sb-as logo
Story image

Centrify recognised for cloud computing security excellence

Enterprise security firm Centrify has been named as a 2016 Cloud Computing Security Excellence Award winner for the Centrify Identity Service (CIS) in the category of Cloud Security.

The Cloud Computing Security Excellence Award, recognises companies that have most effectively leveraged cloud computing in their efforts to bring new, differentiated offerings to market.

“We are honoured to receive this recognition,” says Bill Mann, chief product officer of Centrify.

“CIS secures and manages access to cloud apps, on-premises apps and mobile devices via single sign-on, user provisioning and multi-factor authentication,” he says.

“It protects against the leading point of attack used in data breaches compromised credentials – which is critical as companies continue to adopt cloud and mobile technology, and embrace BYOD initiatives.”

Mann says CIS brings security and peace of mind that is indispensable for IT managers.

“With CIS, IT provisions new accounts across applications, provides single sign-on to them, securing and managing devices used to access those apps. CIS combines user identity with device context to provide security that scales as needed: allowing/blocking access or challenging for multi-factor authentication based on a comprehensive and flexible set of parameters,” he explains.

Story image
Emotet malware is on a rampage after months of silence
CERT agencies around the world are reporting a surge in cyber attacks related to the Emotet malware, which is being distributed by email.More
Story image
Just one click – that’s all it takes to let in cyber-crime
So how do organisations ensure that users are not compromised by simply doing their work?  The answer is surprisingly simple, writes Bufferzone Security business strategist for A/NZ Greg Wyman.More
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
Phishing scam imitates SharePoint & OneNote for nefarious clicks
Sophos researchers say that the attackers take a slightly different approach to the standard ‘fake login’ phishing email.More
Story image
CrowdStrike integrates with ServiceNow program to bolster incident response
As part of the move, users can now integrate device data from the CrowdStrike Falcon platform into their incident response process, allowing for the improvement of both the security and IT operation outcomes.More
Story image
IT leaders fear increase risk of cyber attacks while working from home
More than 80% of IT leaders believe their company is at a greater risk of cyber attacks when their staff are working from home, according to new research. More