Unified identity services across data center, mobile and cloud
by Mirko Zorz - Editor in Chief - Monday, 18 March 2013.
Tom Kemp is co-founder and CEO of Centrify Corporation, a software and cloud security provider that delivers solutions that centrally control, secure and audit access to on-premise and cloud-based systems, applications and devices.

In this podcast recorded at RSA Conference 2013, Kemp talks about unified identity services, as well as a partnership with Samsung.

This cooperation will provide smartphone users with out-of-the-box enterprise-ready mobile solution that easily integrates with existing identity infrastructure to unlock features like mobile user productivity and single sign-on, application management and device management.

Press the play button below to listen to the podcast:





Managing identity is hard to do in a traditional data center comprised of heterogeneous systems and applications. Throw into this mix the additional identity silos introduced with new cloud and mobile platforms, and it becomes even more difficult to ensure that critical IT compliance and security tasks such as de-provisioning user access, running compliance reports and managing privileged user access are easily and fully implemented.

Clearly identity sits at the intersection of cloud, mobile and each organization's compliance and risk requirements. Thus one of the biggest challenges for any organization is: how can they manage their users' identities to optimize user productivity, IT efficiency and compliance across data center, cloud and mobile?

Centrify sees this significant challenge as one that can in fact be addressed in a comprehensive and cost-effective manner where IT organizations can truly do more with less. We solve this challenge by delivering a set of unified identity services that centrally manage identities across data center, cloud and mobile to optimize cost, agility and security. Our identity services include integrated authentication, access control, privilege management, policy enforcement and compliance. This results in one single login for users and one seamless identity infrastructure for IT.

Spotlight

Free security software identifies cloud vulnerabilities

Posted on 21 October 2104.  |  Designed for IT and security professionals, the service gives a view of the data exchanged with partner and cloud applications beyond the network firewall. Completely passive, it runs on non-production systems, and does not require firewall changes.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Oct 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //