Centrify Innovations Embraces Zero Trust Security (Learn More, Videos)

Bill Mann, chief product officer at Centrify
Stop Breaches from Compromised Credentials. Strengthen security with multi-factor authentication (MFA) across apps, VPN, and endpoints. Get adaptive with risk-based policy based on user behavior. Stop password-based attacks, without frustrating users. Bill Mann, chief product officer at Centrify

Centrify, the leader in securing hybrid enterprises through the power of identity services, and the 2017 Platinum ‘ASTORS’ Award Winner for Best Cyber Security for ID Mgmt & Access Control, has announced its Zero Trust approach to security.

Zero Trust assumes that everything — users, endpoints, resources — is untrusted and must always be verified to decrease the chance of a major breach.

Customers are adapting to the reality that older, network centric approaches to security no longer apply and more application centric models, with access grounded in identity, are necessary for today’s hybrid enterprise.

Google’s BeyondCorp implementation is an excellent example of this new approach.

BeyondCorp is a Zero Trust security framework that shifts access controls from the perimeter to individual devices and users.

The end result allows employees to work securely from any location without the need for a traditional VPN.

Bill Mann, chief product officer at Centrify
Bill Mann, chief product officer at Centrify

“The modern hybrid enterprise must adopt a Zero Trust security model,” said Bill Mann, chief product officer at Centrify.

“The old days of the guarded castle with a moat, where all interactions inside the castle were trusted and all interactions outside the castle were suspect, no longer applies.”

“Remote employees on BYOD devices accessing SaaS applications are as much a reality today as someone sitting at their workstation inside the office.”

“At Centrify, we are committed to helping our customers embrace this new reality and move towards a Zero Trust security model where all access must be authenticated, authorized and encrypted.”

(Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure each user’s access to apps and infrastructure through the power of identity services. This is Next Dimension Security in the Age of Access. Courtesy of Centrify and YouTube)

Zero Trust Security Model Product Enhancements 

To further its move towards a Zero Trust security model, Centrify has joined the FIDO (Fast IDentity Online) Alliance and strengthening its integration with Yubico.

Centrify Identity Services provides support for the FIDO Alliance’s Universal 2nd Factor (U2F) specification, an authentication standard designed to be open, secure, private and easy to use.

Centrify already leverages Yubico’s YubiKeys for PIV Compliant and OATH-based authentication, and is further strengthening the partnership with this new support for FIDO U2F authentication.

(Stop breaches with Centrify and the YubiKey. Simple configurations for admins and easy for users. Courtesy of Yubico and YouTube.

FIDO U2F certified authentication is recognized by the National Institute of Standards and Technology (NIST) as the highest Authenticator Assurance Level (AAL3) in the NIST Special Publication 800-63 Revision3.

 “As co-creator of the FIDO U2F standard, Yubico believes that secure, easy-to-use and scalable authentication should be available to everyone,” said Jerrod Chong, VP of Product at Yubico.

Jerrod Chong, VP of Product at Yubico
Jerrod Chong, VP of Product at Yubico

“Centrify shares our mission to bring greater security and convenience to the enterprise.”

“By adding FIDO U2F support, Centrify has the most complete set of YubiKey integrations available from a technology partner.”

As enterprises move towards modern ephemeral architectures, Centrify is extending the reach of Zero Trust by continuing to build on its support for container-based ephemeral architectures.

Centrify Infrastructure Services is now the only privileged identity management vendor to offer host-based privilege controls for CoreOS Container Linux, the leading container operating system.

Centrify Infrastructure Services provides conditional access and least privilege control to CoreOS deployments.

Centrify’s fully integrated privileged access security solution helps minimize your attack surface and control privileged access to your hybrid environment.
Centrify’s fully integrated privileged access security solution helps minimize your attack surface and control privileged access to your hybrid environment.

As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure each user’s access to apps and infrastructure through the power of identity services.

This is Next Dimension Security in the Age of Access. Centrify is enabling over 5,000 customers, including over half the Fortune 50, to defend their organizations. 

The Breach Stops Here.

The 2017 ‘ASTORS’ Homeland Security Awards Program

American Security Today’s 2017 ‘ASTORS’ Homeland Awards Presentation Luncheon at ISC East was an overwhelming success, with distinguished guests from National, State and Local Governments, and Industry Leading Corporate Executives from companies allied to Government.

Over 100 professionals gathered from across North America and the Middle East to be honored from disciplines across the Security Industry in their respective fields which included:

  • The Department of Homeland Security
  • The Department of Justice
  • The Security Exchange Commission
  • State and Municipal Law Enforcement Agencies, and
  • Leaders in Private Security
The 2017 ‘ASTORS’ Homeland Security Awards Presentation Luncheon
The 2017 ‘ASTORS’ Homeland Security Awards Presentation Luncheon

Recognized for their Innovative Training and Education Programs, Outstanding Product Development Achievements and Exciting New Technologies to address the growing Homeland Security Threats our Nation is facing.

American Security Today was formed after careful reflection of 9/11 and its aftermath when the Department of Homeland Security was established and there was an immediate explosion of new products and solutions for what was perceived as an imminent second attack on primary targets in the United States.

As time moved forward from 9/11 itself and in recent years, the threats to our nation have evolved from a large scale 9/11 type attack to:

  • Domestic and International Terrorist Attacks carried out by ‘lone wolves’ and coordinated individuals
  • Cybersecurity breach attacks against our government agencies, financial institutions and critical infrastructure facilities
  • Unprecedented urban violence
  • Cultural shifts and societal media bias, which make it increasingly difficult to secure our nation in this constantly evolving threat environment.
The 2017 ‘ASTORS’ Homeland Security Awards Presentation Luncheon
The 2017 ‘ASTORS’ Homeland Security Awards Presentation Luncheon

These current circumstances have put forward another rapid expansion of new ideas, products and solutions to combat these ever changing challenges.

These changes have called for a new generation of security experts in the Homeland Security and Public Safety fields who need real time knowledge of our ever growing threats.

These experts include the Government at the Federal, State and Local levels as well as from Private Firms specializing in Physical Security, Port Security, Law Enforcement, First Responders, Military and Private Security responsible for implementing coordinated security measures to ensure our Nation’s Security and improve Public Safety.

Together, each of these entities work together seamlessly on the front lines of protecting our communities, to ‘Keep our Nation Secure, One City at a Time.’

AST focuses on Homeland Security and Public Safety Breaking News, the Newest Initiatives and Hottest Technologies in Physical & IT Security, essential to meeting today’s growing security challenges.

To highlight the tremendous accomplishments of agencies and firms receiving this prestigious award, be on the the lookout for American Security Today’s Annual December ‘ASTORS’ Champions Edition – ‘Year in Review.’