Identity consolidation and privileged access management across Windows, Linux, and UNIX serversEnterprise Edition
Detailed auditing of privileged user sessions on Windows, Linux and UNIX systemsPlatinum Edition
Dynamically segment and isolate cross-platform systemsApplication Edition
Secure, centralized single sign-on to on-premise business applications
Single sign-on and unified management for cloud and mobile apps and devicesMac Edition
Centralized security and management for Macs and mobile devicesPremium Edition
SaaS and Mac Editions combined with mobile security managementCentrify for Samsung KNOX
Enterprise management of SSO, MCM and MDM for Samsung KNOX
Using Centrify solutions, IT security managers at federal agencies — and at civilian organizations with federal contracts or subject to federal regulation — can meet specific provisions of laws such as the Federal Information Security Management Act (FISMA) and best-practice guidance from agencies such as the Office of Management and Budget (OMB) and the National Institute of Standards and Technology (NIST).
Just as important, because Centrify leverages existing Active Directory infrastructure to centrally secure and audit non-Windows systems and applications, organizations can actually simplify their IT infrastructure and processes. With a single point of administration for accounts, access controls, privileges and policy for non-Windows systems and workstations, IT managers can implement security levels appropriate to their individual organization's needs and more easily accomplish the reporting and auditing tasks required for certification and accreditation of their processes.
Overview of Centrify Solutions for Federal Agencies
|Regulation/Initiative||Centrify's Solution||Learn More|
|Federal Information Security Management Act (FISMA)||Centrify's access control, privilege management and auditing solutions help federal agencies address key FISMA provisions as recommended in NIST SP 800-53, including sections AC (Access Control), AU (Audit and Accountability), CM (Configuration Management) and IA (Identification and Authentication).||FISMA Compliance & Auditing Solution FISMA Compliance & Auditing White Paper|
|JITC-Approved Two-Factor (Smart Card) Authentication for Mac OS X and Red Hat Linux||Homeland Security Presidential Directive 12 (HSPD-12) has driven the adoption of smart cards as the agreed-upon method for implementing more secure authentication to information systems. Centrify's support for the DoD's Common Access Card (CAC) standard, which is certified by the Joint Interoperability Test Command (JITC), brings Mac OS X and Red Hat Linux systems into compliance with HSPD-12. For those who just need smart card authentication only on Mac OS X, Centrify provides a free solution, Centrify Express for Smart Card.||Centrify's JITC certification Centrify's listing in the JITC directory Centrify's JITC Certification Letter Smart Card Authentication Solution Free Centrify Express for Mac Smart Card|
|National Industrial Security Program Operating Manual (NISPOM / DoD 5220.22-M), Chapter 8||The NISPOM defines procedures that government contractors must adopt to access classified information. Section 8-303 in particular requires that users access systems using accounts that uniquely identify them and that these identities be tied to auditable actions. Centrify DirectControl and DirectAudit work together to establish this accountability.||Centrify DirectControl Centrify DirectAudit|
|Federal Information Processing Standard FIPS 140-2 Validated (Certificate #1604)||FIPS 140-2 documents the requirements for cryptographic modules included in third-party software and hardware that federal agencies and regulated industries use for handling sensitive but non-classified information. Centrify is validated FIPS 140-2 Level 1.||FIPS 140-2 Validated|
|Federal Desktop Core Configuration (FDCC)||Although Mac OS X systems are not included in the FDCC, agencies can use Centrify's desktop lockdown capabilities to proactively develop FDCC-like security configurations for their Mac systems.||Mac OS Desktop Management Group Policy for Mac OS X|
|DoD Information Assurance Certification and Accreditation Process (DIACAP)||Centrify solutions for role-based privilege management will be useful in the accreditation process, particularly requirements for authorizing the operation of DoD information systems.||Role-Based Access Control with Centrify DirectAuthorize|
|Isolation of Sensitive Systems and Encryption of Data-in-Motion
|The Office of Management and Budget (OMB) has mandated the adoption of IPv6 for, among other things, its ability to establish authenticated connections among systems and to encrypt data moving across IP networks. Centrify DirectSecure provides a streamlined and easy-to-deploy solution that enables server isolation and encryption of data-in-motion for UNIX and Linux systems.||Server Isolation & Protection Encryption of Data-in-Motion Centrify DirectSecure|
|Department of Defense Information Technology Security Certification and Accreditation Process (DITSCAP)
National Information Assurance Certification and Accreditation Process (NIACAP)
|DITSCAP (for DoD agencies) and NIACAP (for civilian agencies) prescribe a set of standards and processes for certifying and accrediting an information system's information assurance (IA) and security posture. NIST SP 800-53's guidance for FISMA is also generally used to formulate the specifics of an information system's security posture for the purposes of gaining DITSCAP, NIACAP and similar certification. Therefore, systems using the Centrify Suite for FISMA compliance will find that our auditing and reporting features also bolster these certification activities as well.||FISMA Compliance & Auditing Solution FISMA Compliance & Auditing White Paper|
|Section 508 Compliance||Centrify has conducted a Section 1194.21 voluntary self-assessment to describe how the Centrify Suite's Administrator Console, an MMC snap-in, addresses Section 508 standards for making information technology accessible to people with disabilities.||Statement of Product Accessibility Compliance with Section 508|
Centrify has relationships with virtually all the major defense and civilian agencies. Here is a sample. Contact the Centrify federal team to learn what we have done for your agencies or related agencies.
You may work with the following partners when purchasing Centrify solutions. Or contact the Centrify federal team if you have other purchasing requirements.
Federal Defense Solutions (FDS) is an 8a Minority Owned Small Business offering technology products, professional services, and IT infrastructure solutions to Federal, State, and Local government. Additionally, FDS’s knowledge of government IT environments, ongoing policy requirements, and business objectives is matched by our contracts and staff of certified engineers and project managers. Furthermore, FDS is able to help agencies meet the demands and performance requirements of government enabled programs from start to finish. FDS’s IT infrastructure solutions are aligned with government agencies requirements and business objectives. Solution designs are made for flexibility, responsiveness, and scalability. This helps agencies continue to efficiently and cost-effectively meet the demands of constant changes throughout the government life-cycle. Proven Execution - FDS has executed more than $15 million in Government Contracts with Agencies such as USMC, Intel Community, Navy, Air Force, USDA, US Coast Guard, Justice, Army, Energy, and HHS. Contract Vehicles - As an 8a certified minority owned small business, FDS can ensure a smooth and seamless contract process with all Government Agencies. Additionally, if other contract vehicles are preferred, FDS has access to SEWP via a teaming agreement with Sword and Shield and our GSA Schedule will be awarded very shortly.
Future Tech Enterprise, Inc. is a market-leading global Information Technology solution provider. Future Tech delivers technology-driven solutions that redefine how corporations are conducting business across the enterprise. Future Tech’s extensive security practice, which includes the iFortress, offers a significant number of solutions designed to provide end-to-end protection for both your organization’s hard and soft technology assets. The jewel in Future Tech’s securityportfolio, the iFortress is a highly insulated, air tight, hermetically sealed, energy efficient data center that significantly mitigates a host of human and environmental risks including fire, water, heat, dust, humidity, smoke, acrid gases, RF, EMI, theft, vandalism, unauthorized access, explosions, etc., while also boasting a seismic rating. By implementing Future Tech’s strategic security offerings, including iFortress, in tandem with the Centrify suite of solutions, organizations are able to build safe, productive computing environments across multiple platforms. The comprehensive combined Future Tech/Centrify value proposition ensures that technology assets are secure, compliant and cost-effective, whether physical, virtual, on premise or cloud-based.
|04/24/2012||Centrify DirectControl Security and Compliance Solution Accepted for Common Criteria Certification|
|03/28/2012||Centrify Selected to Present at GovSec Conference and Expo Focused on IT Security for the US and its Critical Infrastructure|
|03/28/2012||Centrify DirectControl for Mac OS X Earns Certificate of Networthiness from US Army NETCOM|
|11/17/2011||Centrify Suite 2012 Named as Government Industry's Best Identity Management Platform by Government Security News|
|10/20/2011||Centrify Named as Finalist in Multiple Awards Categories for Government Security News 2011 Homeland Security Awards|
|09/26/2011||Centrify Suite First Active Directory Bridge Solution to Earn FIPS 140-2 Level 1 Certification|
|08/02/2011||Centrify Selected to Present at the 7th Annual GFIRST National Conference Focused on IT Security for Government Agencies|
|09/07/2010||Centrify Enlists immixGroup to Provide Government Customers with Security and Compliance Solutions for the Data Center|
|03/28/2012||Centrify Earns Defense Department Security Certification For Secure Mac Management|
|02/01/2012||Buckle up with Cybersecurity ... It's the Law|
|10/29/2011||Centrify, Sarbanes-Oxley Compliance & Auditing|
|09/27/2011||Centrify Earns FIPS Certification for Government Installs|
|09/03/2010||Apple's Government Sales Jump 200%|
|03/30/2009||Mac Security in the Oval Office - or Any Office|
There are no upcoming events scheduled. Please check again soon.
Leave us your name and phone number and we'll call to discuss your needs
A guide to FISMA requirements in heterogeneous IT environments
Enables access to
protected websites, VPNs and secured email