Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

9/18/2013
03:14 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Centrify Backs BYOD Initiates With Day One Support And Interoperability Of Apple iOS 7 Operating System

Centrify User Suite solution offers centralized access management and reporting of enrolled devices and installed applications

SUNNYVALE, Calif. -- Sept. 18, 2013 -- Centrify Corporation, the leader in Unified Identity Services across data center, cloud and mobile, today announced that its Centrify User Suite offering supports the just-released Apple iOS 7 operating system for iPhones and iPads, enabling organizations to leverage Centrify's proven Active Directory-based security service to manage users and devices and address enterprise mobility and BYOD challenges. The Centrify User Suite solution maximizes security and visibility through centralized access management and reporting of enrolled devices and installed applications, allowing IT staff to quickly and securely bring large populations of Apple iOS, Android and Mac devices under management by leveraging existing Active Directory identity infrastructure and skill sets.

With Centrify User Suite, both mobile devices and Macs are seamlessly integrated into Microsoft Active Directory, leveraging organizations' existing Active Directory infrastructures, processes and skill sets to deliver enhanced security and centralized management for IT; and secure Single Sign-On (SSO) access for users in the workplace. This unparalleled integration with an organization's on-premise Active Directory infrastructure and Group Policy-based management tools makes it easy to enforce and update Mac and mobile security settings. From locking or remotely wiping devices to securing access to email networks and enforcing use of passcodes, the Centrify solution enables administrators to easily assign devices to users and manage the associated properties and settings for each user's device without the hassle of deploying complex new infrastructure or a separate management console.

"With the wave of mobile devices operating alongside Macs in organizations today, it is imperative that solutions securing these devices support the latest available operating systems versions," said David McNeely, Centrify senior director of product management. "As an Apple partner, we've always endeavored to provide 'day one' support of every new operating system release to allow end users to embrace the latest and greatest innovations while enabling the organization to ensure safe and productive use of Apple devices in the workplace."

Availability

Centrify support for iOS 7 release is available today in all Centrify User Suite Editions. To obtain more information, see http://www.centrify.com/products/centrify-user-suite.asp For the free Centrify Express for Mobile, see http://www.centrify.com/mobile/free-mobile-device-security-management.asp

About Centrify

Centrify provides Unified Identity Services across the data center, cloud and mobile that results in one single login for users and one unified identity infrastructure for IT. Centrify's solutions reduce costs and increase agility and security by leveraging an organization's existing identity infrastructure to enable centralized authentication, access control, privilege management, policy enforcement and compliance. Centrify customers typically reduce their costs associated with identity lifecycle management and compliance by more than 50%. With more than 5,000 customers worldwide, including 40% of the Fortune 50 and more than 60 Federal agencies, Centrify is deployed on more than one million server, application and mobile device resources on-premise and in the cloud. For more information about Centrify and its solutions, call (408) 542-7500, or visit http://www.centrify.com/.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5641
PUBLISHED: 2020-11-24
Cross-site request forgery (CSRF) vulnerability in GS108Ev3 firmware version 2.06.10 and earlier allows remote attackers to hijack the authentication of administrators and the product's settings may be changed without the user's intention or consent via unspecified vectors.
CVE-2020-5674
PUBLISHED: 2020-11-24
Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2020-29002
PUBLISHED: 2020-11-24
includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator.
CVE-2020-29003
PUBLISHED: 2020-11-24
The PollNY extension for MediaWiki through 1.35 allows XSS via an answer option for a poll question, entered during Special:CreatePoll or Special:UpdatePoll.
CVE-2020-26890
PUBLISHED: 2020-11-24
Matrix Synapse before 1.20.0 erroneously permits non-standard NaN, Infinity, and -Infinity JSON values in fields of m.room.member events, allowing remote attackers to execute a denial of service attack against the federation and common Matrix clients. If such a malformed event is accepted into the r...