Hi [[ session.user.profile.firstName ]]

Centrify

  • Date
  • Rating
  • Views
  • A Secure Path to AWS Cloud: Simplifying Your Cloud Journey with Next-Gen Access
    A Secure Path to AWS Cloud: Simplifying Your Cloud Journey with Next-Gen Access Felderi Santiago VP Enterprise Solutions Centrify, Scott Ward Solutions Architect, AWS, Peter Mudd Managing Director, Caxton Recorded: Jun 5 2018 50 mins
    Amazon Web Services (AWS) is quickly becoming one of the most popular options for enterprises who want to extend their data center infrastructure to the cloud, providing best practices to help ensure security as they move to the cloud. Centrify is an Advanced Partner in AWS’ Partner Network Ecosystem, delivering a comprehensive solution that implements and extends AWS best practices by securing access, controlling privilege and auditing activity across hybrid environments.

    Watch this webinar featuring AWS and Centrify as they discuss how Caxton Associates LP is using the Centrify Identity Platform to increase security in their AWS environment.

    We will cover:
    •Federated SSO to the AWS Web console and AWS CLI
    •Mapping Active Directory Groups to IAM roles to enforce least privilege access
    •Automated provisioning for IAM users
    •Adaptive MFA for AWS, including the web console, CLI and workspaces
    •Secure access to Amazon EC2 instances
  • Zero Trust Security: Reduce Breaches, Complexity, and Cost
    Zero Trust Security: Reduce Breaches, Complexity, and Cost Torsten George, Product Evangelist at Centrify Recorded: Apr 25 2018 36 mins
    More than 5 million data records are lost or stolen worldwide every single day, according to the Breach Level Index. That’s a staggering 59 records every second. According to the Ponemon Institute, to recover from these incidents, organizations spent on average $3.6 million per breach. It’s also worth remembering the potential for reputational damage that can create a downswing in an organization’s fortunes. For example, Yahoo!’s data breach proved very costly, wiping out $350 million off Verizon’s acquisition payment.

    Thus, it has become critical for organizations to find ways to reduce the risk of falling victim to a breach, as well as reduce complexity and cost in securing applications, devices, and infrastructure ― both on-premise and in the cloud.

    Join this webinar to learn:

    • How to assess the full impact of data breaches, ranging from direct costs, reputation damage, and customer loss to declines in revenue.
    • How misperceptions linked to the root cause of hacking-related breaches skew IT security spending and how to align your security investments to achieve higher effectiveness.
    • How the Zero Trust Security model can help shield your organization and its reputation from devastating and long-term financial consequences of a breach.
  • Zero Trust Security: Your Talk Track for the Boardroom
    Zero Trust Security: Your Talk Track for the Boardroom Andy Smith, VP of Product Marketing, Centrify Recorded: Apr 24 2018 48 mins
    More than 5 million data records are lost or stolen worldwide every single day, according to the Breach Level Index. That’s a staggering 59 records every second. With the scares of WannaCry and Petya, your board is asking, “what the hell are we doing to protect ourselves?” You need answers. The problem, highlighted in a recent WSJ study, showed that 62% of CEOs incorrectly cite malware as the primary threat to cybersecurity, whereas CIOs, CISOs, CTOs realize that 68% of breaches would have been prevented by identity security, vs. only 8% for anti-malware. In fact, the 2017 Verizon Breach Investigations Report found that 81% of breaches were due to lost, stolen or default passwords.

    Your board wants to know what you’re doing about ransomware, but rather than randomly chasing the latest newsworthy incident. present a strategic Zero Trust Security plan that addresses the real issue and defines a practical and proven direction that not only protects against breaches, but also enables your business the freedom to transform and grow in spite of the growing threatscape.

    Join this webinar to learn:
    • What is the real threat that must be addressed to protect you from breaches.
    • What is Zero Trust Security and how does it address the modern threatscape?
    • Who else is talking about Zero Trust Security and what have they been able to achieve?
    • How to talk to your board about a consistent and strategic approach rather than reactive and defensive.
  • 5 Cyber Attack Trends from the Threatscape
    5 Cyber Attack Trends from the Threatscape Corey Williams, Senior Director of Products and Marketing Recorded: Mar 21 2018 55 mins
    2017 was full of sensational breach headlines—a year full of high-profile news about companies impacted by all sorts of malware and ransomware.

    It’s not surprising, then, that CEOs are reacting to these reports. CEOs overwhelmingly cite malware as the most important cybersecurity risk threatening their organization’s success.

    But technical officers on the front lines (CIOs, CTOs and CISOs) see it differently: They point to identity breaches—including privileged user identity attacks and default, stolen or weak passwords—as the biggest threat.

    Join us for a live webinar that examines recent trends and research on cyber attacks. You will learn about:

    - Recent malware attacks including wannacry, petya, notpetya and badrabbit
    - Current research asking CEOs about cybersecurity strategy and spending
    - The most common cause of breaches that you may be overlooking — compromised credentials
    - A surefire way to secure access without boundaries through the power of Zero Trust Security
  • Simplify and Accelerate your GDPR Compliance Efforts
    Simplify and Accelerate your GDPR Compliance Efforts Tim Hill, Director of Product Management and Strategy Recorded: Feb 20 2018 30 mins
    As we’re all aware, GDPR will be enforced starting May 25th, 2018 and organizations should understand which aspects of its preparations will be in place before the deadline.

    Much like other technological shifts of the last decade —GDPR will change the way our organization handles personal data. GDPR will require organizations to implement specific, defined controls over the handling of collected personal data, with the primary objective of streamlining data security regulations and bolstering data protection in the face of a fast-evolving technology landscape.

    Join this webinar with guest speaker Tim Hill, Director of Product Management and Strategy from Centrify, as he discusses best practices around frameworks and architectures needed to ensure better business process and data management.

    Tim will also cover how organizations with a strong IAM strategy in place are more likely to provide better notification and more openness if and when data has been compromised.

    Register for this webinar and learn:

    - Key elements to consider as the deadline for GDPR approaches
    - How a strong IAM strategy enables organizations to quickly identify whose data they are responsible for and where its stored.
    - How Centrify’s Zero Trust approach to IAM can help you prepare for GDPR’s underlying policy goals.

Embed in website or blog