Part 3 of our series takes a deeper look at the architecture of Centrify DirectSecure, explaining how Centrify leveraged and customized the Racoon Internet Key Exchange (IKE) protocol daemon to efficiently and reliably secure your local and wide area networks. For more background, see Introducing Centrify DirectSecure Part 2: Securing UNIX and Linux Systems with IPsec and Active Directory

 

Running Time: 40 minutes

 

Speaker
Paul Moore, Chief Technical Officer

 

Moderator
David McNeely, Director, Product Management

 

Topics Covered

  • Enhancing Racoon for both Linux and Solaris platforms for enterprise-scale applications
  • How Racoon diverged from the Open SWAN, Free SWAN, and Strong SWAN IKE code bases
  • Using Coverity and Valgrind to bullet-proof open source code for enterprise use
  • How DirectSecure and IKE use certificate trust chains and CRLS

 

Centrify CTO Paul Moore and Director of Product Management David McNeely take us under the hood of Centrify DirectSecure, showing how it uses IPsec in an Active Directory environment to secure your UNIX and Linux systems. 

 

Running Time: 49 minutes

 

Speaker
Paul Moore, Chief Technical Officer

 

Moderator
David McNeely, Director, Product Management

 

Topics Covered

  • How Centrify's use of IPsec differs from traditional VPN-focused products
  • IPsec's ability to encrypt data in motion and protect communication between systems within a network
  • Using Active Directory Group Policy to customize IPsec across your network
  • The use of the Internet Key Exchange (IKE) daemon for peer-to-peer IPsec communication
  • Why IPsec can be more secure and easier to centrally manage than traditional firewalls
  • IPsec and ensuring trust of exchanged PKI certificates

 

Learn how to securely isolate key servers and data as well as optionally encrypting data in motion with Centrify DirectSecure. 

 

Running Time: 22 minutes

 

Speaker
David McNeely, Director, Product Management

 

Moderator
Frank Cabri, Vice President, Marketing

 

Topics Covered

  • Limiting the scope of PCI and other audits by isolating audited systems
  • Protecting intellectual property by managing communications to trusted systems
  • Shortcomings of existing firewall and network segmentation approaches to protecting host systems

Showing results for 
Search instead for 
Do you mean 
Labels
Leaderboard

Community Control Panel