Centrify - Securing the Cross Platform Data Center
Showing results for 
Search instead for 
Do you mean 

Leveraging Microsoft

New solutions briefs and Webinar recordings for managing identity-related risks on Windows Server!

 

 

Read more...

You're handed a mandate from management - restrict access to the PCI and SOX servers in order pass the upcoming audit.  On Windows Servers, there's a problem.  Every member of the Domain Admin group has access to the PCI and SOX servers.  How do you solve the problem and restrict access by your domain administrators to those servers?

Read more...

A quick reply to a customer question about how Centrify Server Suite for Windows uses and extends the functionality of Managed Service Accounts, a feature of Windows Server 2008 R2.

Read more...

In the not-so-recent past, ITcould give the server keys to a few (or a few hundred!) administrators and hope for the best, but that approach doesn't fly any more for auditors and regulators.  Here are four reasons IT organizations need better controls than native Windows provides for privilege management and monitoring.

Read more...

A root By Any Other Name

By Centrify Contributor III on ‎11-04-2013 01:44 PM

The local team, the offshore help desk, and the offsite contractors are all getting their work done, because you're efficiently granting them Local Administrator membership when they need to work on your Windows Servers. What's wrong with this picture?  While "Local Administrator" may sound friendly, it's root by any other name...

Read more...

Ever wonder how Centrify makes the magic that makes privilege elevation over remote connections possible?  Wonder no more, because Rich Loose explains it all in our latest Video Chalktalk for Centrify Server Suite...

Read more...

Many organizations use a common methodology to grant Local Administrator group membership on particular systems to user accounts through Active Directory.  It's efficient and effective; but, does it make it easy to grant too much privilege?  First in a series of posts.

Read more...

The risk of IT administrators gaining access to restricted systems and resources through root or Administrator privilege is "...a dirty little secret that's being revealed," said Robert Bigman, a former chief information security officer at the Central Intelligence Agency, quoted today in the New York Times article, "N.S.A. Leak Puts Focus on System Administrators".

Read more...

MAS Guidelines Require Auditing and Least Privilege

By Centrify Contributor III on ‎06-01-2013 04:06 PM - last edited ‎06-02-2013 10:17 PM

The Monetary Authority of Singapore (MAS) is the regulatory authority for all financial and insurance organizations that do business in Singapore.  They require regular audits of user activity on critical systems and implementation of the "least privilege" principle for user access.  MAS guidelines are likely to affect most if not all global financial and insurance companies.  Are you prepared to meet MAS guidelines?

Read more...

The annual Verizon Data Breach Investigations Report is unique in its coverage of real data breach incidents. Several things stood out for me in this year’s analysis of breaches: over 50% resulted in servers being compromised, and about 80% of successful hacks involved authentication. This is exactly why we all need to take a hard look at the state of privilege management across our users and resources.

Read more...

About the Author
  • Brad Zehring is a Director of Product Management for Centrify's solutions for privileged identity management, including Centrify Server Suite. He's been working with enterprise software for over thirty years in development and product management at companies such as Autodesk, Zone Labs, Symantec, and Centrify.