Centrify for Mobile

Mobile and BYOD Management

Centrify enables IT to fully embrace BYOD initiatives by including integrated mobile security management in all editions of the Centrify User Suite

Active Directory or Cloud-Based Device Management

  • Centralized administration within Active Directory or the Centrify Policy Service of all device security settings, profiles, certificates and restrictions means even large populations of mobile devices are easy to manage for security and compliance — with the added benefit of leveraging existing technology, skill sets and processes.
  • Group Policy-based management and enforcement of security settings, device and application restrictions allows efficient, near real-time, over-the-air management of mobile devices.
  • Device assignment to an Active Directory user associates each device to a unique user credential in Active Directory, ensuing accountability and easy reporting.
  • Automated de-provisioning occurs when an Active Directory user account is disabled or deleted, guaranteeing all policies and data are removed and computer accounts and certificates are revoked through a simple, one-click decommissioning.
  • Group-based enrollment ensures only members of a specific domain or user group can enroll mobile devices, allowing organizations to set up device policies based on business need.

Centrify's Cloud-Based Service

  • Centrify's hosted management platform makes installation and configuration simple, provides scalable device management, and easily and securely integrates with your existing on-premise Active Directory — no additional infrastructure needed.
  • A highly available, redundant service architecture supports around-the-clock operations and enterprise-class scalability.

Self-Service and Automation

  • Easy web or mobile application-based self-service enrollment enables the rapid deployment of mobile security and management across many devices with little or no administrative overhead.
  • Automated certificate enrollment secures access to Exchange, VPN and Wi-Fi connections, ensuring only assigned users can access sensitive corporate information.

Unified Platform for Mobile Device, Mac OS X and More

  • Support for multiple device platforms and release levels ensures secure management across all devices.
  • Centralizes management of your devices and systems and applications. Centrify also manages over 450 versions of UNIX, Linux and Mac OS X systems and applications, providing a unified access management platform that further secures corporate resources compared to single-purpose mobile point products.

Inventory Devices and Even Detect Jail-broken

  • An inventory of devices across your entire enterprise, organized by group or role, lets you easily track and enforce the status of both company-owned and user-owned devices.
  • An inventory of applications across your entire enterprise, organized by user, group, or device OS, ensures only authorized applications are installed for the approved users.
  • Simple administrative commands for profile update and removal, remote wipe and device lock/unlock enable quick response to critical management tasks.
  • Detect root and jail-broken devices to improve security of your environment.

Supported Platforms

Centrify's mobile security management solution supports a wide range of iOS and Android operating systems versions. In addition, Centrify provides Active Directory-centric security for over 450 versions of UNIX/Linux/Mac as well.

Mobile Security Management Solution

Supported Supported    Recent Addition Recent Addition    Early Access Coming Soon   
Systems A-Z
Apple iOS 4.x Supported
5.x Supported
6.x Supported
7.x Supported
Android 2.3.x Supported
3.x Supported
4.x Supported