Centrify offers identity & access management solutions to help secure enterprise identities against cyberthreats that target today’s IT environment of cloud, mobile and on-premises.
Identity Consolidation, Privilege Management and Audit
Combine comprehensive bridging of Linux and UNIX systems to Active Directory with powerful privilege management, multi-factor authentication and session monitoring across Windows, Linux and UNIX systems. Net result is increased security, improved compliance and comprehensive reporting and auditing.
ACTIVE DIRECTORY BRIDGE
Manage Identities for Cross-platform Systems in Active Directory
Secure Linux, UNIX, Mac and mobile devices with the same consistent identity management services currently deployed for your Windows systems. An integrated set of tools centralizes discovery, management and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory.
MULTI-FACTOR AUTHENTICATION FOR SERVERS
Reinforce Secure Access to Critical Systems
Add an extra layer of security to protect against hackers by configuring multi-factor authentication (MFA) for IT administrators who access Windows, Linux and UNIX systems and require elevated privileges. Define authentication profiles with a selection of authentication challenges that will be trusted.
Simplify Privilege Management for Windows, Linux and UNIX
Secure mission-critical servers from identity-related insider risks and outsider attacks. Simplify the implementation of a least privilege access model across Windows, Linux and UNIX systems. Streamline the creation and management of administrative roles and rights with a robust set of tools that automate much of the process.
AUDITING AND COMPLIANCE
Detailed Monitoring and Reporting of Privileged Sessions
Eliminate anonymous activity by associating all privileged activity with an individual vs. a shared account. Unique session auditing, video replay, search capabilities and comprehensive compliance reporting establish accountability and streamline regulatory compliance. IT teams can pinpoint suspicious activity, troubleshoot system failures, and perform forensic investigations into breaches.
Dynamically Segment and Isolate Cross-Platform Systems
Prevent unauthorized access to trusted computing resources and data, add policy-driven protection against network attacks for mixed Windows, Linux and UNIX environments and improve regulatory compliance. Secure access to sensitive information by isolating and protecting systems and by enabling end-to-end encryption of data-in-motion without the need for costly and complex network devices.
CENTRIFY PRIVILEGE SERVICE
Access and Password Management for the Modern Enterprise
Combines the ability to securely manage and audit access to infrastructure with shared account password management for internal users, outsourced IT and third party vendors. Includes choice of cloud or on-premises deployment.