Active Directory-based authentication, access control and role-based privilege management for Windows, Linux & UNIX
Standard Edition + privileged user auditing
Enterprise Edition + encryption of data-in-motion and server isolation
Any Edition + single sign-on for SAP, Apache and J2EE/Java applications
Single sign-on for cloud apps + mobile device supportMac Edition
Active Directory-based authentication and Group Policy management for Macs + mobile device supportPremium Edition
SaaS and Mac Editions + mobile device supportCentrify for Samsung KNOX
Active Directory-based SSO, MCM and MDM for KNOX-enabled devices
Using Centrify solutions, IT security managers at federal agencies — and at civilian organizations with federal contracts or subject to federal regulation — can meet specific provisions of laws such as the Federal Information Security Management Act (FISMA) and best-practice guidance from agencies such as the Office of Management and Budget (OMB) and the National Institute of Standards and Technology (NIST).
Just as important, because Centrify leverages existing Active Directory infrastructure to centrally secure and audit non-Windows systems and applications, organizations can actually simplify their IT infrastructure and processes. With a single point of administration for accounts, access controls, privileges and policy for non-Windows systems and workstations, IT managers can implement security levels appropriate to their individual organization's needs and more easily accomplish the reporting and auditing tasks required for certification and accreditation of their processes.
Overview of Centrify Solutions for Federal Agencies
|Regulation/Initiative||Centrify's Solution||Learn More|
|Federal Information Security Management Act (FISMA)||Centrify's access control, privilege management and auditing solutions help federal agencies address key FISMA provisions as recommended in NIST SP 800-53, including sections AC (Access Control), AU (Audit and Accountability), CM (Configuration Management) and IA (Identification and Authentication).||FISMA Compliance & Auditing Solution FISMA Compliance & Auditing White Paper|
|JITC-Approved Two-Factor (Smart Card) Authentication for Mac OS X and Red Hat Linux||Homeland Security Presidential Directive 12 (HSPD-12) has driven the adoption of smart cards as the agreed-upon method for implementing more secure authentication to information systems. Centrify's support for the DoD's Common Access Card (CAC) standard, which is certified by the Joint Interoperability Test Command (JITC), brings Mac OS X and Red Hat Linux systems into compliance with HSPD-12. For those who just need smart card authentication only on Mac OS X, Centrify provides a free solution, Centrify Express for Smart Card.||Centrify's JITC certification Centrify's listing in the JITC directory Centrify's JITC Certification Letter Smart Card Authentication Solution Free Centrify Express for Mac Smart Card|
|National Industrial Security Program Operating Manual (NISPOM / DoD 5220.22-M) Chapter 8||The NISPOM defines procedures that government contractors must adopt to access classified information. Section 8-303 in particular requires that users access systems using accounts that uniquely identify them and that these identities be tied to auditable actions. Centrify DirectControl and DirectAudit work together to establish this accountability.||Centrify DirectControl Centrify DirectAudit|
|Federal Information Processing Standard FIPS 140-2 Validated (Certificate #1604)||FIPS 140-2 documents the requirements for cryptographic modules included in third-party software and hardware that federal agencies and regulated industries use for handling sensitive but non-classified information. Centrify is validated FIPS 140-2 Level 1.||FIPS 140-2 Validated|
|Federal Desktop Core Configuration (FDCC)||Although Mac OS X systems are not included in the FDCC, agencies can use Centrify's desktop lockdown capabilities to proactively develop FDCC-like security configurations for their Mac systems.||Mac OS Desktop Management Group Policy for Mac OS X|
|DoD Information Assurance Certification and Accreditation Process (DIACAP)||Centrify solutions for role-based privilege management will be useful in the accreditation process, particularly requirements for authorizing the operation of DoD information systems.||Role-Based Access Control with Centrify DirectAuthorize|
|Isolation of Sensitive Systems and Encryption of Data-in-Motion
|The Office of Management and Budget (OMB) has mandated the adoption of IPv6 for, among other things, its ability to establish authenticated connections among systems and to encrypt data moving across IP networks. Centrify DirectSecure provides a streamlined and easy-to-deploy solution that enables server isolation and encryption of data-in-motion for UNIX and Linux systems.||Server Isolation & Protection Encryption of Data-in-Motion Centrify DirectSecure|
|Department of Defense Information Technology Security Certification and Accreditation Process (DITSCAP)
National Information Assurance Certification and Accreditation Process (NIACAP)
|DITSCAP (for DoD agencies) and NIACAP (for civilian agencies) prescribe a set of standards and processes for certifying and accrediting an information system's information assurance (IA) and security posture. NIST SP 800-53's guidance for FISMA is also generally used to formulate the specifics of an information system's security posture for the purposes of gaining DITSCAP, NIACAP and similar certification. Therefore, systems using the Centrify Suite for FISMA compliance will find that our auditing and reporting features also bolster these certification activities as well.||FISMA Compliance & Auditing Solution FISMA Compliance & Auditing White Paper|
|Section 508 Compliance||Centrify has conducted a Section 1194.21 voluntary self-assessment to describe how the Centrify Suite's Administrator Console, an MMC snap-in, addresses Section 508 standards for making information technology accessible to people with disabilities.||Statement of Product Accessibility Compliance with Section 508|
Centrify has relationships with virtually all the major defense and civilian agencies. Here is a sample. Contact the Centrify federal team to learn what we have done for your agencies or related agencies.
You may work with the following partners when purchasing Centrify solutions. Or contact the Centrify federal team if you have other purchasing requirements.
Agency Consulting Group (ACG), a service-disabled, veteran-owned small business, is a growing IT support and integration provider supporting our country’s defense industry and Federal agencies. We support today’s in-demand technologies with an emphasis on Solaris and Linux environments. ACG has designed, tested, productized, implemented and sustained large-scale virtualized computing environments supporting customer bases in the thousands. ACG has deployed technologies allowing for the secure remote access of heterogeneous applications sets (UNIX, Linux, Windows, mainframe, and web-based), providing our customers with a single presentation to access all application types. ACG designs and maintains our customer’s mission systems and applications by providing certified professionals experienced in large and complex infrastructures.
Federal Defense Solutions (FDS) is an 8a Minority Owned Small Business offering technology products, professional services, and IT infrastructure solutions to Federal, State, and Local government. Additionally, FDS's knowledge of government IT environments, ongoing policy requirements, and business objectives is matched by our contracts and staff of certified engineers and project managers. Furthermore, FDS is able to help agencies meet the demands and performance requirements of government enabled programs from start to finish. FDS's IT infrastructure solutions are aligned with government agencies requirements and business objectives. Solution designs are made for flexibility, responsiveness, and scalability. This helps agencies continue to efficiently and cost-effectively meet the demands of constant changes throughout the government life-cycle. Proven Execution - FDS has executed more than $15 million in Government Contracts with Agencies such as USMC, Intel Community, Navy, Air Force, USDA, US Coast Guard, Justice, Army, Energy, and HHS. Contract Vehicles - As an 8a certified minority owned small business, FDS can ensure a smooth and seamless contract process with all Government Agencies. Additionally, if other contract vehicles are preferred, FDS has access to SEWP via a teaming agreement with Sword and Shield and our GSA Schedule will be awarded very shortly.
Future Tech Enterprise, Inc. is a market-leading global Information Technology solution provider. Future Tech delivers technology-driven solutions that redefine how corporations are conducting business across the enterprise. Future Tech’s extensive security practice, which includes the iFortress, offers a significant number of solutions designed to provide end-to-end protection for both your organization’s hard and soft technology assets. The jewel in Future Tech’s securityportfolio, the iFortress is a highly insulated, air tight, hermetically sealed, energy efficient data center that significantly mitigates a host of human and environmental risks including fire, water, heat, dust, humidity, smoke, acrid gases, RF, EMI, theft, vandalism, unauthorized access, explosions, etc., while also boasting a seismic rating. By implementing Future Tech’s strategic security offerings, including iFortress, in tandem with the Centrify suite of solutions, organizations are able to build safe, productive computing environments across multiple platforms. The comprehensive combined Future Tech/Centrify value proposition ensures that technology assets are secure, compliant and cost-effective, whether physical, virtual, on premise or cloud-based.
ImmixGroup provides federal, state and local government agencies with reliable access to commercial technology products and services from companies such as IBM, Oracle, EMC, McAfee and more. Since 1997, we have helped hundreds of software and hardware manufacturers do business with the public sector while ensuring they comply with your unique and complex requirements. Our ISO 9001:2008 registered business processes and years of experience focused exclusively on the public sector ensure you can easily source the technology solutions you want through the contract vehicles you prefer.
GSA Schedule Number: GS-35F-0511T.
Iron Bow Technologies forwards a history of over 20 years as a leading full-lifecycle IT solutions provider to government and industry. Leveraging strong technology through a collaborative engagement model, the company designs and builds information security, data center, collaboration, network and client computing solutions that are on-target with customer missions.
Recently named to Forbes' "America's Most Promising Companies" list and currently ranked #125 on the Solution Provider 500, the award winning ThunderCat Technology is a Service-Disabled Veteran-Owned Small Business that delivers technology services and solutions to the federal government and fortune 500 companies. Specifically, ThunderCat is a systems integrator that brings an innovative approach to solving customer problems in and around the datacenter by providing strategies for Data Storage, Networking, Security, and Applications. ThunderCat represents, distributes, integrates, and provides technologies from best of breed manufacturers. Clients include DHS, USACE, HHS, DLA, DFAS, FBI, NIH, Navy, Army, VA, and TSA.
vTech Solutions is a certified Federal Hub zone company specializes in advanced server and storage virtualization technologies that deliver immediate return on investment. Our highly experienced engineering staff will work with you to deliver a virtualization that is aligned to your business strategies resulting in lower operational costs, improve hardware utilization, and increase efficiency.
|04/24/2012||Centrify DirectControl Security and Compliance Solution Accepted for Common Criteria Certification|
|03/28/2012||Centrify Selected to Present at GovSec Conference and Expo Focused on IT Security for the US and its Critical Infrastructure|
|03/28/2012||Centrify DirectControl for Mac OS X Earns Certificate of Networthiness from US Army NETCOM|
|11/17/2011||Centrify Suite 2012 Named as Government Industry's Best Identity Management Platform by Government Security News|
|10/20/2011||Centrify Named as Finalist in Multiple Awards Categories for Government Security News 2011 Homeland Security Awards|
|09/26/2011||Centrify Suite First Active Directory Bridge Solution to Earn FIPS 140-2 Level 1 Certification|
|08/02/2011||Centrify Selected to Present at the 7th Annual GFIRST National Conference Focused on IT Security for Government Agencies|
|09/07/2010||Centrify Enlists immixGroup to Provide Government Customers with Security and Compliance Solutions for the Data Center|
|03/28/2012||Centrify Earns Defense Department Security Certification For Secure Mac Management|
|02/01/2012||Buckle up with Cybersecurity ... It's the Law|
|10/29/2011||Centrify, Sarbanes-Oxley Compliance & Auditing|
|09/27/2011||Centrify Earns FIPS Certification for Government Installs|
|09/03/2010||Apple's Government Sales Jump 200%|
|03/30/2009||Mac Security in the Oval Office - or Any Office|
There are no upcoming events scheduled. Please check again soon.
Leave us your name and phone number and we'll call to discuss your needs
A guide to FISMA requirements in heterogeneous IT environments
Enables access to
protected websites, VPNs and secured email