Centrify Application Services
Centrify Application Services improves end-user productivity and secures every user’s access to apps through single sign-on, multi-factor authentication, and mobility management. Application Services supports internal users (employees, contractors) and external users (partners, customers).
- Single Sign-On with Adaptive MFA for access to your cloud, mobile & on-premises apps.
- Workflow & Lifecycle Management - Automatically route app requests & provision users across apps, from a central control point.
- App Gateway - Secure, granular access to infrastructure assets regardless of location & without the hassles of a VPN.
- Mobility Management (EMM)
Centrify Endpoint Services
Grant access to apps and infrastructure only from trusted and secured endpoints. Manage and secure your heterogeneous endpoints through a single source of identity and a least privilege access model.
- Mac & Mobile Device Management – Join Macs to AD & manage with GPOs. Centrally manage security policy for any endpoint.
- Adaptive MFA for Endpoints – Flexible authentication factors to authenticate to the apps users need & the devices they prefer.
- App Management – Simple, comprehensive SSO and app management.
- Endpoint Privilege Management - Role-based access controls.
- Smartcard & Derived Credentials
Centrify Infrastructure Services
Minimize the attack surface and control privileged access to the hybrid enterprise with identity assurance, just-in-time and just enough privilege, advanced monitoring and reporting.
- Identity Broker – Secure access & authentication to geographically dispersed infrastructure (on-premises & private/public cloud).
- Adaptive MFA for Privileged Access – Risk-based MFA for remote access to Windows & Linux servers and elevating or leveraging privileged credentials.
- Privilege Access & Elevation – Automatically fulfill self-service requests for specific roles, while being able to revoke those entitlements upon expiration.
- SAPM – Secure, auditable and always-on access to critical shared account passwords
- Secure Remote Access – Secure Privileged Access for On-Site and Remote Administration.
- Auditing & Reporting – Identify suspicious user activity, conduct forensic investigations and prove compliance faster with privileged session monitoring and auditing.
Centrify Analytics Services
Centrify Analytics Services stops account-based attacks leveraging user behavior data. Behavior-based scoring enables a frictionless user experience that is adjusted based on risk, improving productivity — while maintaining security.
- Behavior-based Access Control - Risk-aware access uses machine learning to define and enforce access policies, based on user behavior.
- Insights - Build custom dashboards to better understand IT risk, as well as user experience, across applications, endpoints and infrastructure.
- Explorer - Explorer offers rich tools to drill into details so that IT security and risk managers can better comprehend access and events.