Centrify’s Infrastructure Services are designed to stop breaches that abuse privilege. IT teams are able to minimize their attack surface and control privileged access to the hybrid enterprise, along with other features that simplify compliance.
Components of Centrify Infrastructure Services:
Identity Broker – Access & authentication to geo dispersed infrastructure (on-premises & private or public cloud), leveraging identities in AD, LDAP or cloud directories such as Google’s.
Adaptive MFA for Privileged Access – Risk-based MFA for admins who access Windows & Linux servers, elevate privilege or leverage privileged creds.
Privilege Elevation – Self-service request system facilitates requests for specified roles & time periods - if approved, will automatically revoke that access upon expiration.
Shared Account Password Management– Gives internal users, outsourced IT & 3rd party vendors secure, always-on access to critical shared account passwords (maintaining control over who has access, which passwords they use & how those passwords are managed).
Privileged Access Request – Temporary, time-bound privileged access to on-premises & cloud-based infrastructure.
Secure Remote Access – Secure Privileged Access for On-Site & Remote Administration.
Auditing & Reporting – Monitor user activity, conduct forensic investigations & prove compliance.
More about Centrify:
Centrify delivers Zero Trust Security through the power of Next-Gen Access.
Centrify verifies every user, validates their devices, and limits access and privilege.
Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM).
Founded in 2004 by Tom Kemp, Adam Au and Paul Moore, Centrify is customer funded by over 5,000 customers and backed by top tier investors including Accel Partners, Mayfield, Sigma West, Index Ventures, Samsung Ventures, NTT Docomo and Fortinet.