Centrify Identity Service improves end-user productivity and secures access to cloud, mobile and on-premises apps via single sign-on, user provisioning and multi-factor authentication. Supports internal users (employees, contractors) and external users (partners, customers). Manage apps, mobile devices and Macs via Active Directory, LDAP or cloud identity stores.
Manage and secure all users:
Control access to cloud and mobile apps and manage the devices used to access them
Improve security by eliminating easily cracked, recycled or improperly stored passwords
Keep sensitive directory info where you want it: on-site in LDAP or Active Directory, in cloud or any combination
Create comprehensive user access policies that span across apps and devices
Enforce deeper security with per-app policies and context-aware multi-factor authentication
Manage and control application provisioning and entitlements
Secure your BYOD initiatives through integrated, cloud-based mobile device management (MDM)
Single Sign-on (SSO) for Cloud & Mobile Apps
One-click access to your cloud, mobile and on-premises apps. No more forgotten passwords, no more user confusion. Supports internal users (employees, contractors) and external users (partners, customers).
Centrify Identity Service provides turnkey SSO access to thousands of popular apps and adding your own takes just seconds with infinite apps.
Any App. Any Device. Anywhere. Internal or External Users.
Automated Account Management
From the day they start to the day they depart, manage employees’ access to all their apps from any source: Active Directory, LDAP, Cloud Directory or external identity.
Create accounts, automate app requests with workflows and revoke access from all devices when necessary — from a central control point.
Access granted. Access removed. Instantly.
Protect App Data, without User Hassle
Leverage your users’ mobile devices as a second factor for app authentication. SMS, email, voice or secure OTP — implement MFA without the hassle.
Centrify Identity Service provides context-aware, step-up authentication based on per-app policy. Without the hassle for your users.
Protect data. Simplify access. From any device.
Integrated Mobile Device and App Management
Identity-based policy is the lifeblood of BYOD. Secure and manage the devices used to access cloud and mobile apps through fully-integrated mobile device and app management capabilities.
Push apps, policy, certificates and more — and pull it all back when devices are lost or stolen.
Enable mobility. Maintain IT Control. One solution.
Identity-based Security and Management for Macs
Join Macs to Active Directory, and provide SSO to your Mac users. Leverage Active Directory Group Policy to manage Macs just like Windows machines. Lock and wipe remote Macs, and control FileVault2 encryption. Apply granular OS X policies. Leverage identity to securely manage Macs in your business.
Reduce risk of security breach when sharing privileged accounts
Minimize risks associated with privileged accounts — that are increasingly the focus of hackers and malicious insiders — by enforcing centralized control over who can access shared credentials.
Simplify compliance efforts for privileged accounts
Leverage privileged session monitoring and access reporting to make compliance efforts for privileged accounts efficient and effective.
Better manage vendor access
Enable secure remote access to on-premises and cloud-based infrastructures for internal users, third party vendors and outsourced IT through a reliable and secure cloud-based service.
Strengthen Protection for Secure Remote Access to Critical Systems
Guard against cyberattacks by requiring privileged users to answer a multi-factor authentication (MFA) challenge when remotely accessing servers, on password checkout or when using a shared account to log into remote systems.
Simplified Management of Privileged and Shared Account Passwords
Secure and manage super user and service accounts on servers and network devices, both on-premises and in the cloud. Provide security for the modern enterprise where IT is increasingly outside the firewall with a secure cloud-based service that is faster to implement and delivers quicker ROI.
Secure Remote Access to Infrastructure without a VPN
Provide remote administrators, outsourced IT and third party vendors with secure cloud-based access to the specific servers and network equipment they manage — on-premises and in the cloud. Context-aware security, multi-factor authentication and a SOC 2 compliant service are combined to deliver the same robust security you expect inside your corporate perimeter.
Time-bound and Monitored Access to Privileged Accounts
Minimize your attack surface with governed access to privileged account credentials and remote sessions. Keep control with request and approval workflows, time-bound access and privileged session monitoring. Capture who requested access and who approved it, and easily reconcile approved access with actual access by internal users, outsourced IT and third party vendors for privileged access governance.
Secure, Encrypt and Manage Application Passwords
Prevent cyberattacks that target privileged account credentials and streamline operations by eliminating hard-coded, plain text account passwords from scripts and applications. Applications and scripts authenticate and retrieve passwords securely without human intervention, enabling organizations to meet compliance and security policies.
Detailed Monitoring and Reporting of Privileged Sessions
Consistently monitor privileged sessions, whether using shared accounts or user accounts with privilege elevation, for servers and network devices, both on-premises and cloud-based. Establish accountability and streamline regulatory compliance through session auditing, video replay, search capabilities and comprehensive compliance reporting. IT teams can pinpoint suspicious activity, troubleshoot system failures, and perform forensic investigations into breaches.
Identity Consolidation, Privilege Management and Audit
Combines comprehensive bridging of Linux and UNIX systems to Active Directory with powerful privilege management and session monitoring across Windows, Linux and UNIX systems. Net result is increased security, improved compliance and comprehensive reporting and auditing.
BENEFITS FOR EXECUTIVES
Reduce risk of security breach
Protect critical information and minimize attack surface by providing only necessary access levels to IT systems.
Make compliance efforts efficient and effective
Easily prove who has access to what IT resource, and how that access is used across the enterprise.
Accelerate time-to-value with a proven partner
Achieve rapid value through an experienced identity management leader with over 5,000 customers.
Thwart in-progress attacks via MFA
Stop attackers using stolen credentials with multi-factor authentication (MFA).
Manage Identities for Cross-platform Systems in Active Directory
Secure Linux, UNIX, Mac and mobile devices with the same consistent identity management services currently deployed for your Windows systems. An integrated set of tools centralizes discovery, management and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory.
Reinforce Secure Access to Critical Systems
Add an extra layer of security to protect against hackers by configuring multi-factor authentication (MFA) for IT administrators who access servers and require elevated privileges. Define authentication profiles with a selection of authentication challenges that will be trusted.
Simplify Privilege Management for Windows, Linux and UNIX
Secure mission-critical servers from identity-related insider risks and outsider attacks. Simplify the implementation of a least privilege access model across Windows, Linux and UNIX systems. Streamline the creation and management of administrative roles and rights with a robust set of tools that automate much of the process.
Detailed Monitoring and Reporting of Privileged Sessions
Eliminate anonymous activity by associating all privileged activity with an individual vs. a shared account. Unique session auditing, video replay, search capabilities and comprehensive compliance reporting establish accountability and streamline regulatory compliance. IT teams can pinpoint suspicious activity, troubleshoot system failures, and perform forensic investigations into breaches.
Dynamically Segment and Isolate Cross-Platform Systems
Prevent unauthorized access to trusted computing resources and data, add policy-driven protection against network attacks for mixed Windows, Linux and UNIX environments and improve regulatory compliance. Secure access to sensitive information by isolating and protecting systems and by enabling end-to-end encryption of data-in-motion without the need for costly and complex network devices.