|By Marketwired .||
|July 21, 2014 08:17 AM EDT||
SANTA CLARA, CA -- (Marketwired) -- 07/21/14 -- Centrify Corporation, the leader in unified identity management across data center, cloud and mobile, today announced that the University of Southern California (USC) has deployed its Centrify User Suite to extend secure remote and on-site single sign-on (SSO) access to university applications and computing resources, further enabling USC's powerful learning environment while avoiding hundreds of thousands of dollars in new IT infrastructure and construction investment.
Founded in Los Angeles in 1880, USC is one of the world's leading private research universities and home to more than 38,000 students and 3,500 full-time faculty members. "By simply enabling students to use their own devices, we have transformed our computing lab from endless rows of computers into a flexible classroom with more flexible and innovative teaching methodologies," said Michael Goay, executive director of IT for Viterbi Business Affairs, USC.
The USC Engineering Department was looking at ways to continually improve learning for its 5,300 students, and providing anywhere, anytime access to Mac-based applications was a key objective. While students have access to a state-of-the-art computing lab, business hours in the facility were restricted and scheduled classes further limited availability. This limited availability forced some students to license software for their personal machines, which proved very expensive.
Rather than spend hundreds of thousands of dollars to extend the lab or build an entirely new one, the university explored innovative technologies that could virtually extend the lab without the purchase of a single new laptop. After extensive research, the USC team found that the Centrify solution combined with Aqua Connect's RDS product and USC's Windows PowerShell script could extend access management via Windows Active Directory across the university's entire heterogeneous computing environment.
"After significant research and many meetings with different companies, we selected Centrify and Aqua Connect for their group policy management, flexibility, manageability, licensing model, and their willingness to work with us to address our challenges," said Goay. "We estimated the cost of building out a new lab to be in the hundreds of thousands of dollars, and when we estimated the total cost of the Centrify and Aqua Connect solutions, there was no comparison. USC views the Centrify project as an investment in our students, but it has offered significant savings as well. The value of enabling BYOD in one classroom alone is more than $60,000."
Today, students use their primary USC log-in through Microsoft Active Directory and Centrify's SSO solution automatically grants permissions and access based on course enrollment, without having to manage user accounts, log-in credentials or passwords. The Centrify/Aqua Connect solution is helping to improve learning with anywhere, anytime access, and enables classes traditionally taught in Mac-based instructional computing labs to be taught in any classroom, with or without computers. USC students use their own laptops, save money on software licensing, and benefit from a unified computing experience, persistent data storage, and roaming across physical computing labs equipped with Macs and PCs, as well as virtual computing environments.
According to Goay, student response and adoption to the program have been very positive. With easy access to essential resources, significantly more students are bringing their own devices rather than using university-supplied hardware. This allows USC to reconfigure classrooms for maximum flexibility and remove laptops entirely, saving additional tens of thousands of dollars each year, he said.
"USC is one of the world's leading research universities, and we are pleased to work with them to better equip their students in today's very competitive 24x7 learning environments," said Mark Weiner, chief marketing officer, Centrify. "Centrify is growing its business significantly in all markets, especially in education, and USC provides a great use case how education institutions can further learning while avoiding unnecessary costs by encouraging BYOD among students and providing anytime, secure access to the resources and information students need."
USC is using the Mac Edition of the Centrify User Suite, which allows organizations to easily implement Active Directory-based management for both connected and remote Mac OS X systems, as well as end-users' Apple iOS and Android mobile devices. With Centrify, IT departments can centrally manage authentication, policy management, single sign-on (SSO) and user self-service for all popular endpoint devices using Active Directory. Customers benefit by leveraging their existing identity infrastructure, processes and trained IT staff while reducing costs and improving operational efficiency.
Centrify provides unified identity management across data center, cloud and mobile environments that result in single sign-on (SSO) for users and a simplified identity infrastructure for IT. Centrify's unified identity management software and cloud-based Identity-as-a-Service (IDaaS) solutions leverage an organization's existing identity infrastructure to enable single sign-on, multi-factor authentication, privileged identity management, auditing for compliance and mobile device management. Centrify customers can typically reduce their total cost of identity management and compliance by more than 50 percent, while improving business agility and overall security. Centrify is used by more than 5,000 customers worldwide, including approximately half of the Fortune 50 and more than 60 Federal agencies. For more information, please visit http://www.centrify.com/.
Centrify is a registered trademark and Centrify Server Suite and Centrify User Suite are trademarks of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Jul. 28, 2016 04:30 PM EDT Reads: 1,171
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
Jul. 28, 2016 04:30 PM EDT Reads: 878
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
Jul. 28, 2016 04:15 PM EDT Reads: 335
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Jul. 28, 2016 04:15 PM EDT Reads: 1,768
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
Jul. 28, 2016 03:45 PM EDT Reads: 1,098
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
Jul. 28, 2016 03:45 PM EDT Reads: 1,012
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
Jul. 28, 2016 03:30 PM EDT Reads: 340
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead in providing the most complete assessment of both internal and external cyber risk. CIS benchmarks are a widely accepted set of hardening guidelines that have been publicly available for years. Numerous solutions exist t...
Jul. 28, 2016 03:30 PM EDT Reads: 696
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Jul. 28, 2016 03:15 PM EDT Reads: 1,900
Verizon Communications Inc. (NYSE, Nasdaq: VZ) and Yahoo! Inc. (Nasdaq: YHOO) have entered into a definitive agreement under which Verizon will acquire Yahoo's operating business for approximately $4.83 billion in cash, subject to customary closing adjustments. Yahoo informs, connects and entertains a global audience of more than 1 billion monthly active users** -- including 600 million monthly active mobile users*** through its search, communications and digital content products. Yahoo also co...
Jul. 28, 2016 03:15 PM EDT Reads: 676
"Software-defined storage is a big problem in this industry because so many people have different definitions as they see fit to use it," stated Peter McCallum, VP of Datacenter Solutions at FalconStor Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 28, 2016 03:00 PM EDT Reads: 1,559
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Jul. 28, 2016 12:49 PM EDT Reads: 288
"We're bringing out a new application monitoring system to the DevOps space. It manages large enterprise applications that are distributed throughout a node in many enterprises and we manage them as one collective," explained Kevin Barnes, President of eCube Systems, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 28, 2016 12:45 PM EDT Reads: 1,782
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Jul. 28, 2016 12:30 PM EDT Reads: 590
The best-practices for building IoT applications with Go Code that attendees can use to build their own IoT applications. In his session at @ThingsExpo, Indraneel Mitra, Senior Solutions Architect & Technology Evangelist at Cognizant, provided valuable information and resources for both novice and experienced developers on how to get started with IoT and Golang in a day. He also provided information on how to use Intel Arduino Kit, Go Robotics API and AWS IoT stack to build an application tha...
Jul. 28, 2016 12:00 PM EDT Reads: 1,230