Welcome!

API Journal Authors: Elizabeth White, Rishi Bhargava, Pat Romanski, Kevin Benedict, Anders Wallgren

Blog Feed Post

Centrify Delivers Industry's First Unified Identity Solution for Secure Enablement of Enterprise Mobile, SaaS and BYOD Environments

New Centrify Cloud Services Integrate Mobile Device Management, Mobile Application Management and SaaS 'Zero Sign-On'; Selected by Samsung for Embedding in New Android-based Mobile Devices

SAN FRANCISCO (RSA Conference 2013 Booth 233) and BARCELONA (Mobile World Congress 2013 Stand 8.1A51 in App Planet - Hall 8.1) — Feb. 25, 2013 — Centrify Corporation, the leader in Unified Identity Services across data center, cloud and mobile, today announced the general availability of Centrify for Mobile 2013 and Centrify for SaaS 2013, a set of integrated capabilities enabled by the Centrify Cloud Services platform that delivers secure, enterprise-class mobility with integrated application Single Sign-on (SSO) to improve security and increase workforce productivity in the enterprise.

Centrify's solution goes well beyond Mobile Device Management (MDM) and SaaS SSO to also provide comprehensive Mobile Application Management (MAM) and "Zero Sign-on" for browser-based applications and rich mobile applications, addressing the IT and user challenges surrounding "Bring Your Own Device" (BYOD) adoption and the explosion of cloud-based apps. As a result, Centrify delivers true mobile enablement for enterprise cloud, mobile and BYOD environments.

With these industry-first capabilities, Centrify's latest innovation has been chosen by Samsung Electronics Co, Ltd. to provide key enabling technology for Samsung's next generation mobile enterprise solution. See accompanying press release titled "Centrify and Samsung Partner to Deliver Industry's First Comprehensive, Enterprise-ready Mobile Solution for Work and Personal Use" issued by Centrify today. The solution will be demonstrated for the first time this week at the RSA Conference 2013 in San Francisco in Centrify's booth number 233; and at the Mobile World Congress 2013 in Barcelona in Centrify's stand 8.1A51 in App Planet - Hall 8.1 and in the Samsung stand.

According to Gartner, "Apps downloaded from public app stores for mobile devices disrupt today's IT security, application and procurement strategies. Bring your own application (BYOA) has become as important as bring your own device (BYOD) in the development of a comprehensive mobile strategy, and the trend toward BYOA has begun to affect desktop and Web applications as well. Enterprise app stores promise at least a partial solution."[1]

Rapid employee adoption of SaaS and rich mobile applications combined with BYOD programs means that IT organisations increasingly don't own the endpoint devices or back-end application resources on their networks. At the same time, end users are increasingly challenged to deal with the password sprawl associated with the on-premise and cloud-based services they need to access to perform their jobs. A unified approach to managing an employee's digital identity that spans on-premise, cloud and mobile resources provides the visibility and control required for IT organisations to achieve compliance, reduce costs and mitigate risks, while also increasing productivity and securing access for their user centric, mobile workforce. The Centrify Cloud Services platform integrates application Single Sign-on, Mobile Device Management, Mobile Application Management, mobile authentication and Mobile Container Management services in a single solution that enables organisations to easily manage mobile and cloud initiatives via an infrastructure they already own — Active Directory.

"While a number of point products offer simple SSO to SaaS applications and basic MDM capability, the Centrify Cloud Services platform raises the bar in providing enterprises with true mobile enablement for their mobile and SaaS-driven environments with our Unified Identity Services," said David McNeely, Centrify senior director of product management. "With Centrify, users get to use the devices they choose and one-click Zero Sign-on to their apps to help them be more productive at work, while enterprise IT easily centrally manages and secures all these user-centric applications and devices on their networks. The unification of mobile and identity management truly enables today's changing mobile landscape."

Unified Identity Services for Mobile and SaaS Apps
Uniquely enabling organisations to manage mobile devices, mobile and web applications, and application authentication, the Centrify Cloud Services platform delivers unparalleled integration with existing Active Directory infrastructure, skill sets and processes. The Centrify Cloud Services platform enables both Centrify for Mobile and Centrify for SaaS, both of which have undergone major enhancements.

Centrify for Mobile 2013 includes new capabilities such as Mobile Authentication Services (MAS), Mobile Application Management (MAM) and Mobile Container Management (MCM); as well as updates to current MDM functionalities. Key new features include:

  • New Mobile Authentication Services (MAS) — Zero Sign-on authentication for mobile applications to cloud services leveraging Active Directory.

  • New Mobile Application Management (MAM) —a unified interface to manage both mobile and web applications, assign access rights based on roles, as well as auto-provision and de-provision mobile applications centrally. Additionally, includes enterprise app catalog with user self-service and support for 3rd party apps and custom apps.

  • Enhanced Mobile Device Management (MDM) — Expanded device management support for both Android and iOS platforms with full control over devices, auto-management of ActiveSync mailbox access control lists, and integration with Apple Configurator for mass or bulk deployment and remote management of iOS devices.

  • New Mobile Container Management (MCM) — Available to device manufacturers and service providers, MCM enables centralized management capabilities supporting secured containers to provide users with single sign-on for seamless access to mobile and web applications within the container. This provides the user with clear separate work and personal environments where enterprise IT can ensure proper security on the work environment without adversely affecting user privacy or usability of the personal device.

  • Unified Administration — Centrify Cloud Services delivers a unified administrative experience for Mobile Device Management and Mobile Container Management, as well as Mobile and Web application and application authentication management all through a single web console, the Centrify Cloud Manager.

Centrify for SaaS 2013 is now also generally available and allows users to securely utilize their existing Active Directory credentials to get SSO to their SaaS apps from a web browser running on any system, laptop or mobile device, whether the endpoint is on the corporate network or not. Centrify for SaaS supports hundreds of cloud-based apps, including Salesforce.com, WebEx, Box.net, and hundreds more. In addition, the service offers the robust MyCentrify portal where users obtain one-click access to all their SaaS apps from their PC, and can utilize self-service features that let them locate, lock or wipe their mobile devices, and also reset their Active Directory passwords or manage their Active Directory attributes. A mobile app version is also available on the Apple App Store and Google Play.

Pricing and Availability
Centrify for Mobile 2013 is available today from Centrify and authorized partners worldwide. It is priced at $3 per device per year, which includes technical support and access to feature updates. Centrify for SaaS 2013 is also available today and is priced at $4 per user per month. To download the free Express version of these solutions, see http://www.centrify.com/cloud/cloud-service-registration.asp?ls=170-999-02-25-13-mobile.

Note [1] - Gartner, "Enterprise App Stores Can Increase the ROI of the App Portfolio," by Ian Finley, et al, Feb. 4, 2013.

About Centrify
Centrify provides Unified Identity Services across the data center, cloud and mobile that results in one single login for users and one unified identity infrastructure for IT. Centrify's solutions reduce costs and increase agility and security by leveraging an organisation's existing identity infrastructure to enable centralized authentication, access control, privilege management, policy enforcement and compliance. Centrify customers typically reduce their costs associated with identity lifecycle management and compliance by more than 50 percent. With more than 4,500 customers worldwide, including 40 percent of the Fortune 50 and more than 60 Federal agencies, Centrify is deployed on more than one million server, application and mobile device resources on-premise and in the cloud. For more information about Centrify and its solutions, call (408) 542-7500, or visit http://www.centrify.com/.

###

Centrify, DirectAudit, DirectControl and DirectSecure are registered trademarks and DirectAuthorize and DirectManage are trademarks of Centrify Corporation in the United States and other countries.

Contact:
Anuya Upadhyay
020 8392 4076
[email protected]

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

@ThingsExpo Stories
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...