Members

Centrify

As organizations continue their digital transformation journeys, they struggle to manage identities that are fragmented across hybrid- and multi-cloud environments, resulting in data breaches, audit findings, and unnecessary overhead costs. Centrify Identity-Centric PAM addresses this challenge with a cloud-native solution that simplifies privilege management by centralizing identities, and establishes a per-machine root of trust. Administrative management and access is seamless, security and compliance postures are strengthened, and machines are empowered to defend themselves against cyber-threats

Posted By Centrify

EVENT : Sep 16

Centrify & Commvault - Join Two Leaders in the Gartner Magic Quadrant

Join two leaders in the Gartner Magic Quadrant to gain knowledge around securing, managing, and controlling the data that is accessible within your environment.
Read More
EVENT : Sep 15

Cloud PAM Confidence

GOING TO THE CLOUD? There are so many complex decisions agencies, IT and security professionals must make; your PAM solution does not have to be one of them.
Read More
EVENT : Aug 26

PAM 101

With so many names, acronyms & vendor capabilities, understanding PAM (Privileged Access Management) can be a challenge. Learn the basics on Aug 26.
Read More
EVENT : Aug 11

CyberCast Live: Enabling MFA Everywhere

Adopt this approach to establish a reliable deterrent; ultimately minimizing the risk of lateral movement of threat actors across your organization’s networks.
Read More
EVENT : Jul 14

CyberCast Live: Minimizing Phishing Exposure

Learn about best practices to minimize your exposure to phishing campaigns, which are typically the precursor for credential-based cyber-attacks.
Read More
EVENT : Jun 25

PCI Compliance: Staying One Step Ahead

Attend to hear Dr. Torsten George discuss the current global state of compliance and how organizations are maintaining (and not maintaining) PCI DSS compliance.
Read More
EVENT : Jun 17

Earn 1 CPE credit at this Zero Trust Privilege Webcast

Organizations struggle to answer the questions of "who has access to what?" and "how is that access is being used?" Register to learn how to address this
Read More
EVENT : May 14

CyberCast LIVE on 5/14: Minimizing Ransomware Exposure

Register to learn how your organization can address the number one cause of today’s data breaches while minimizing the impact of a ransomware attack.
Read More
EVENT : May 28

Mission: Possible - Get Compliant

Attend for best practices on improving your state of cyber security while adhering to compliance mandates.
Read More
EVENT : Apr 15

Improve Your Compliance Posture with Identity-Centric PAM

This webinar provides insights into the state of government regulations and importance of privileged management in the context of compliance and governance.
Read More
ARTICLE

Human Insights on the RSAC Human Element: RSA Conference 2020 Highlights

At RSA 2020, the Human Element, highlights humans as not only the most frequent cause of cyberattacks, but also the most powerful tool in preventing them.
Read More
EVENT : Feb 13

The Anatomy of a Hack: Perception vs. Reality

True or False? Data breaches require a tremendous amount of sophistication, “breaking” through an almost impenetrable perimeter. Check out this webinar to discover the truth.
Read More
EVENT : Oct 29

Cybersecurity Best Practices: The Basics and Beyond

Are you aware of modern cybersecurity threats? Watch this webinar to identify next steps and improve your cybersecurity best practices.
Read More
EVENT : Aug 29

5 Myths of Privileged Access Management for the Modern Enterprise

Can your legacy PAM adapt to secure your entire hybrid enterprise? We’ll debunk top myths to help you uncover the facts.
Read More
EVENT : Jul 25

5 Steps to Minimize Your Exposure to Ransomware Attacks – Learn more on July 25

Ransomware attacks are dominating the headlines in 2019: City of Baltimore, ASCO Industries, and the Weather Channel are just a few of the examples.
Read More
EVENT : Jun 6

The Anatomy of a Hack: Perception vs. Reality

Post-mortem analysis of data breaches have repeatedly found that the source of a hack is often compromised credentials, not sophistication.
Read More
ARTICLE

Gartner recognizes Centrify as a March 2019 Gartner Peer Insights Customers' Choice for Privileged Access Management

The Customers' Choice is based on peer reviews from actual customers in Gartner's free and publicly-viewable Gartner Peer Insights evaluations.
Read More
ARTICLE

Privileged Access Management Buyers' Guide

67% of all enterprise resources are exposed to access-related risk. Download this guide for a critical and practical approach to privilege.
Read More
ARTICLE

Government agencies can stop chasing the rabbit by moving to a Zero Trust framework

Government agencies can stop chasing the rabbit by moving to a Zero Trust framework, writes Jason Miller in Federal News Network. Read how now!
Read More
ARTICLE

A New Year's Resolution: Security is Broken…Let's Fix It

It's hard to keep New Year’s resolutions, but cybersecurity is broken. Read the proposal in Security Week to see this resolution through with Zero Trust.
Read More
ARTICLE

Gartner’s first-ever Magic Quadrant for Privileged Access Management. See who made the cut!

Gartner published its first-ever Magic Quadrant for Privileged Access Management. The report is available complimentary to prospective customers on Centrify’s web site.
Read More
ARTICLE

What is Zero Trust, and Why Does it Matter?

Dr. Chase Cunningham, Principal Analyst, Forrester Research - What is Zero Trust, and Why Does it Matter?
Read More
EVENT : Oct 24

Six Best Practices for Boosting Cloud Security

Security in the Golden Age of the Cloud – in a world of Zero Trust
Read More
ARTICLE

How State of Michigan – DTMB complies with federal regulations

How the State of Michigan – DTMB went from having too much privilege to a least privilege model.
Read More
ARTICLE

Secure the Vote with Zero Trust Security

Elections are the bedrock of democracy. Unfortunately, our election infrastructure is woefully ill-prepared for future cyber-attack interference.
Read More
LOAD MORE  
​​
E.REPUBLIC PLATFORMS & PROGRAMS