Click here to close now.

Welcome!

Virtualization Authors: Pat Romanski, Liz McMillan, Carmen Gonzalez, Elizabeth White, Bart Copeland

Blog Feed Post

Centrify Delivers Industry's First Unified Identity Solution for Secure Enablement of Enterprise Mobile, SaaS and BYOD Environments

New Centrify Cloud Services Integrate Mobile Device Management, Mobile Application Management and SaaS 'Zero Sign-On'; Selected by Samsung for Embedding in New Android-based Mobile Devices

SAN FRANCISCO (RSA Conference 2013 Booth 233) and BARCELONA (Mobile World Congress 2013 Stand 8.1A51 in App Planet - Hall 8.1) — Feb. 25, 2013 — Centrify Corporation, the leader in Unified Identity Services across data center, cloud and mobile, today announced the general availability of Centrify for Mobile 2013 and Centrify for SaaS 2013, a set of integrated capabilities enabled by the Centrify Cloud Services platform that delivers secure, enterprise-class mobility with integrated application Single Sign-on (SSO) to improve security and increase workforce productivity in the enterprise.

Centrify's solution goes well beyond Mobile Device Management (MDM) and SaaS SSO to also provide comprehensive Mobile Application Management (MAM) and "Zero Sign-on" for browser-based applications and rich mobile applications, addressing the IT and user challenges surrounding "Bring Your Own Device" (BYOD) adoption and the explosion of cloud-based apps. As a result, Centrify delivers true mobile enablement for enterprise cloud, mobile and BYOD environments.

With these industry-first capabilities, Centrify's latest innovation has been chosen by Samsung Electronics Co, Ltd. to provide key enabling technology for Samsung's next generation mobile enterprise solution. See accompanying press release titled "Centrify and Samsung Partner to Deliver Industry's First Comprehensive, Enterprise-ready Mobile Solution for Work and Personal Use" issued by Centrify today. The solution will be demonstrated for the first time this week at the RSA Conference 2013 in San Francisco in Centrify's booth number 233; and at the Mobile World Congress 2013 in Barcelona in Centrify's stand 8.1A51 in App Planet - Hall 8.1 and in the Samsung stand.

According to Gartner, "Apps downloaded from public app stores for mobile devices disrupt today's IT security, application and procurement strategies. Bring your own application (BYOA) has become as important as bring your own device (BYOD) in the development of a comprehensive mobile strategy, and the trend toward BYOA has begun to affect desktop and Web applications as well. Enterprise app stores promise at least a partial solution."[1]

Rapid employee adoption of SaaS and rich mobile applications combined with BYOD programs means that IT organisations increasingly don't own the endpoint devices or back-end application resources on their networks. At the same time, end users are increasingly challenged to deal with the password sprawl associated with the on-premise and cloud-based services they need to access to perform their jobs. A unified approach to managing an employee's digital identity that spans on-premise, cloud and mobile resources provides the visibility and control required for IT organisations to achieve compliance, reduce costs and mitigate risks, while also increasing productivity and securing access for their user centric, mobile workforce. The Centrify Cloud Services platform integrates application Single Sign-on, Mobile Device Management, Mobile Application Management, mobile authentication and Mobile Container Management services in a single solution that enables organisations to easily manage mobile and cloud initiatives via an infrastructure they already own — Active Directory.

"While a number of point products offer simple SSO to SaaS applications and basic MDM capability, the Centrify Cloud Services platform raises the bar in providing enterprises with true mobile enablement for their mobile and SaaS-driven environments with our Unified Identity Services," said David McNeely, Centrify senior director of product management. "With Centrify, users get to use the devices they choose and one-click Zero Sign-on to their apps to help them be more productive at work, while enterprise IT easily centrally manages and secures all these user-centric applications and devices on their networks. The unification of mobile and identity management truly enables today's changing mobile landscape."

Unified Identity Services for Mobile and SaaS Apps
Uniquely enabling organisations to manage mobile devices, mobile and web applications, and application authentication, the Centrify Cloud Services platform delivers unparalleled integration with existing Active Directory infrastructure, skill sets and processes. The Centrify Cloud Services platform enables both Centrify for Mobile and Centrify for SaaS, both of which have undergone major enhancements.

Centrify for Mobile 2013 includes new capabilities such as Mobile Authentication Services (MAS), Mobile Application Management (MAM) and Mobile Container Management (MCM); as well as updates to current MDM functionalities. Key new features include:

  • New Mobile Authentication Services (MAS) — Zero Sign-on authentication for mobile applications to cloud services leveraging Active Directory.

  • New Mobile Application Management (MAM) —a unified interface to manage both mobile and web applications, assign access rights based on roles, as well as auto-provision and de-provision mobile applications centrally. Additionally, includes enterprise app catalog with user self-service and support for 3rd party apps and custom apps.

  • Enhanced Mobile Device Management (MDM) — Expanded device management support for both Android and iOS platforms with full control over devices, auto-management of ActiveSync mailbox access control lists, and integration with Apple Configurator for mass or bulk deployment and remote management of iOS devices.

  • New Mobile Container Management (MCM) — Available to device manufacturers and service providers, MCM enables centralized management capabilities supporting secured containers to provide users with single sign-on for seamless access to mobile and web applications within the container. This provides the user with clear separate work and personal environments where enterprise IT can ensure proper security on the work environment without adversely affecting user privacy or usability of the personal device.

  • Unified Administration — Centrify Cloud Services delivers a unified administrative experience for Mobile Device Management and Mobile Container Management, as well as Mobile and Web application and application authentication management all through a single web console, the Centrify Cloud Manager.

Centrify for SaaS 2013 is now also generally available and allows users to securely utilize their existing Active Directory credentials to get SSO to their SaaS apps from a web browser running on any system, laptop or mobile device, whether the endpoint is on the corporate network or not. Centrify for SaaS supports hundreds of cloud-based apps, including Salesforce.com, WebEx, Box.net, and hundreds more. In addition, the service offers the robust MyCentrify portal where users obtain one-click access to all their SaaS apps from their PC, and can utilize self-service features that let them locate, lock or wipe their mobile devices, and also reset their Active Directory passwords or manage their Active Directory attributes. A mobile app version is also available on the Apple App Store and Google Play.

Pricing and Availability
Centrify for Mobile 2013 is available today from Centrify and authorized partners worldwide. It is priced at $3 per device per year, which includes technical support and access to feature updates. Centrify for SaaS 2013 is also available today and is priced at $4 per user per month. To download the free Express version of these solutions, see http://www.centrify.com/cloud/cloud-service-registration.asp?ls=170-999-02-25-13-mobile.

Note [1] - Gartner, "Enterprise App Stores Can Increase the ROI of the App Portfolio," by Ian Finley, et al, Feb. 4, 2013.

About Centrify
Centrify provides Unified Identity Services across the data center, cloud and mobile that results in one single login for users and one unified identity infrastructure for IT. Centrify's solutions reduce costs and increase agility and security by leveraging an organisation's existing identity infrastructure to enable centralized authentication, access control, privilege management, policy enforcement and compliance. Centrify customers typically reduce their costs associated with identity lifecycle management and compliance by more than 50 percent. With more than 4,500 customers worldwide, including 40 percent of the Fortune 50 and more than 60 Federal agencies, Centrify is deployed on more than one million server, application and mobile device resources on-premise and in the cloud. For more information about Centrify and its solutions, call (408) 542-7500, or visit http://www.centrify.com/.

###

Centrify, DirectAudit, DirectControl and DirectSecure are registered trademarks and DirectAuthorize and DirectManage are trademarks of Centrify Corporation in the United States and other countries.

Contact:
Anuya Upadhyay
020 8392 4076
[email protected]

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

@ThingsExpo Stories
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal an...
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and application infrastructure. But that’s changing with microservices architectures. In her session at DevOps Summit, Lori MacVittie, Evangelist for F5 Networks, will focus on how microservices are changing the underlying architectures needed to scale, secure and deliver applications based on highly distributed (micro) services and why that means an expansion into “the network” for DevOps.
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles ...
The 3rd International @ThingsExpo, co-located with the 16th International Cloud Expo – to be held June 9-11, 2015, at the Javits Center in New York City, NY – is now accepting Hackathon proposals. Hackathon sponsorship benefits include general brand exposure and increasing engagement with the developer ecosystem. At Cloud Expo 2014 Silicon Valley, IBM held the Bluemix Developer Playground on November 5 and ElasticBox held the DevOps Hackathon on November 6. Both events took place on the expo floor. The Bluemix Developer Playground, for developers of all levels, highlighted the ease of use of...
We’re no longer looking to the future for the IoT wave. It’s no longer a distant dream but a reality that has arrived. It’s now time to make sure the industry is in alignment to meet the IoT growing pains – cooperate and collaborate as well as innovate. In his session at @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, will examine the key ingredients to IoT success and identify solutions to challenges the industry is facing. The deep industry expertise behind this presentation will provide attendees with a leading edge view of rapidly emerging IoT oppor...
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective storage designed to handle the massive surge in back-end data in a world where timely analytics is e...
We certainly live in interesting technological times. And no more interesting than the current competing IoT standards for connectivity. Various standards bodies, approaches, and ecosystems are vying for mindshare and positioning for a competitive edge. It is clear that when the dust settles, we will have new protocols, evolved protocols, that will change the way we interact with devices and infrastructure. We will also have evolved web protocols, like HTTP/2, that will be changing the very core of our infrastructures. At the same time, we have old approaches made new again like micro-services...
SYS-CON Events announced today that Gridstore™, the leader in hyper-converged infrastructure purpose-built to optimize Microsoft workloads, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Gridstore™ is the leader in hyper-converged infrastructure purpose-built for Microsoft workloads and designed to accelerate applications in virtualized environments. Gridstore’s hyper-converged infrastructure is the industry’s first all flash version of HyperConverged Appliances that include both compute and storag...
For years, we’ve relied too heavily on individual network functions or simplistic cloud controllers. However, they are no longer enough for today’s modern cloud data center. Businesses need a comprehensive platform architecture in order to deliver a complete networking suite for IoT environment based on OpenStack. In his session at @ThingsExpo, Dhiraj Sehgal from PLUMgrid will discuss what a holistic networking solution should really entail, and how to build a complete platform that is scalable, secure, agile and automated.
The industrial software market has treated data with the mentality of “collect everything now, worry about how to use it later.” We now find ourselves buried in data, with the pervasive connectivity of the (Industrial) Internet of Things only piling on more numbers. There’s too much data and not enough information. In his session at @ThingsExpo, Bob Gates, Global Marketing Director, GE’s Intelligent Platforms business, to discuss how realizing the power of IoT, software developers are now focused on understanding how industrial data can create intelligence for industrial operations. Imagine ...
Hadoop as a Service (as offered by handful of niche vendors now) is a cloud computing solution that makes medium and large-scale data processing accessible, easy, fast and inexpensive. In his session at Big Data Expo, Kumar Ramamurthy, Vice President and Chief Technologist, EIM & Big Data, at Virtusa, will discuss how this is achieved by eliminating the operational challenges of running Hadoop, so one can focus on business growth. The fragmented Hadoop distribution world and various PaaS solutions that provide a Hadoop flavor either make choices for customers very flexible in the name of opti...
In the consumer IoT, everything is new, and the IT world of bits and bytes holds sway. But industrial and commercial realms encompass operational technology (OT) that has been around for 25 or 50 years. This grittier, pre-IP, more hands-on world has much to gain from Industrial IoT (IIoT) applications and principles. But adding sensors and wireless connectivity won’t work in environments that demand unwavering reliability and performance. In his session at @ThingsExpo, Ron Sege, CEO of Echelon, will discuss how as enterprise IT embraces other IoT-related technology trends, enterprises with i...
Wearable devices have come of age. The primary applications of wearables so far have been "the Quantified Self" or the tracking of one's fitness and health status. We propose the evolution of wearables into social and emotional communication devices. Our BE(tm) sensor uses light to visualize the skin conductance response. Our sensors are very inexpensive and can be massively distributed to audiences or groups of any size, in order to gauge reactions to performances, video, or any kind of presentation. In her session at @ThingsExpo, Jocelyn Scheirer, CEO & Founder of Bionolux, will discuss ho...
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impact.
Every day we read jaw-dropping stats on the explosion of data. We allocate significant resources to harness and better understand it. We build businesses around it. But we’ve only just begun. For big payoffs in Big Data, CIOs are turning to cognitive computing. Cognitive computing’s ability to securely extract insights, understand natural language, and get smarter each time it’s used is the next, logical step for Big Data.
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will want to use their existing identities, but these will have credentials already that are (hopefully) i...
The 4th International Internet of @ThingsExpo, co-located with the 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - announces that its Call for Papers is open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
17th Cloud Expo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises are using some form of XaaS – software, platform, and infrastructure as a service.
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, data security and privacy.
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series data. By focusing on enterprise applications and the data center, he will use OpenTSDB as an example t...