Open Network Featured Article

Centrify Joins Open Network Insight Security Project

August 11, 2016



For more than 10 years, Centrify has built software that allows businesses to manage individuals’ network identities. It has even created a cloud computing service for that task that can reach across multiple networks and centralize management of such locations.



Both the company and its members know that user identity plays a large part in network security. This is why the Open Network Insight (ONI) security project has now partnered with Centrify to bring identity management into its collection of network protection features. ONI works for companies by using machine learning to identify network threats; with Centrify at its core, it can add identity to the list of protection mechanisms it uses to separate good network traffic from bad.

ONI works as an open source application that supports the sharing of data among users. It markets its use of an “open data model” that gives users the power to manage user credentials from a central location while also identifying suspicious DNS packets and connection patterns and then showing all aspects of that data for sharing with partners. This way, a company that wishes to protect itself, its subsidiaries, and its partners can make sure there is a clear path of important communication between them. No more blockages of data transfer caused by proprietary software or license ties.

Bill Mann, the chief product officer at Centrify, commented on his company’s excitement to join the ONI project:

“We are excited to join the ONI community to further expand the underlying open data model to identity-based security,” he said.

He further mentioned that the entire cybersecurity industry needs to rethink how it approaches network threats. ONI makes an effort to respond to network threats first by creating a profile of any suspicious IP address and building a timeline of an IP’s actions related to a network. More than that, it creates a “storyboard” of those actions to explain with text and graphics how the IP has acted, and then it allows users to share the relevant data with interested parties. Nothing remains hidden to the direct observer or the partners the threat may affect.

Mann rightly notes that ONI’s use of machine learning and its open door policy can help advance the cybersecurity industry in many ways. In no small part, it reinforces the role of the business community and its need to band together in the face of threats. Now Centrify can add its identity management resources to that whole and hopefully help the community even further.