Get RSS Updates!

Centrify Corporation

The following free offers are provided to you on behalf of Centrify Corporation.

Sort by: Popularity | Title | Release Date

Three Important Reasons for Privileged Access Management and One Surprising Benefit In this white paper Enterprise Management Associates..
Managing Access to SaaS Applications IT professionals are grappling with not one, but three revolutions at the same time...
A Practical Path to Unified Identity Across Data Center, Cloud and Mobile Learn about unified identity services that centrally manage..
Three Important Reasons for Privileged Access Management (and One Surprising Benefit) Privileged access management can not only reduce your..
How Identity Management Solves Five Hadoop Security Risks Big Data is creating significant opportunities for businesses, and the explosive..
A Practical Path to Unified Identity Across Data Center, Cloud and Mobile The major trends challenging IT organizations today are the..
Windows Least Privilege Management and Beyond For Windows environments, it is critical that organizations can delegate administration and..
Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security Learn the importance of user activity auditing to..
Top 3 Reasons to Give Insiders a Unified Identity Learn why Executives and IT Compliance officers need to recognize and acknowledge the..
Improving Mobile Device Security and Management with Active Directory An overview of mobile device market trends, challenges and approaches..
A Practical Path to Unified Identity Across Data Center, Cloud and Mobile The major trends challenging IT organizations today are the..
Stop Password Sprawl with SaaS Single Sign-On via Active Directory As mobile devices have pushed their way into the enterprise, they have..
Improving Mobile Device Security and Management with Active Directory An overview of mobile device market trends, challenges and approaches..
Top Six Things to Consider with an Identity as a Service Solution The amount of apps, passwords, and identities that your employees need to..
Why Large Organizations Need a Unified Approach to Identity and Access Management (IAM) Mention Identity and Access Management (IAM) to..
Addressing PCI Data Security Standard Requirements in Heterogeneous Environments Learn the benefits of combining Microsoft Active Directory..
Enforcing Enterprise-out Security for Cloud Servers Learn how to maintain a secure environment in the cloud...
Future-Proofing the Enterprise A single, unified solution for managing Macs and mobile devices, Centrify User Suite, Mac Edition, helps you..
Office 365 Single Sign-On: High Availability without High Complexity For most organizations, the move to Office 365 (O365) is a leap forward..
Centrally Controlling, Securing and Auditing Access to Cross-Platform Systems and Applications Learn how IT professionals are reducing IT..
Close the Window on Three Window Server Threat Scenarios Security breaches are all over the news, many of them a result of either insider..
Identity and Access Management in the Cloud Era Leveraging the cloud to bring cost effectiveness and efficiency to a company must always be..
Centralized Identity and Access Management of Cross-Platform Systems and Applications Audit, access control, and identity management..
How Global Financial Firms Can Effectively Address Technology Risk Guidelines A Real World Example: Mapping Centrify Products to Monetary..
Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security Download this white paper to learn more about..
Windows Least Privilege Management and Beyond Learn how you can eliminate the problem of too many users having broad and unmanaged..
Top 3 Reasons to Give Insiders a Unified Identity Although much publicity around computer security points to hackers and other outside..
Implementing Detailed User-Level Auditing of UNIX & Linux Systems Enhance regulatory compliance and troubleshooting through detailed..
Stop Password Sprawl with SaaS Single Sign-On via Active Directory In this white paper you'll see how you can leverage your existing Active..
Single Sign-On for Java and Web Applications Enable single sign-on to custom Java and web applications running on Unix, Linux or Windows..
Top 3 Reasons to Give Insiders a Unified Identity Why give insiders a unified identity? And which solutions give you the best opportunity to..
Office 365 Single Sign-On: High Availability without High Complexity For most organizations, the move to Office 365 (O365) is a leap forward..
Top Six Things to Consider with an Identity as a Service Solution (IDaaS) Solution The amount of apps, passwords, and identities that your..
Address PCI DSS Requirements in Heterogeneous Environments Avoid stiff penalties defined by PCI DSS and maintain consumer trust of payment..
Office 365 Single Sign-On: High Availability without High Complexity This information brief will explain why highly reliable SSO between..
SaaS Apps? BYOD? Take Cloud Control Centrify User Suite Puts IT Back in the Driver's Seat...
Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security Capturing the detailed actions of privileged..
A Practical Path to Unified Identity Across Data Center, Cloud and Mobile The major trends challenging IT organizations today are the..
Managing Access to SaaS Applications IT professionals are grappling with not one, but three revolutions at the same time...
Stop Password Sprawl with SaaS Single Sign-On via Active Directory Numerous organizations are rushing to SaaS in an effort to move business..
Stop Password Sprawl with SaaS Single Sign-On via Active Directory As mobile devices have pushed their way into the enterprise, they have..
Your Data is in the Cloud, and Devices are Accessing it Everywhere In today's world of cloud-based applications, building a security..