Centrify Privileged Access Management Services
Photo Gallery
Centrify Privileged Access Management Services
Additional Info
Company | Centrify Corp. |
Website | http://www.centrify.com |
Company size (employees) | 100 to 499 |
Overview
Over the course of its 16-year history, Centrify has developed a deep understanding of Privileged Access Management (PAM), including an initial focus on centralizing and orchestrating fragmented identities across enterprise infrastructure. Centrify was the first vendor to join UNIX and Linux systems with Active Directory, and later extended these capabilities to IaaS environments to empower cloud transformation, and offers the industry’s first true multi-tenant, cloud-architected PAM-as-a-Service solution.
Applying their deep expertise in infrastructure management allowed Centrify to evolve a more modern approach to PAM, and focus on identity-centric solutions including introducing a server’s capability to self-defend against cyber threats across the ever-expanding modern enterprise infrastructure. Centrify believes that PAM solutions must meet the needs of both Infrastructure and Security teams with a single platform, as these areas are made of the same connected tissues and therefore belong together.
Centrify is enabling digital transformation at scale, modernizing how organizations secure privileged access across hybrid- and multi-cloud environments by allowing humans and machines to seamlessly log in. Centrify is also enabling digital transformation by granting least privilege just-in-time, increasing accountability, and reducing administrative access risk.
Centrify’s Privileged Access Management Services empower least privilege access for human and machine identities based on verifying who is requesting access, the context of the request, and the risk of the access environment. Centrify centralizes and orchestrates fragmented identities, improves audit and compliance visibility, and reduces risk, complexity, and costs for the modern, hybrid enterprise.
How we are different
● Built in the cloud, for the cloud: Centrify offers the industry’s first multi-tenant, cloud-architected Privileged Access Management (PAM) solution, and the only PAMaaS offering that has received FedRAMP authorization. While competitors have tried to “lift and shift” their password vault solutions for the cloud, Centrify’s PAM solutions are built for the cloud from the ground up, while supporting on-premises as well as hybrid environments. Centrify provides different flavors of SaaS and customer-managed deployment options to meet expectations for ease of deployment, ease of use, high availability, and high scalability. This includes the industry’s first-and-only metered PAM-as-a-Service solution available in the AWS Marketplace.
● Industry-leading identity consolidation, centralization, and brokering: Centrify’s market-leading PAM solutions address the challenges brought by digital transformation by leveraging existing enterprise identity infrastructure to enforce least privilege access at scale for humans, machines and services, in the cloud and on-premises. Centrify delivers a modern PAM solution, including a cloud-ready vault and authentication service, that minimizes shared accounts and allows humans and services to log in as themselves and work with the tools they are familiar with, the way that they want to. With Centrify, privileged access controls are automated and seamlessly integrated, administrative access risk is reduced, and compliance postures are strengthened.
● Single platform for PAM: Organizations may consider approaching PAM by solely implementing password vaults, leaving gaps that can easily be exploited. Centrify combines password vaulting with a cohesive platform for brokering of identities, multi-factor authentication enforcement and “just enough” privilege, all while securing remote access and monitoring of all privileged sessions. In turn, the product helps organizations to reduce their attack surface, establish secure remote access for admins and outsourced IT, and empower DevOps teams with modern application-to-application authentication capabilities without impacting agility and flexibility.