Centrify Solutions

Federal Government Solutions

Centrify enables more than 60 defense and other federal agencies to secure and audit sensitive UNIX and Linux systems and lockdown Mac OS workstations by leveraging their existing Active Directory infrastructure

GSA-Approved Vendor
GSA Schedule No: GS-35F-0511T
FIPS 140-2 Level 1 Certified
Fips Validated 140-2
Using Centrify solutions, IT security managers at federal agencies — and at civilian organizations with federal contracts or subject to federal regulation — can meet specific provisions of laws such as the Federal Information Security Management Act (FISMA) and best-practice guidance from agencies such as the Office of Management and Budget (OMB) and the National Institute of Standards and Technology (NIST).

Just as important, because Centrify leverages existing Active Directory infrastructure to centrally secure and audit non-Windows systems and applications, organizations can actually simplify their IT infrastructure and processes. With a single point of administration for accounts, access controls, privileges and policy for non-Windows systems and workstations, IT managers can implement security levels appropriate to their individual organization's needs and more easily accomplish the reporting and auditing tasks required for certification and accreditation of their processes.


Overview of Centrify Solutions for Federal Agencies

The following table summarizes some of the federal regulations and best-practice initiatives that Centrify can help you address, with links to additional information. Contact the Centrify federal team to schedule a time to discuss your own needs.

Regulation/Initiative Centrify's Solution Learn More
Federal Information Security Management Act (FISMA) Centrify's access control, privilege management and auditing solutions help federal agencies address key FISMA provisions as recommended in NIST SP 800-53, including sections AC (Access Control), AU (Audit and Accountability), CM (Configuration Management) and IA (Identification and Authentication). FISMA Compliance & Auditing Solution FISMA Compliance & Auditing White Paper
JITC-Approved Two-Factor (Smart Card) Authentication for Mac OS X and Red Hat Linux Homeland Security Presidential Directive 12 (HSPD-12) has driven the adoption of smart cards as the agreed-upon method for implementing more secure authentication to information systems. Centrify's support for the DoD's Common Access Card (CAC) standard, which is certified by the Joint Interoperability Test Command (JITC), brings Mac OS X and Red Hat Linux systems into compliance with HSPD-12. For those who just need smart card authentication only on Mac OS X, Centrify provides a free solution, Centrify Express for Smart Card. Centrify's JITC certification Centrify's listing in the JITC directory Centrify's JITC Certification Letter Smart Card Authentication Solution Free Centrify Express for Mac Smart Card
National Industrial Security Program Operating Manual (NISPOM / DoD 5220.22-M), Chapter 8 The NISPOM defines procedures that government contractors must adopt to access classified information. Section 8-303 in particular requires that users access systems using accounts that uniquely identify them and that these identities be tied to auditable actions. Centrify DirectControl and DirectAudit work together to establish this accountability. Centrify DirectControl Centrify DirectAudit
Federal Information Processing Standard FIPS 140-2 Validated (Certificate #1604) FIPS 140-2 documents the requirements for cryptographic modules included in third-party software and hardware that federal agencies and regulated industries use for handling sensitive but non-classified information. Centrify is validated FIPS 140-2 Level 1. FIPS 140-2 Validated
Federal Desktop Core Configuration (FDCC) Although Mac OS X systems are not included in the FDCC, agencies can use Centrify's desktop lockdown capabilities to proactively develop FDCC-like security configurations for their Mac systems. Mac OS Desktop Management Group Policy for Mac OS X
DoD Information Assurance Certification and Accreditation Process (DIACAP) Centrify solutions for role-based privilege management will be useful in the accreditation process, particularly requirements for authorizing the operation of DoD information systems. Role-Based Access Control with Centrify DirectAuthorize
Isolation of Sensitive Systems and Encryption of Data-in-Motion
(IPv6 Adoption)
The Office of Management and Budget (OMB) has mandated the adoption of IPv6 for, among other things, its ability to establish authenticated connections among systems and to encrypt data moving across IP networks. Centrify DirectSecure provides a streamlined and easy-to-deploy solution that enables server isolation and encryption of data-in-motion for UNIX and Linux systems. Server Isolation & Protection Encryption of Data-in-Motion Centrify DirectSecure
Department of Defense Information Technology Security Certification and Accreditation Process (DITSCAP)
National Information Assurance Certification and Accreditation Process (NIACAP)
DITSCAP (for DoD agencies) and NIACAP (for civilian agencies) prescribe a set of standards and processes for certifying and accrediting an information system's information assurance (IA) and security posture. NIST SP 800-53's guidance for FISMA is also generally used to formulate the specifics of an information system's security posture for the purposes of gaining DITSCAP, NIACAP and similar certification. Therefore, systems using the Centrify Suite for FISMA compliance will find that our auditing and reporting features also bolster these certification activities as well. FISMA Compliance & Auditing Solution FISMA Compliance & Auditing White Paper
Section 508 Compliance Centrify has conducted a Section 1194.21 voluntary self-assessment to describe how the Centrify Suite's Administrator Console, an MMC snap-in, addresses Section 508 standards for making information technology accessible to people with disabilities. Statement of Product Accessibility Compliance with Section 508

Just a Few of Our More Than 60 Federal Customers

Centrify has relationships with virtually all the major defense and civilian agencies. Here is a sample. Contact the Centrify federal team to learn what we have done for your agencies or related agencies.

FDIC
Federal Reserve Board of Governers
Federal Reserve Bank NY
gchq

More Customers


List of Federal Resellers

You may work with the following partners when purchasing Centrify solutions. Or contact the Centrify federal team if you have other purchasing requirements.

Federal Defense Solutions

Federal Defense Solutions

Federal Defense Solutions website

Federal Defense Solutions (FDS) is an 8a Minority Owned Small Business offering technology products, professional services, and IT infrastructure solutions to Federal, State, and Local government. Additionally, FDS’s knowledge of government IT environments, ongoing policy requirements, and business objectives is matched by our contracts and staff of certified engineers and project managers. Furthermore, FDS is able to help agencies meet the demands and performance requirements of government enabled programs from start to finish. FDS’s IT infrastructure solutions are aligned with government agencies requirements and business objectives. Solution designs are made for flexibility, responsiveness, and scalability. This helps agencies continue to efficiently and cost-effectively meet the demands of constant changes throughout the government life-cycle. Proven Execution - FDS has executed more than $15 million in Government Contracts with Agencies such as USMC, Intel Community, Navy, Air Force, USDA, US Coast Guard, Justice, Army, Energy, and HHS. Contract Vehicles - As an 8a certified minority owned small business, FDS can ensure a smooth and seamless contract process with all Government Agencies. Additionally, if other contract vehicles are preferred, FDS has access to SEWP via a teaming agreement with Sword and Shield and our GSA Schedule will be awarded very shortly.

  • Headquarters: Centreville, VA
  • Expertise: UNIX/Linux, Windows, U.S. Federal
  • Partner Level: Select - Server
Future Tech Enterprise, Inc.

Future Tech Enterprise, Inc.

Future Tech Enterprise, Inc. website

Future Tech Enterprise, Inc. is a market-leading global Information Technology solution provider. Future Tech delivers technology-driven solutions that redefine how corporations are conducting business across the enterprise. Future Tech’s extensive security practice, which includes the iFortress, offers a significant number of solutions designed to provide end-to-end protection for both your organization’s hard and soft technology assets. The jewel in Future Tech’s securityportfolio, the iFortress is a highly insulated, air tight, hermetically sealed, energy efficient data center that significantly mitigates a host of human and environmental risks including fire, water, heat, dust, humidity, smoke, acrid gases, RF, EMI, theft, vandalism, unauthorized access, explosions, etc., while also boasting a seismic rating. By implementing Future Tech’s strategic security offerings, including iFortress, in tandem with the Centrify suite of solutions, organizations are able to build safe, productive computing environments across multiple platforms. The comprehensive combined Future Tech/Centrify value proposition ensures that technology assets are secure, compliant and cost-effective, whether physical, virtual, on premise or cloud-based.

  • Headquarters: Holbrook, NY
  • Expertise: UNIX/Linux, Windows, U.S. Federal
  • Partner Level: Select - Server

Press Releases on Federal Solutions


News About Centrify Federal Solutions


Centrify Federal Solutions Events

There are no upcoming events scheduled. Please check again soon.