Identity consolidation and privileged access management across Windows, Linux, and UNIXEnterprise Edition
Detailed auditing of privileged user sessions on Windows, Linux and UNIXPlatinum Edition
Dynamic segmentation and isolation of cross-platform systemsApplication Edition
Secure, centralized single sign-on to on-premises business applications
Single sign-on and unified management for cloud and mobile apps and devicesMac Edition
Centralized security and management for Macs and mobile devicesPremium Edition
SaaS and Mac Editions combined with mobile security management
Centrify is a leading provider of solutions for unifying identity management across cloud, mobile and data center IT environments. Centrify software and cloud services let organizations securely leverage their existing infrastructure to centrally manage a wide range of identity-related IT activities—such as authentication, access control, privilege management, policy enforcement and compliance—across both cloud and data center based resources.
With Centrify solutions, IT achieves a more cost-efficient, secure and compliant identity infrastructure, while users benefit from single sign-on (SSO) and greater productivity.
More than 5,000 customers around the world, including nearly half of the Fortune 50, have deployed Centrify solutions across millions of servers, workstations, and applications, and have regularly reduced their identity management and compliance costs by 50% or more.
An example of the thousands of companies that leverage Centrify:
Centrify was started in 2004 by identity industry veterans Tom Kemp, Adam Au and Paul Moore, who previously founded several successful identity companies, as well as led business divisions at major identity companies.
Centrify is backed by top-tier venture capital firms including Mayfield, Accel Partners, Index Ventures and Sigma West, and strategic investors Samsung Ventures, Fortinet and NTT Docomo.
Centrify provides a comprehensive set of software and cloud solutions to enable a unified approach to managing identity and controlling access to resources / apps across the full range of IT environments—from internal data centers to external cloud providers to "bring your own" mobile devices (BYOD).