Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:38 PM
Dark Reading
Dark Reading
Products and Releases

Centrify's Unified Identity Solution Secures Access To Enterprise Social Media Shared Accounts

Centrify for SaaS vaults the passwords for social accounts so users never know or need to use the social app's password

SUNNYVALE, Calif. -- Nov. 19, 2013 -- Centrify Corporation, the leader in Unified Identity Services across data center, cloud and mobile, today announced that its Centrify User Suite, SaaS Edition ("Centrify for SaaS") solution uniquely protects enterprises' shared accounts, including social media accounts such as Twitter, from internal threats and unauthorized access, including access from users who have left the organization.

Today's organizations are often forced to leverage shared access to social accounts on behalf of the company or brand. Losing control of these social accounts can be costly, embarrassing and can damage reputations. Common access control problems occur when employees share passwords with unauthorized users, are no longer authorized to access the accounts themselves, or leave the organization and take the shared username and password with them. The Centrify for SaaS Identity-as-a-Service (IDaaS) solution provides robust Active Directory- and/or cloud-based access and application management across any cloud application, including shared enterprise accounts for social media sites. Additionally, with built-in administrative views and reports that give instant views of which employees have access to shared social media accounts, Centrify for SaaS enables organizations for the first time to centralize control over access to cloud applications in the workplace.

For example, Centrify for SaaS vaults the passwords for social accounts so users never know or need to use the social app's password. When an approved user needs to log in to one of these social accounts, they simply log in to the Centrify portal as themselves and click on the shared account. At no time do users have access to the shared password, and an IT administrator can even define when users are allowed to access the app, from what location, and can ask them for additional factors of authentication. When the employee leaves the organization or their role in the enterprise changes, administered access in Active Directory or Centrify's cloud user service simply turns off shared account access as well.

"While key logger trojans and hacker groups do pose a real threat to enterprise accounts, organizations often forget about protecting themselves against the casual or malicious internal threat," said Corey Williams, Centrify senior director of product management. "Not addressing the internal threat leaves organizations exposed to unauthorized internal access or malicious Twitter posts from casual, disgruntled or ex-employees who still have access to the organization's social accounts. With Centrify, organizations can easily centralize all their social accounts and access without having to share passwords."

With Centrify for SaaS, organizations solve password problems and secure the devices that are accessing cloud and mobile apps. End users benefit from Centrify's Single Sign-on (SSO) and self-service features that let them locate, lock or wipe their mobile devices, as well as reset their Microsoft Active Directory passwords. IT benefits from Centrify's easy-to-deploy, cloud-based service that delivers centralized access control and visibility to SaaS app usage and integrated mobile application management with seamless integration to Active Directory or Centrify's cloud user service. Centrify for SaaS decreases the cost of managing SaaS apps and mobile devices while at the same time improving security and compliance, as well as user adoption, satisfaction and productivity.

About Centrify

Centrify provides Unified Identity Services across the data center, cloud and mobile that results in one single login for users and one unified identity infrastructure for IT. Centrify's solutions reduce costs and increase agility and security by leveraging an organization's existing identity infrastructure to enable centralized authentication, access control, privilege management, policy enforcement and compliance. Centrify customers typically reduce their costs associated with identity lifecycle management and compliance by more than 50%. With more than 5,000 customers worldwide, including approximately half of the Fortune 50 and more than 60 Federal agencies, Centrify is deployed on more than one million server, application and mobile device resources on premise and in the cloud. For more information about Centrify and its solutions, call (408) 542-7500, or visit http://www.centrify.com/.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.