IT Security

Centrify

Centrify is the leader in securing enterprise identities against cyberthreats that target today's hybrid IT environment of cloud, mobile and on-premises. Centrify secures enterprise identities against cyberthreats that target today's hybrid IT environment of cloud, mobile and on-premises.

Why Choose Centrify?

Our Products

CENTRIFY IDENTITY SERVICE

Centrify Identity Service improves end-user productivity and secures access to cloud, mobile and on-premises apps via single sign-on, user provisioning and multi-factor authentication. Supports internal users (employees, contractors) and external users (partners, customers). Manage apps, mobile devices and Macs via Active Directory, LDAP or cloud identity stores.

CENTRIFY PRIVILEGE SERVICE

Cloud-based Password and Access Management - Combines shared account password management with the ability to securely manage and audit access by internal users, outsourced IT and third party vendors.

CENTRIFY SERVER SUITE

Identity Consolidation, Privilege Management and Audit - Combines comprehensive bridging of Linux and UNIX systems to Active Directory with powerful privilege management and session monitoring across Windows, Linux and UNIX systems. Net result is increased security, improved compliance and comprehensive reporting and auditing.

Our Solutions

Cloud

Centrify unifies app and mobile management through a comprehensive cloud service. Customers can manage the entire SaaS app lifecycle to provision SaaS user accounts, secure mobile devices and deploy mobile clients, provide single sign-on (SSO), and step up access controls with multi-factor authentication. Centrify can also secure access to enterprise social media and shared accounts.

Mac & Mobile

Centrify integrates mobile and identity management through a comprehensive cloud service. Customers can leverage the Centrify Identity Service to automate the entire app lifecycle, bring large numbers of authorized mobile devices under management, and secure access to enterprise social media and shared accounts.

Data Center

Centrify secures Linux, UNIX and Windows systems and other IT infrastructure, and helps to maintain compliance. Leveraging Active Directory, Centrify centralizes privileged identities and control, mitigates shared account access, and implements least-privilege security. Activity is audited and recorded to increase compliance and simplify auditing.

Regulatory Compliance

Centrify addresses the specific requirements of key industry and federal regulations.

Federal

Centrify solutions maintain the highest federal certifications such as FIPS 140-2, Common Criteria-EAL2+, SOC II, FedRAMP, US Army Certificate of Networthiness (CON), US NAVY Authority to Operate (ATO) for the federal market. Centrify’s solutions enables government agencies achieve compliance, including FISMA, ICAM HSPD-12, CDM, CMaaS, Cloud-First, FirstNet and NIST 800 series.

Our Technology Partners