Centrify

Centrify

Centrify Identity Platform

Centrify is a leader in providing Identification Management across an organisation with their Identity Platform. Centrify Identity Platform (CIP) centralises identity management across Cloud, Mobile or On-Premise systems. The platform acts as a central aggregation point for Multi-Factor Authentication and enables improved integration of MFA technology over typical single vendor point solutions.

Centrify is a Securite partner

Centrify Solutions from Securite

CIP Family

The Centrify Identity Plaform is an adaptable framework that comprises numerous discrete components listed below.

Mobile Management – Apple MAC

CIP supports Bring Your Own Device (BYOD) initiatives and offers secure access to cloud, mobile and on-premises apps. The CIP offers native Apple MAC support.

Resources

Multi Factor Authentication Everywhere (MFA/2FA)

Implement multi-factor authentication (MFA) AKA Two-Factor (2FA) across every user and every IT resource. MFA/2FA blocks at credential breaches at multiple vector points.

Resources

Role Based Resource Access

Ensure that your employees, contractors, partners and customers have secure access to only the resources that is aligned with their role or responsibilities.

Resources

Industry and Government Compliance

Centrify addresses the specific requirements of key industry and federal regulations (USA) with a unified identity platform that helps you control, audit and report on access to sensitive data while reducing complexity and keeping users productive.

Resources

Big Data Security

Secure your complex Big Data environments with centralised identity management for better access control, privilege management and user-level auditing.

Resources

Securite for SSO


Privileged Access Control


Securite secures cloud assets

Why Privileged Access Security?
The modern enterprise is a heterogenuous environment of on-premises, cloud, mobile and remote infrastructure. There are often instances of Infrastructure-as-a-Service (IaaS) with an increasing reliance on outsourced IT. This exposes the organisation because as more locations and services are added, the technology surface area increases. Securing these points of presence becomes increasingly difficult and the risk of data breach rises in proportion. Compromised credentials pose a major threat to your infrastructure and demand a new approach to privileged identity management.
To meet these business drivers better oversight that encompasses any, or all of the following;

  • Get users to login as themselves, while maximising control over privileged accounts
  • Control access to infrastructure and privileges and enforce individual accountability
  • Consistently control access to hybrid infrastructure for both on-premises and remote users
  • Provide a single source for internal auditors to ensure controls are in place across all accounts

Consolidate identities, deliver cross-platform least-privilege access and control shared accounts, while securing remote access and auditing of all privileged sessions.

Privileged Identity Management

Consolidate identities, deliver cross-platform least-privilege access and control shared accounts, while securing remote access and auditing of all privileged sessions.

Resources

Federated Privileged Access

Enable secure remote access for outsourced IT administrators and third-party developers to your infrastructure through federated authentication.

Resources

Windows Server Protection

Establish granular user privilege and auditing of access to Windows infrastructure.

Resources

Secure Hybrid Cloud

Secure access to Infrastructure-as-a-Service (IaaS) management platforms as well as the IaaS virtual machines through role management and multi-factor authentication.

Resources

MFA Everywhere

Prevent compromised credentials by implementing multi-factor authentication across every user and every IT resource. Block cyberattacks at multiple points in the attack chain.

Resources