Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.

Slides:



Advertisements
Similar presentations
Summary of Forrester Wave
Advertisements

© Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation
Why Kony for Your Multi-Channel Strategy. Founded in 2007 First product released in employees 350 customers 600% growth in past two years (fastest.
Gartner Magic Quadrant
© 2010 VMware Inc. All rights reserved Confidential VMware Vision Jarod Martin Senior Solutions Engineer.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
1. 2 Oracle + Hyperion Integrated Enterprise Performance Management System Provides industry’s first EPM System Align operational intelligence with strategy:
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Cloud Computing! Aber sicher ?!? Ralf Schnell Customer Solutions Architect Principal Cloud Strategist
Unify and Simplify: Security Management
Almost 4 decades of Advanced Analytics & DM expertise.
My Sites (2003) Blogs & Wikis (2007) Kits (2008+)
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Teradata Overview. Teradata Highlights Teradata Corporation >Global Leader in Enterprise Data Warehousing and Analytics –EDW/ADW Database Technology –Analytic.
Identity Assurance Emory University Security Conference March 26, 2008.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
The conversation just gets better CIO to CEO The power of collaboration Luis Alvarez BT Global Services.
“HP has best-in-class capabilities across the board.” “HP’s functional testing solution…turned in the best scores in four of our five major evaluation.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Identity is the new Perimeter of Security Wade Tongen NA Enterprise SE Manager
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Powering the Cloud and Mobile Enterprise. The World is Changing Software is One Industry Employees CIOs are Technology Operators THE WORLD BEFORE Software.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
Availability for the modern datacenter. The Era of the “Always-On Business” ™
Mail2Cloud Case Study Crescent Electric Supply Company mxHero Solves for Large s & Drives Cloud Adoption 1 Copyright 2016, mxHero Inc.March 8, 2016.
Riverbed Confidential. Riverbed – RVBD 22,000+ Customers $1 BILLION Revenue Market Leader * Performance Management * WAN Optimization * Cloud Storage.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Gartner Magic Quadrants
Forrester and Novell Novell ® Identity Manager 4 Webcast I Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
BI and EPM Market Leadership Slides
ABC Company Positioned as a Magic Quadrant Leader
Transform IT with networking innovation Dell Networking
Reduce Risk Across Hybrid IT
The time to address enterprise mobility is now
Deployment Planning Services
Reduce Risk Across Hybrid IT
Market Growth Context – Where would you bet your company’s future?
Deployment Planning Services
Identity & Access Management for a cloud-first, mobile-first world
Hybrid Management and Security
Journey to Microsoft Secure Cloud
A MASSIVE RETHINK OF SECURITY
Microsoft Azure: The only consistent Hybrid Cloud
SaaS Application Deep Dive
The power of common identity across any cloud
Best Practices for Securing Hybrid Clouds
Reduce Risk Across Hybrid IT
Centrify Identity Service Balancing Security & Productivity
Secure & Unified Identity
BOMGAR REMOTE SUPPORT Karl Lankford
Company Overview & Strategy
Improving Azure IoT Insights with network context
11/15/2018 3:42 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Access and Information Protection Product Overview October 2013
NetApp © 2018 NetApp, Inc. All rights reserved NETAPP CONFIDENTIAL ---
Power BI and SharePoint – the road ahead
Enabling the hybrid cloud with remote access appliances
Protecting your data with Azure AD
4/9/2019 5:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
System Center Marketing
Microsoft Data Insights Summit
Azure AD Simon May Technical Evangelist.
Zero Trust in Practice: Identity Drives an Adaptive Workforce
Presentation transcript:

Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America Channels

©2016 Centrify Corporation. All Rights Reserved. 2 Multiple points in the cyberattack chain Hackers target both end and privileged user’s credentials. Today’s Security Landscape Dissolving IT perimeter – data is everywhere SaaSIaaSAccess Anywhere Traditional perimeter-based security is not enough. #1 Point of attack — compromised credentials Mobile, Mac Enterprises no longer trust their networks Today’s security should be based upon context-based policies. Breach Accomplished 63% of data breaches are caused by compromised credentials. Mobile Identity Resources Zero Trust Model Identity is the New Perimeter

©2016 Centrify Corporation. All Rights Reserved. 3 Too Many Passwords Too Much Privilege DANGER RISK GOOD Establish Identity Assurance BETTER Limit Lateral Movement GREAT Enforce Least Privilege OPTIMAL Log & Monitor Today’s Threats Require Next-Generation Identity Platform Unified solution to reduce risk across cloud, mobile and data center RISK Comprehensive Privileged Access Security User-Level Auditing Reduce VPN Risk Automate App Provisioning Access Approval & Just-in-Time Access MFA Everywhere Get Identities Consolidated Get SSO Everywhere

©2016 Centrify Corporation. All Rights Reserved. 4 INFRASTRUCTURE-AS-A-SERVICE APPS ON PREMISES APPS SaaS INFRASTRUCTURE SERVERS INFRASTRUCTURE NETWORK PRIVILEGED ACCOUNTS PRIVILEGED ACCOUNTS PRIVILEGED ACCOUNTS PRIVILEGEDACCOUNTS Centrify Secures Access to Infrastructure and Apps PRIVILEGED ACCOUNTS (Employees, Contractors, Outsourced IT) Centrify Vision IT Users End Users OUTSOURCED IT PRIVILEGED IT USER CUSTOMER PARTNER END USER Secure Access to Infrastructure and Apps from Any Device for All Users

©2016 Centrify Corporation. All Rights Reserved. 5 Centrify Solutions CLOUD DIRECTORY AUTHENTICATION ENGINE FEDERATION ENGINE WORKFLOW ENGINE MFA / POLICY ENGINE REPORTING ENGINE SECURE DATA STORAGE Identity Service Single Sign-On Provisioning Enterprise Mobility Management Mac Management Privilege Service Shared Password Management Secure Remote Access Privileged Access Request Application Password Management Server Suite Identity Consolidation MFA for Servers Privilege Management Auditing Improved ROI One architecture Directory, MFA, Workflow Improved Security Consistent policy across apps, infrastructure, mobile and all users Continuous Compliance Visibility & control across hybrid IT

©2016 Centrify Corporation. All Rights Reserved. 6 Automotive & EnergyTechnology & TelecomRetail & Internet Banking & FinancePharma & HealthDefense & Government Trusted by over 5,000 Customers with 97% Retention 7 of Top 10 Pharma Companies 5 of Top 10 U.S. Oil and Gas Companies 6 of Top Worldwide Telcos 4 of Top 10 U.S. Retailers More Than 85 U.S. Federal Agencies 4 of Top 10 U.S. Financial Services Companies

©2016 Centrify Corporation. All Rights Reserved. 7 Why Choose Centrify? Protects against the leading point of attack used in data breaches — compromised credentials Protects end users and privileged users by stopping threats at multiple points in the cyberthreat chain Secures access to Apps and Infrastructure across your Hybrid IT environment of cloud, mobile and data center Trusted by over 5,000 customers, including more than half of the Fortune 50 Validated by third-party analysts as a Leader in cloud and privileged identity

©2016 Centrify Corporation. All Rights Reserved. 8 Named a Leader in the 2016 Gartner IDaaS Magic Quadrant A Leader in The Forrester Wave: Privileged Identity Management, Q One of Glassdoor Top 50 Best Places to Work for 2016 Clear Choice Winner in SSO Vendor Shootout, NetworkWorld The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester’s call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect the judgement at the time and are subject to change. Gartner “Magic Quadrant for Identity and Access Management as a Service” by Gregg Kreizman, June Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. A Recognized Leader

©2016 Centrify Corporation. All Rights Reserved. 9 Thank You

©2016 Centrify Corporation. All Rights Reserved. 10 BIG DATA APPLICATIONS CLOUD (IAAS & PAAS) NETWORK DEVICES DATA CENTER SERVERS PARTNER END USER PRIVILEGED IT USER CUSTOMER OUTSOURCED IT From Any Device For All Users Secure Access to Apps & Infrastructure Centrify Vision