secure Perimeter In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service. (more available) Added: October 18, 2018
Top Six Things To Consider With An Identity As A Service Solution For Zero Trust Security As we look to redefine security where every access is authenticated and authorized, selecting the right IDaaS vendor becomes a critical decision to make. (more available) Added: October 17, 2018
Six Best Practices For Securing Amazon Web Service This paper offers some solutions to the best practices for securing Amazon Web Services. Added: October 16, 2018
Security Privacy And The Next Generation Workforce Based on this research on the growing age gaps in the workforce, Centrify has been able to identify some key recommendations that senior decision makers can follow to help bridge the gap and harmonise approaches to data security and privacy in the workplace. (more available) Added: October 15, 2018
Secure The Vote With Zero Trust Security This report focusses on the election of 2016 and offers some solutions for protecting an election from hackers. Added: October 14, 2018
Equifax: A Cautionary Tale Rather than dismiss the Equifax incident as something that “could never happen to us,” know that it absolutely could. The only way to avoid a devastating breach is through a meticulous prevention strategy and a strong security posture. (more available) Added: October 13, 2018
GDPR Headlines Centrify has worked with the specialist law firm, Cordery, to develop this headline summary of when the GDPR applies, the key impacts and what you need to do to comply with the GDPR. (more available) Added: October 12, 2018