SlideShare a Scribd company logo
A MASSIVE
RETHINK
OF SECURITY
FOR YEARS,
WE’VE RELIED ON
A WELL-DEFINED
BOUNDARY TO
PROTECT OUR ASSETS
These proven digital walls, bolstered
by extensive technology and
guarded by tough gatekeepers,
kept our information safe and out
of the hands of cyber criminals.
We knew where the perimeters of
our networks and endpoints were,
and we kept our important assets
on the safe side.
But the world as we know it is an
increasingly complex digital canvas
of identities, that live in and out
of the enterprise changing the
perimeter of the network — to no
perimeter at all.
TODAY, THERE IS NO SAFE SIDE.
TODAY’S SECURITY
80%of security breaches involve privileged
credential misuse2
$6 TRILLIONis the projected cost of cybercrime
damages by 20213
66%of organizations experienced an average
of 5 or more security breaches in the
past two years1
IS NOT SECURE
The password is the culprit
With 90% of all enterprises moving to the cloud,
and billions of users accessing data across
millions of applications, all accessed by one
simple permission: the password. Nearly 2/3rds
of all recent confirmed data breaches involved
weak, default or stolen passwords.
66% of enterprises were breached an average
of 5 or more times in the past two years.
The number of breaches skyrocketed in recent
years. This technology of the past — including
firewalls, virtual private networks (VPNs),
and antivirus software from security vendors
like Cisco, Symantec, Palo Alto Networks,
Check Point, and others — has proven to be an
ineffective form of protection against breaches.
The impact?
Nearly 6 billion data records were lost or
stolen in the past few years — that’s an
average of over 165,000 records compromised
every hour!5
According to the latest projections,
global cybercrime-related damage costs
are expected to exceed $6 trillion annually
by 2021.
OVER $75B SPENT ON CYBER SECURITY
LAST YEAR YET 66% OF COMPANIES
EXPERIENCED A BREACH4
THIS IS A HISTORY
HACKED WITH
CONSEQUENCES
Ubiquitous
Companies Go Dark
Dozens of well known
companies experienced
major outages after
the DNS provider Dyn
experienced a severe and
extended DDoS attack.
The cause? Passwords.
Millions of IoT devices
with the same unchanged
default password were
hijacked to create the
so-called Mirai botnet.
Major brand-name
companies like Spotify,
Twitter, Slack, Etsy, and
a ton of other major sites
were knocked offline for
hours, and even days.
Even months after the
attack, Mirai is still alive
and evolving.8
U.S. Presidential
Election Impacted
The first hacked election —
groups of hackers gained
access to the Democratic
National Committee’s (DNC)
servers and the email account
of John Podesta, campaign
chairman for Hillary Clinton.
These hackers released
sensitive information that
dominated news cycles, cast
a cloud over the Democratic
Party, and had a major impact
on the presidential election.
Yahoo! HACK
No consumer is safe —
in 2016, Yahoo revealed
that the account
information of over one
billion consumers —
including names,
email addresses, and
encrypted passwords
— were compromised
by a data breach that
occurred in 2013.6
Yahoo is now facing an
SEC probe and the Verizon
acquisition could be
devalued by $350M.7
THIS NEW
THREATSCAPE
REQUIRES A
PARADIGM
SHIFT
THESTATUSQUOISN’TWORKING.
RETHINK
SECURITY
RETHINK and challenge the perimeter-based approach
Cyber criminals are breaching systems with direct access via a compromised credential —
the password. The perimeter-based approach focuses on protecting endpoints, firewalls and
networks, and completely ignores the vulnerability of identities and passwords.
REDEFINE security to follow identity
The hybrid enterprise is boundaryless with millions of scattered connections that live in and
out of your enterprise. Protect identities as they access applications, devices, and infrastructure
— both on-premises and in the cloud.
ADAPT as the boundaryless landscape evolves
Cyberthreats are constantly getting more targeted and sophisticated, and static security methods
of the past simply can’t keep up. Next dimension security expands as your enterprise continues
to incorporate cloud, mobile, IoT, and other technologies — a seamless defense effortlessly
following users as they work across applications, tools, and environments.
STOP the breach with the power of identity services
Centrify automatically provisions user accounts, seamlessly manages and authorizes access
with context-aware controls, and records activity. Centrify Identify Services protects access to
applications and infrastructure for all users, from any device, anywhere.
FORRESTER REPORT
FINDS IAM MATURE
ORGANIZATIONS HAVE...
RISK
GOOD
Establish Identity
Assurance
BETTER
Limit Lateral
Movement
MFA Everywhere
Consolidate
Identities
SSO Everywhere
Mitigate VPN Risk
Automate App
Provisioning
Require Access Approvals
DANGER
Too Many Passwords
Too Much Privilege
MATURITY
GREAT
Enforce Least
Privilege
OPTIMAL
Log & Monitor
Grant Just Enough Privilege
Grant Just-in-Time Privilege
Complete Privileged
Access Security
50%fewer breaches
$5 MIL in cost savings
40%less on technology costs9
CENTRIFY.
DEFENDING THE
BOUNDARYLESS
HYBRID ENTERPRISE
THROUGH THE
POWER OF
IDENTITY SERVICES
CENTRIFY IDENTITY SERVICES PLATFORM
Our vision is to be the single integrated platform for the enterprise that dramatically reduces
breaches, reduces complexity and costs, by securing every user’s access to apps and infrastructure
in today’s boundaryless hybrid enterprise, through the power of identity services.
ANALYTICS SERVICES
Risk Scoring › User Behavior › Anomaly Insights
Application Services
Single Sign-on
MFA for Apps
Lifecycle Management
App Gateway
Mobility Management
On-Premises Apps
Endpoint Services
MFA from Endpoints
Device Management
App Management
Local Account Passwords
Comprehensive Mac Management
Infrastructure Services
Identity Consolidation
MFA for Servers
Shared Passwords
Secure Remote Access
Privileged Access Request
Privilege Elevation
Auditing and Monitoring
IDENTITY SERVICES PLATFORM
Directory › Authentication › MFA › Policy › Certificate › Federation › Workflow › Reporting
Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered
connections, in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged
Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure every user’s access
to apps and infrastructure in today’s boundaryless hybrid enterprise, through the power of identity services.
This is the Next Dimension of Security in the Age of Access.
Founded in 2004, Centrify is enabling over 5,000 customers, including over half the Fortune 50, to
defend their organizations. Centrify is a privately held company based in Santa Clara, California.
To learn more visit www.centrify.com.
The Breach Stops Here
SOURCES
1. 	Forrester, Stop the Breach, January 2017
2.	Forrester Wave™
: Privileged Identity Management, Q3 2016
3. 	CSO from IDG, Top Five Cybersecurity Facts, Figures, and Statistics for 2017, December 2016
4. 	Forbes, Worldwide Cybersecurity Spending Increasing To $170 Billion By 2020, March 2016
5. 	Breach Level Index, Data Breach Statistics, www.breachlevelindex.com
6.	New York Times, Yahoo Says 1 Billion User Accounts Were Hacked, December 2016
7. 	Yahoo Investor Relations, Verizon and Yahoo amend terms of definitive agreement, February 2017
8.	Wired, The Web-Shaking Mirai Botnet Is Splintering—But Also Evolving, November 2016
9. 	Forrester, Stop the Breach, January 2017

More Related Content

What's hot

Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
Kim Jensen
 
Top Cyber Security Concerns for Small Businesses
Top Cyber Security Concerns for Small BusinessesTop Cyber Security Concerns for Small Businesses
Top Cyber Security Concerns for Small Businesses
Jairo Batista, MBA
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
Seqrite
 
The Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsThe Top Three 2021 Cyber Threats
The Top Three 2021 Cyber Threats
Sai Huda
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out for
Cigniti Technologies Ltd
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
redteamacademypromo
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
Quick Heal Technologies Ltd.
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SMCarlos Valderrama
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
Stephen Lahanas
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
ITDogadjaji.com
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
Samvel Gevorgyan
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412Hai Nguyen
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020
Shawn Nutley
 
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi? Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
CypSec - Siber Güvenlik Konferansı
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
Anushka Perera
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
Mastel Indonesia
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
PwC France
 
Websecurity fundamentals for beginners
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginners
Samvel Gevorgyan
 

What's hot (20)

Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
Top Cyber Security Concerns for Small Businesses
Top Cyber Security Concerns for Small BusinessesTop Cyber Security Concerns for Small Businesses
Top Cyber Security Concerns for Small Businesses
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
The Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsThe Top Three 2021 Cyber Threats
The Top Three 2021 Cyber Threats
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out for
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi? Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
 
Websecurity fundamentals for beginners
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginners
 

Similar to Centrify rethink security brochure

Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Dean Iacovelli
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
Netmagic Solutions Pvt. Ltd.
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
GGV Capital
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalShallu Behar-Sheehan FCIM
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
Bavijesh Thaliyil
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - Cybersecurity
Row Murray
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
manoharparakh
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
Jenna Murray
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
CBIZ, Inc.
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
Amazon Web Services
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
itnewsafrica
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
Fibonalabs
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
JamshidRaqi
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
1SI19IS064TEJASS
 

Similar to Centrify rethink security brochure (20)

Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - Cybersecurity
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 

More from Mark Gibson

Strong Authentication in Cyberspace 8 key principles for policymakers
Strong Authentication in Cyberspace 8 key principles for policymakersStrong Authentication in Cyberspace 8 key principles for policymakers
Strong Authentication in Cyberspace 8 key principles for policymakers
Mark Gibson
 
10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk
Mark Gibson
 
Icit analysis-identity-access-management
Icit analysis-identity-access-managementIcit analysis-identity-access-management
Icit analysis-identity-access-management
Mark Gibson
 
Ideas from The Challenger Customer
Ideas from The Challenger CustomerIdeas from The Challenger Customer
Ideas from The Challenger Customer
Mark Gibson
 
The B2B Buyers Journey Sales Guide eBook
The B2B Buyers Journey Sales Guide eBookThe B2B Buyers Journey Sales Guide eBook
The B2B Buyers Journey Sales Guide eBook
Mark Gibson
 
Selling with IMPACT
Selling with IMPACTSelling with IMPACT
Selling with IMPACTMark Gibson
 
Sales and Marketing Alignment eBook 2014
Sales and Marketing Alignment eBook 2014Sales and Marketing Alignment eBook 2014
Sales and Marketing Alignment eBook 2014
Mark Gibson
 
Sales Productivity Tips from the Experts
Sales Productivity Tips from the ExpertsSales Productivity Tips from the Experts
Sales Productivity Tips from the Experts
Mark Gibson
 
Sales and Marketing Alignment, Content Reuse with WittyParrot webinar present...
Sales and Marketing Alignment, Content Reuse with WittyParrot webinar present...Sales and Marketing Alignment, Content Reuse with WittyParrot webinar present...
Sales and Marketing Alignment, Content Reuse with WittyParrot webinar present...
Mark Gibson
 
Your PowerPoint sucks Learn Visual Storytelling
Your PowerPoint sucks Learn Visual StorytellingYour PowerPoint sucks Learn Visual Storytelling
Your PowerPoint sucks Learn Visual Storytelling
Mark Gibson
 
Beyond the Whiteboard - Visual Confections That Sell
Beyond the Whiteboard - Visual Confections That SellBeyond the Whiteboard - Visual Confections That Sell
Beyond the Whiteboard - Visual Confections That SellMark Gibson
 
A guide to engaging whiteboard presentations
A guide to engaging whiteboard presentationsA guide to engaging whiteboard presentations
A guide to engaging whiteboard presentationsMark Gibson
 

More from Mark Gibson (12)

Strong Authentication in Cyberspace 8 key principles for policymakers
Strong Authentication in Cyberspace 8 key principles for policymakersStrong Authentication in Cyberspace 8 key principles for policymakers
Strong Authentication in Cyberspace 8 key principles for policymakers
 
10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk
 
Icit analysis-identity-access-management
Icit analysis-identity-access-managementIcit analysis-identity-access-management
Icit analysis-identity-access-management
 
Ideas from The Challenger Customer
Ideas from The Challenger CustomerIdeas from The Challenger Customer
Ideas from The Challenger Customer
 
The B2B Buyers Journey Sales Guide eBook
The B2B Buyers Journey Sales Guide eBookThe B2B Buyers Journey Sales Guide eBook
The B2B Buyers Journey Sales Guide eBook
 
Selling with IMPACT
Selling with IMPACTSelling with IMPACT
Selling with IMPACT
 
Sales and Marketing Alignment eBook 2014
Sales and Marketing Alignment eBook 2014Sales and Marketing Alignment eBook 2014
Sales and Marketing Alignment eBook 2014
 
Sales Productivity Tips from the Experts
Sales Productivity Tips from the ExpertsSales Productivity Tips from the Experts
Sales Productivity Tips from the Experts
 
Sales and Marketing Alignment, Content Reuse with WittyParrot webinar present...
Sales and Marketing Alignment, Content Reuse with WittyParrot webinar present...Sales and Marketing Alignment, Content Reuse with WittyParrot webinar present...
Sales and Marketing Alignment, Content Reuse with WittyParrot webinar present...
 
Your PowerPoint sucks Learn Visual Storytelling
Your PowerPoint sucks Learn Visual StorytellingYour PowerPoint sucks Learn Visual Storytelling
Your PowerPoint sucks Learn Visual Storytelling
 
Beyond the Whiteboard - Visual Confections That Sell
Beyond the Whiteboard - Visual Confections That SellBeyond the Whiteboard - Visual Confections That Sell
Beyond the Whiteboard - Visual Confections That Sell
 
A guide to engaging whiteboard presentations
A guide to engaging whiteboard presentationsA guide to engaging whiteboard presentations
A guide to engaging whiteboard presentations
 

Recently uploaded

WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
Peter Caitens
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 

Recently uploaded (20)

WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 

Centrify rethink security brochure

  • 2. FOR YEARS, WE’VE RELIED ON A WELL-DEFINED BOUNDARY TO PROTECT OUR ASSETS
  • 3. These proven digital walls, bolstered by extensive technology and guarded by tough gatekeepers, kept our information safe and out of the hands of cyber criminals. We knew where the perimeters of our networks and endpoints were, and we kept our important assets on the safe side. But the world as we know it is an increasingly complex digital canvas of identities, that live in and out of the enterprise changing the perimeter of the network — to no perimeter at all. TODAY, THERE IS NO SAFE SIDE.
  • 4. TODAY’S SECURITY 80%of security breaches involve privileged credential misuse2 $6 TRILLIONis the projected cost of cybercrime damages by 20213 66%of organizations experienced an average of 5 or more security breaches in the past two years1
  • 5. IS NOT SECURE The password is the culprit With 90% of all enterprises moving to the cloud, and billions of users accessing data across millions of applications, all accessed by one simple permission: the password. Nearly 2/3rds of all recent confirmed data breaches involved weak, default or stolen passwords. 66% of enterprises were breached an average of 5 or more times in the past two years. The number of breaches skyrocketed in recent years. This technology of the past — including firewalls, virtual private networks (VPNs), and antivirus software from security vendors like Cisco, Symantec, Palo Alto Networks, Check Point, and others — has proven to be an ineffective form of protection against breaches. The impact? Nearly 6 billion data records were lost or stolen in the past few years — that’s an average of over 165,000 records compromised every hour!5 According to the latest projections, global cybercrime-related damage costs are expected to exceed $6 trillion annually by 2021. OVER $75B SPENT ON CYBER SECURITY LAST YEAR YET 66% OF COMPANIES EXPERIENCED A BREACH4
  • 6. THIS IS A HISTORY HACKED WITH CONSEQUENCES
  • 7. Ubiquitous Companies Go Dark Dozens of well known companies experienced major outages after the DNS provider Dyn experienced a severe and extended DDoS attack. The cause? Passwords. Millions of IoT devices with the same unchanged default password were hijacked to create the so-called Mirai botnet. Major brand-name companies like Spotify, Twitter, Slack, Etsy, and a ton of other major sites were knocked offline for hours, and even days. Even months after the attack, Mirai is still alive and evolving.8 U.S. Presidential Election Impacted The first hacked election — groups of hackers gained access to the Democratic National Committee’s (DNC) servers and the email account of John Podesta, campaign chairman for Hillary Clinton. These hackers released sensitive information that dominated news cycles, cast a cloud over the Democratic Party, and had a major impact on the presidential election. Yahoo! HACK No consumer is safe — in 2016, Yahoo revealed that the account information of over one billion consumers — including names, email addresses, and encrypted passwords — were compromised by a data breach that occurred in 2013.6 Yahoo is now facing an SEC probe and the Verizon acquisition could be devalued by $350M.7
  • 11. RETHINK and challenge the perimeter-based approach Cyber criminals are breaching systems with direct access via a compromised credential — the password. The perimeter-based approach focuses on protecting endpoints, firewalls and networks, and completely ignores the vulnerability of identities and passwords. REDEFINE security to follow identity The hybrid enterprise is boundaryless with millions of scattered connections that live in and out of your enterprise. Protect identities as they access applications, devices, and infrastructure — both on-premises and in the cloud. ADAPT as the boundaryless landscape evolves Cyberthreats are constantly getting more targeted and sophisticated, and static security methods of the past simply can’t keep up. Next dimension security expands as your enterprise continues to incorporate cloud, mobile, IoT, and other technologies — a seamless defense effortlessly following users as they work across applications, tools, and environments. STOP the breach with the power of identity services Centrify automatically provisions user accounts, seamlessly manages and authorizes access with context-aware controls, and records activity. Centrify Identify Services protects access to applications and infrastructure for all users, from any device, anywhere.
  • 12. FORRESTER REPORT FINDS IAM MATURE ORGANIZATIONS HAVE... RISK GOOD Establish Identity Assurance BETTER Limit Lateral Movement MFA Everywhere Consolidate Identities SSO Everywhere Mitigate VPN Risk Automate App Provisioning Require Access Approvals DANGER Too Many Passwords Too Much Privilege
  • 13. MATURITY GREAT Enforce Least Privilege OPTIMAL Log & Monitor Grant Just Enough Privilege Grant Just-in-Time Privilege Complete Privileged Access Security 50%fewer breaches $5 MIL in cost savings 40%less on technology costs9
  • 15. CENTRIFY IDENTITY SERVICES PLATFORM Our vision is to be the single integrated platform for the enterprise that dramatically reduces breaches, reduces complexity and costs, by securing every user’s access to apps and infrastructure in today’s boundaryless hybrid enterprise, through the power of identity services. ANALYTICS SERVICES Risk Scoring › User Behavior › Anomaly Insights Application Services Single Sign-on MFA for Apps Lifecycle Management App Gateway Mobility Management On-Premises Apps Endpoint Services MFA from Endpoints Device Management App Management Local Account Passwords Comprehensive Mac Management Infrastructure Services Identity Consolidation MFA for Servers Shared Passwords Secure Remote Access Privileged Access Request Privilege Elevation Auditing and Monitoring IDENTITY SERVICES PLATFORM Directory › Authentication › MFA › Policy › Certificate › Federation › Workflow › Reporting
  • 16. Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections, in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure every user’s access to apps and infrastructure in today’s boundaryless hybrid enterprise, through the power of identity services. This is the Next Dimension of Security in the Age of Access. Founded in 2004, Centrify is enabling over 5,000 customers, including over half the Fortune 50, to defend their organizations. Centrify is a privately held company based in Santa Clara, California. To learn more visit www.centrify.com. The Breach Stops Here SOURCES 1. Forrester, Stop the Breach, January 2017 2. Forrester Wave™ : Privileged Identity Management, Q3 2016 3. CSO from IDG, Top Five Cybersecurity Facts, Figures, and Statistics for 2017, December 2016 4. Forbes, Worldwide Cybersecurity Spending Increasing To $170 Billion By 2020, March 2016 5. Breach Level Index, Data Breach Statistics, www.breachlevelindex.com 6. New York Times, Yahoo Says 1 Billion User Accounts Were Hacked, December 2016 7. Yahoo Investor Relations, Verizon and Yahoo amend terms of definitive agreement, February 2017 8. Wired, The Web-Shaking Mirai Botnet Is Splintering—But Also Evolving, November 2016 9. Forrester, Stop the Breach, January 2017