| Date | Title | Description |
| 05.02.2025 | Observo AI Accelerates Growth with Key Executive Hire Following Recent $15 Million Seed Round | AI-Native Data Pipeline Pioneer Appoints Enterprise Marketing Veteran Steven Hua as Senior Vice President of Marketing
Observo AI, pioneering agentic AI-powered data pipelines that autonomously optimize observability and security data, toda... |
| 04.02.2025 | Observo AI: Agentic AI-Based Data Pipeline Company Raises $15 Million (Seed) | Observo AI, an agentic AI-based data pipeline company that autonomously optimizes observability and security data, announced the appointment of Steven Hua as Senior Vice President of Marketing. And following the recent $15 million seed fund... |
| 08.12.2024 | От CNAPP до CTEM — ИБ-термины простыми словами | Современные облачные сервисы и другие области ИТ включают большое количество специализированных терминов и аббревиатур, связанных с информационной безопасностью. Чтобы упростить понимание этих понятий, мы подготовили компактный словарь для ... |
| 26.05.2022 | Как бы вы реализовали форму аутентификации на сайте? Вопрос для собеседования на Junior/Middle/Senior? | В свете исследования "Веб-разработчики пишут небезопасный код по умолчанию" мне подумалось, что именно так может звучать один из базовых вопросов на собеседовании с точки зрения проверки знания web-разработчика от уровня Junior до... |
| 01.02.2022 | Centrify now Delinea | Transaction Combines Decades of Telematics Experience Under Command Alkon Leadership |
| 10.12.2021 | Delinea wins 2021 Computing Security Excellence Award for Identity and Access Management | Delinea, a leading provider of cloud identity security solutions formed by the merger of privileged access management (PAM) leaders Thycotic and Centrify, is proud to announce that it has won the 2021 Computing Security Excellence Awards in... |
| 01.12.2021 | ThycoticCentrify Bolsters Executive Team with Key Leadership Hires | REDWOOD CITY, Calif. and WASHINGTON, Dec. 1, 2021 /PRNewswire/ -- ThycoticCentrify, a leading provider of cloud identity security solutions formed by the merger of privileged access management (PAM) leaders Thycotic and Centrify, today anno... |
| 16.11.2021 | Cybersecurity: The Ultimate Guide to Defending Against Cyber Attacks | Think about how much of the world relies on the internet. The government, military, academia, health care industry, and private industry not only collect, process, and store unprecedented amounts of data in cyberspace - they also rely on cr... |
| 26.06.2021 | 7 keys to evaluating zero trust security frameworks | Where does your enterprise stand on the AI adoption curve? Take our AI survey to find out.
Zero trust as a framework for securing modern enterprises has been around for years, but is drawing renewed attention with the increase in cyberattac... |
| 26.06.2021 | 7 keys to evaluating zero trust security frameworks | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Zero trust as a framework for securing modern ent... |
| 13.04.2021 | Thycotic and Centrify Merge to Become a Leading Cloud Privileged Identity Security Vendor | Combined company to deliver comprehensive cloud privileged access management solutions to meet unique demands of the market, from SMB to global enterprises |
| 25.03.2021 | Identity Defined Security Alliance Announces Interactive Events to Celebrate Inaugural ‘Identity Management Day' on April 13 | DENVER, March 25, 2021 (GLOBE NEWSWIRE) -- The Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral education and resources to help organizations reduce the risk of a breach by combining identity and security ... |
| 17.03.2021 | How a reliance on the cloud still poses security risks | Image: iStock/Melpomenem
Moving your assets and infrastructure to the cloud is a key way to offload some of the time, money and resources required to manage everything internally. With the coronavirus pandemic and lockdown forcing a dramati... |
| 11.03.2021 | Top 10 cybersecurity lessons learned one year into the pandemic | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
In 2020, chief information security officers (CIS... |
| 11.03.2021 | Top 10 cybersecurity lessons learned one year into the pandemic | Join Transform 2021 for the most important themes in enterprise AI & Data. Learn more.
In 2020, chief information security officers (CISOs), chief information officers (CIOs), and their cybersecurity teams faced a digital pandemic of br... |
| 02.03.2021 | TPG-Led Investor Group Announces Combination of Thycotic and Centrify to Create a Leading Cloud Identity Security Vendor | SAN FRANCISCO & WASHINGTON & SANTA CLARA, Calif.--(BUSINESS WIRE)--Mar 2, 2021--
TPG Capital, the private equity platform of alternative asset firm TPG, announced today that it has signed a definitive agreement to combine Thycotic, ... |
| 01.03.2021 | Digital.com Names Best Identity Management Systems of 2021 | SEATTLE (PRWEB) March 01, 2021
Digital.com, a leading independent review website for small business online tools, products, and services, has announced the best identity management systems of 2021. The top solutions were evaluated based on ... |
| 19.02.2021 | Securing Machine Identities Needs To Be A Top Cybersecurity Goal In 2021 | Taking a Zero Trust approach to managing every machine identity authentication on a network now ... [+] could save thousands of hours and dollars in the future. getty |
| 03.02.2021 | 12 Expert Strategies For Keeping Your Data Secure In A Multi-Cloud Environment | getty |
| 24.01.2021 | 10 Ways Covid-19 Vaccine Supply Chains Need To Be Protected By Cybersecurity | By closing the cybersecurity gaps in vaccine supply chains, the world's nations can find new, ... [+] leaner, more efficient processes to distribute vaccines and protect their citizens. getty |
| 15.12.2020 | The Best Cybersecurity Predictions For 2021 Roundup | getty |
| 03.12.2020 | Centrify Momentum Fueled by Digital Transformation Including Secure Cloud and DevOps Acceleration | SANTA CLARA, Calif. (PRWEB) December 03, 2020
Centrify, a leading provider of Identity-Centric Privileged Access Management (PAM) solutions, today announced significant sales momentum across all regions and industries as organizations seek ... |
| 25.11.2020 | What's New In The 2020 Forrester Privileged Identity Management Wave? | New PIM use cases in the areas of DevOps teams, IT admins configuring cloud infrastructure, bots, ... [+] IoT, and API-driven workloads are defining the future of the market. getty |
| 11.10.2020 | Centrify's New CEO Has A Compelling Vision For The Future Of Cybersecurity | centrify.com |
| 20.08.2020 | The Connection Between Employees, Phishing, Marketing And Your Company’s Reputation | CMO of Cymulate, VP Marketing, B2B Cyber Growth Strategist, Advisory Board, Entrepreneur, G-CMO Member |
| 13.05.2020 | CyberArk snaps up identity startup Idaptive for $70M | Israeli cybersecurity company CyberArk has acquired identity startup Idaptive for $70 million in an all-cash deal.
CyberArk is one of the shining stars in the Israeli cybersecurity scene before its initial public offering in 2013 saw it go ... |
| 05.04.2020 | 2020 Roundup Of Cybersecurity Forecasts And Market Estimates | istock |
| 26.01.2020 | Top 10 Cybersecurity Companies To Watch In 2020 | istock |
| 24.10.2019 | Centrify’s Free Tier Vault is available now for PH enterprises | Earlier this month, Zero-Trust Privilege provider Centrify introduced its security solutions in the Philippines, which aims to secure modern enterprise attack surface and make the most of Privileged Access Management.
Centrify Zero Trust Pr... |
| 25.09.2019 | Survey: 80% of breaches caused by privileged credential abuse | Privileged Access is supposed to add stringent layers of data protection. And yet, according to Forrester PIM Wave 2018 Report presented by Forrester Research Inc., a staggering 80% of data breaches involve privileged credential misuse.
Cen... |
| 16.06.2019 | Top 10 Cybersecurity Companies To Watch In 2019 | |
| 04.12.2018 | Marriott breach sparks multibillion-dollar suits, with more to come | Two class-action lawsuits already have been filed against Marriott after the hotel chain revealed a massive breach of its systems that compromised 500 million customers. One of the suits is seeking billions in damages. And many more are on ... |
| 15.08.2018 | Centrify Receives Majority Investment from Thoma Bravo | Centrify, a Santa Clara, CA-based provider of an Identity & Access Management platform, received a majority investment from Thoma Bravo.
The amount of the deal was not disclosed. Thoma Bravo acquired the interest from Centrify’s venture... |
| 12.07.2018 | Term Sheet – Thursday, July 12 | MIX TAPE
Good morning all! Lucinda back again for today and Friday. Reach me lucinda.shen@fortune.com.
Paid Content How can you protect what you can't see? From ExtraHop
Well, kind of.
The venture capital arm of his family office, Cohen Ven... |
| 19.04.2018 | Centrify gives states a deal on identity management software to secure midterm elections | To secure U.S. election systems from the very real threat of targeted cyberattacks, states might need to reframe their security practices to look more like they would in a tightly controlled corporate environment.
To that end, Centrify, an ... |
| 29.01.2018 | What do Equifax, HBO, Uber, and Yahoo all have in common? | Presented by Centrify
A consumer ratings agency, a cable network, a transportation company, and a web services provider. What ties them together? Sure, they were all impacted by very high-profile security breaches. But, if you dig a little ... |
| 11.07.2017 | Nuvias Acquires Benelux Distributor DCB | Nuvias deal signifies strong commitment to further growth in Benelux
Benelux distributor DCB ready for major growth, following deal with pan-EMEA high value distributor Nuvias.
London and Brussels: 11/7/17: Nuvias Group, the pan-EMEA, high ... |
| 10.03.2017 | Using machine learning to secure identity and access management systems | We’ve been losing the war on cybercrime for some time. Research firm Forrester reports over a billion accounts stolen in 2016 alone, and these data breaches are going up, not down. We are having to wade through more incident data, and peopl... |
| 18.11.2016 | Did a lack of common sense cybersecurity just elect Trump? | Presented by Centrify.
There is little debate that this election will be described as a referendum on the status quo, with very strong anti-establishment and anti-elitist sentiment driving record numbers of unexpected voters to the polls. B... |
| 19.09.2016 | 6 critical steps to avoid CEO Fraud…now | This sponsored post is produced in association with Centrify.
This past February, communications-app maker Snapchat posted a public apology to its employees on its blog, stating that it had fallen victim to an increasingly common email scam... |
| 28.06.2016 | Hackers gonna hack — and 66% of consumers will stop doing business with your company if it happens to you | This sponsored post is produced by Centrify.
A recent study commissioned by Centrify found that 66 percent of adults in the U.S. are at least somewhat likely to stop doing business with a company that has suffered a cyberbreach. And less th... |
| 09.06.2016 | Why traditional perimeter-based security is not enough for cyberattacks | This sponsored post is produced by Centrify.
As we head into summer let us be reminded that current cybersecurity measures have not been enough to stem the tide of breaches. According to Verizon’s Data Breach Investigations Report, over hal... |
| 06.04.2015 | Hey, entrepreneurs: Get a job | Share this article:
I imagine that the headline above will spark indignation in a number of people, especially entrepreneurs. But I’d encourage you to read to the end of the post and see if you still feel the same way.
I was reading a piece... |
| 04.04.2015 | Hey, entrepreneurs: Get a job | Most young entrepreneurs today want to bypass the whole employment thing and go straight to being the boss. Like their heroes — Mark Zuckerberg, Steve Jobs, Sergey Brin, et al — they imagine they can change the world without any on-the-job ... |
| 04.04.2015 | Hey, entrepreneurs: Get a job | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Most young entrepreneurs today want to bypass the... |
| 07.11.2014 | Okta Catches SpydrSafe In Its Enterprise Web | Update: Okta has still not explicitly confirmed the acquisition of SpydrSafe, but its cofounder today retweeted our story about the sale after Okta unveiled a new Mobility Management service. That new product is much of what I describe belo... |
| 26.09.2014 | The cloud is disrupting and defragmenting the identity market | This sponsored post is produced by Centrify.
When we started Centrify more than 10 years ago, Identity and Access Management (“IAM”) was a big but rather static market. In 2008 — a few years after we formed Centrify — the analyst group IDC ... |
| 22.09.2014 | Samsung Knox product line extended, small business version released | Samsung has expanded its Knox product line of mobile device management software, including a cloud-based identity and access management, along with a version aimed at small businesses.
The software provides a separate workspace container on... |
| 31.05.2014 | How to secure your VMs in the cloud, Part 1 | Choosing a protection product for a virtual infrastructure is a lot like buying an anti-virus product for the Mac OS: most people would say why bother when few attacks have been observed to date. (Although that situation is changing see our... |
| 20.05.2014 | Identity management company Centrify raises $42 million | The new funding came from Samsung, Fortinet and Docomo
Centrify Corporation, a provider of Unified Identity Services, announced on Tuesday that it has raised $42 million in new funding from strategic investors Samsung Ventures, Fortinet Inc... |
| 20.05.2014 | Centrify Raises $42M | Centrify Corporation, a Santa Clara, CA-based provider of Unified Identity Services across data center, cloud and mobile, raised $42m in funding.
Backers included strategic investors Samsung Ventures, Fortinet Inc. and Docomo Capital.
The c... |
| 20.05.2014 | Centrify Announces $42M in Funding |
SANTA CLARA, CA, Leader in Unified Identity Services across data center, cloud and mobile, today announced it has raised $42 million in funding.
>> Click here for more funding data on Centrify
>> To export Centrify funding d... |
| 20.05.2014 | Cloud-based I.D. service Centrify raises $42M from Samsung & others | Enterprise-level identity management software startup Centrify has raised a new $42 million round of funding, the company announced today.
Centrify provides a cloud-based identity tracking service that gives businesses a way to let employee... |
| 20.05.2014 | Centrify Nabs $42M From Samsung And More For Cloud-Based Enterprise Identity Management | The rush to fund interesting companies in the world of online security continues apace. Today, Centrify — a specialist in cloud-based identity management for enterprises — is announcing that it’s picked up an additional $42 million from a g... |
| 05.03.2014 | Centrify’s Tom Kemp On Preparing Technology Companies For The Long Haul | On a first glance, it wouldn’t be apparent that Tom Kemp, a co-founder and the CEO of Centrify, runs one of the world’s best private enterprise technology companies. Turns out, he’s on his second startup, this one — Centrify — started back ... |
| 30.01.2014 | The top 10 cloud-based security tools to protect your network in a hurry | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
It doesn’t matter what size you are when it comes... |
| 30.01.2014 | The top 10 cloud-based security tools to protect your network in a hurry | It doesn’t matter what size you are when it comes to protecting your network. Big company, small company, startup: Hackers will still want your information and they’ll still stealthily poke holes in your network wherever they can.
You need ... |
| 03.06.2013 | Centrify Enables Fast and Easy Migration to Microsoft Office 365 with Active Directory Integration for Single Sign-on and Access Management | Centrify for SaaS Now Supports Office 365; Offers Easy-to-Deploy and Enhanced Active Directory-based Federated Identity for Reduced Complexity and Improved Security
NEW ORLEANS (TechEd 2013 Booth 2418) — June 3, 2013 — Centrify Corporation,... |
| 10.04.2013 | Dropbox For Teams Gets Dropped In Re-Branding To Reflect “Business” Focus | Dropbox is renaming Dropbox Teams to better reflect its change in business focus. The move comes in tandem with Dropbox’s new support for single sign on (SSO) and partnerships with Okta and other identity providers.
Dropbox for Business wil... |
| 03.12.2012 | Centrify Addresses IT and User Challenges around Explosion of Mobile and Business Apps | Unveils Easy-to-Use, Secure Access for SaaS and Cloud Services
Builds on Microsoft Active Directory to Enhance Unified Identity Services across Data Centre, Cloud and Mobile, Resulting in One Single Login for Users and One Identity Infrastr... |
| 13.11.2012 | HSBC Bank Deploys Centrify Suite to Centrally Manage Security and Auditing for Worldwide IT Operations | Leading Worldwide Financial Institution Uses Centrify to Secure Access, Improve Auditing, and Manage User Accounts
SUNNYVALE, Calif, and BRACKNELL, UK - Nov 13, 2012 - Centrify Corporation, the leading provider of security and compliance so... |
| 07.09.2012 | Why You Don’t Need Mac Anti-Virus Software – Plus What You Do Need | Most Mac users don’t spend much time worrrying about computer viruses, but many companies wonder if they need to install anti-virus software on their corporate Macs. Nope, at least according a recent Forrester Research report that says the ... |
| 18.08.2011 | Centrify’s single sign-on secures servers, scores $16M | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Centrify, a company securing on-premise and cloud... |
| 17.08.2011 | Centrify Secures $16M Series D |
Index Ventures leads Series D Funding; Joins current VCs Mayfield Fund, Accel Partners, INVESCO Private Capital and Sigma Partners in backing company posting record revenue and profitability.
>> Click here for more funding data on ... |
| 17.08.2011 | Centrify Corporation Closes $16M Series D Financing Round | Centrify Corporation, a Sunnyvale, CA-based provider of security and compliance solutions designed to control, secure and audit both on-premise and cloud-based systems and applications, has closed a $16m Series D financing round.
The round ... |
| 30.06.2008 | Group of software companies create Mac enterprise alliance | reader comments with 0 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
A group of five software companies announced today that they would be teaming together to promote Macs in enterprise environmen... |
| 08.04.2008 | From saboteur to member: Microsoft joins Kerberos Consortium | reader comments with 0 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
Eight years after it was accused of attempting to subvert the Kerberos authentication protocol, Microsoft is now joining the co... |
| 17.04.2007 | Centrify, security software co., raises $15M more | Centrify, a Mountain View security company focused on integrating non-Microsoft platforms with Microsoft Active Directory management services, has raised $15 million in a third round of capital, reports PE Week.
This follows $22 million alr... |
| 07.10.2005 | IT Weekly Roundup, Oct. 7 | News IT Weekly Roundup, Oct. 7
From the business wires this week: software for documenting your network’s assets and vulnerabilities, a solution for joining heterogeneous systems to Active Directory, and network time servers. By Dan HongOct... |
| 07.10.2005 | IT Weekly Roundup, Oct. 7 | News IT Weekly Roundup, Oct. 7
From the business wires this week: software for documenting your network’s assets and vulnerabilities, a solution for joining heterogeneous systems to Active Directory, and network time servers. By Dan HongOct... |