Resources

Featured

  • Centrify DirectAuthorize for Windows Part 2: Seamless, Audited Privilege Elevation

    Rich Loose and Brad Zehring discuss what Windows privilege elevation means, how Windows enforces different levels of access for different users based on their privileges, and how Centrify elevates a user’s privilege for specific applications, network resources, and privileged desktops. Rich explains Windows User Access Control (UAC) and how it works with privilege elevation and administrator accounts.

    Watch the Demo

  • Centrify Server Suite – Overview

    In this demo you'll see how Centrify Server Suite's ability to consolidate identities enables you to centrally control access and privileges across your Windows, Linux and UNIX servers.

    Watch the Demo

  • Centrify User Suite, SaaS Edition

    In this short video tutorial you'll see how the Centrify User Portal lets users log in once and then point, click and launch the SaaS applications they are authorized to use without having to remember their username and password for each app.

    Watch the Demo

  • Introduction to SAML

    In this brief introduction to Security Assertion Markup Language (SAML), Centrify CTO Paul Moore and Senior Director of Product Management, Corey Williams, describe how the industry standard protocol is used by web applications to security authenticate and authorize users to access secure content. They detail a key use case that illustrates the basic principles.

    Watch the Demo

  • Next Generation Privileged Identity Management: Are You Ready?

    Watch Forrester analyst Andras Cser and Centrify’s Matt Hur discuss how best in class organizations successfully manage privileged users to mitigate risks.

    Register for Webinar

  • Simplifying the Management of Macs and Mobile Devices

    The workplace invasion of personal technology and an increasingly mobile workforce present both opportunities and challenges. Consumerization gives employees a choice, and they’re choosing personal products, such as Mac laptops and iOS and Android phones. Smart leaders are seeing consumerization as an opportunity to increase employee efficiency, productivity and self-sufficiency

    Language: English

    Get the Report

  • Stop Password Sprawl with App Single Sign-On via Active Directory

    Using Centrify Identity Service, organizations can address password sprawl with single sign-on, and centralizing control cloud applications. Users get single sign-on and self-service features that let them locate, lock or wipe their mobile devices, and reset their Active Directory passwords. IT gets an easy-to-deploy, cloud-based service that seamlessly integrates into Microsoft Active Directory, which enables them to provision access to cloud applications, deploy secure app single sign on, and manage mobile devices and apps.

    Language: English

    Get the Report

  • Top Six Things to Consider with an Identity-as-a-Service (IDaaS) Solution

    Today’s most successful organizations are facing a number of key challenges: They need to provide employees with access to apps and other resources from any device. They need to ensure that IT can access security features across heterogeneous IT environments. They need to establish a single point of control (and monitoring) for improved security. And they need to establish granular user accountability and demonstrate controlled user access.

    Language: English

    Get the Report

White Papers


Reports by Independent Analysts

  • 451 Research: Centrify Puts on its Sunday Best as it Eyes Potential IPO

    In addition to expanding its 'unified identity' and identity-as-a-service (IDaaS) chops with a new SaaS edition of User Suite and automated provisioning, Centrify has devoted considerable energy in the past year to the business side of the house, beefing up the management team, expanding its indirect sales channels (and nearly doubling channel revenue), and most recently, closing a $42m round of corporate venture capital from the likes of Samsung, NTT Docomo and Fortinet. Centrify is clearly among the short list of information security vendors that has the scale and scope to undertake a public offering in the next 12-24 months.

    Language: English

    Get the Report

  • Enterprise Management Associates: Three Important Reasons for Privileged Access Management and one Surprising Benefit

    In this report Enterprise Management Associates (EMA) analysts explore the ways in which gaining visibility and control over high-privilege access helps organizations achieve regulatory compliance, assure responsible governance, and improve security all while reducing IT operational costs. The characteristics of an effective privileged access management solution are examined, along with evidence from EMA research that supports the values of a more consistent approach to operational IT control.

    Language: English

    Get the Report

  • Enterprise Strategy Group: Large Organizations Need a Unified Approach to IAM

    For the most part, IAM is considered a set of IT operations tasks associated with a specific business unit or application. Executives realize that identity management is important but they delegate the details to others. This laissez faire attitude is understandable but ESG believes it is about to change in a big way. IAM will evolve from an IT administrator to executive management issue over the next few years.

    Language: English

    Get the Report

  • Forrester: Centrify Cited as a Strong Performer in Privileged Identity Management Wave™ Report

    In the Forrester Research, Inc., Feb. 3 report, “The Forrester Wave™: Privileged Identity Management, Q1 2014”, analysts evaluated nine vendors based on 18 key criteria, including current offering, strategy and market presence. Centrify Server Suite was the only solution to earn the highest possible score for its Active Directory Bridge and tied for the highest scores in privileged session spawning, privileged session recording, and privilege escalation. Centrify also earned the highest possible score for customer satisfaction.

    Language: English

    Get the Report

  • Forrester: The Fifteen Most Important Questions to Ask Your Cloud IAM Provider

    This report by Forrester analyst Andras Cser helps IT managers understand the right questions to ask any potential IAM vendor in order to meet all necessary feature and workflow requirements for a successful cloud IAM project.

    Language: English

    Get the Report

  • Gartner: Centrify Positioned as a Visionary in the 2014 Gartner Magic Quadrant for Identity and Access Management as a Service

    This Magic Quadrant rates vendors on their abilities to be global, general purpose identity and access management service providers for multiple use cases, providing some level of functionality in all of the following: identity governance and administration, access (user authentication, single sign-on and authorization enforcement) and intelligence (logging and reporting activity).  Centrify was ranked at the top border of the Visionary quadrant, a significant achievement after year one of being in the IDaaS market.

    Language: English

    Get the Report

  • IDC: Centrify Private Vendor Watchlist Profile: Bridging Linux/Mac/Mobile Platforms for Increased Security and Managed Access Control via Microsoft AD

    In this vendor profile, IDC's Sally Hudson concludes that Centrify is a company to watch because of its "established, proven record of accomplishment" in the IAM space. Hudson notes that "Centrify's ability to grow out and expand its product line to meet the emerging needs of the customer has been insightful and impressive. Centrify has successfully identified existing and emerging customer pain points, such as management, audit, and PIM, and focused on delivering appropriate solutions."

    Language: English

    Get the Report

  • KuppingerCole: Centrify Identity Service

    Centrify positions its Identity Service as “Unified Identity Management” for Cloud and Mobile. This approach is still rather unique, despite the fact that there has been a recent announcement by another vendor also providing integrated capabilities, and with others being expected to follow this strategy. However, Centrify is well-positioned due to its longer history and the strong integration already available, including the support for the leading-edge Samsung KNOX platform.

    Language: English

    Get the Report

  • KuppingerCole: Centrify Server Suite

    Whether the target of using Centrify Server Suite is improving Privilege Management or just optimizing the user management of Linux and UNIX environments or providing Single Sign-on to a number of environments: There are a number of use cases where the suite can provide significant benefit.

    Language: English

    Get the Report

  • KuppingerCole: Centrify Server Suite - German

    Whether the target of using Centrify Server Suite is improving Privilege Management or just optimizing the user management of Linux and UNIX environments or providing Single Sign-On to a number of environments: There are a number of use cases where the suite can provide significant benefit.

    Language: German

    Get the Report



White Papers

  • A Practical Path to Unified Identity Across Data Center, Cloud and Mobile

    Today’s fractured identity environments can be a significant management challenge for IT and a source of frustration and lower productivity for users. Windows, Linux and UNIX servers as well as applications (on-premise, SaaS and mobile) and mobile devices must be brought into line with security best practices and compliance.

    Language: English

    Get the Report

  • Close the Window on Three Windows Server Threat Scenarios

    Companies as well as government agencies are looking for solutions to mitigate the risk of both inside and advanced persistent threats. Today’s cutting-edge strategies allow organizations to manage their identity-related risk posture and cost-effectively address regulatory mandates, making compliance repeatable and sustainable.

    Language: English

    Get the Report

  • FISMA Compliance through Centralized IAM Leveraging Active Directory

    The Federal Information Security Management Act (FISMA) lays out a comprehensive set of security requirements for federal IT managers. While FISMA compliance is a complex process, its core IAM requirements come down to common sense and well established principles that can be addressed through a strategy of centralized management, policy enforcement and continuous monitoring.

    Language: English

    Get the Report

  • How Global Financial Firms Can Effectively Address Technology Risk Guidelines

    The June 2013 MAS guidelines for Internet Banking and Technology Risk Management (TRM) comprehensively identify security and risk management issues, covering everything from identity assurance and access controls to accountability and audit.

    Language: English

    Get the Report

  • How Identity Management Solves Five Hadoop Security Risks

    Integrate Hadoop clusters into existing Active Directory infrastructure for centralized identity management, cross-platform privilege management and auditing.

    Language: English

    Get the Report

  • Manage your Mac with Active Directory Group Policies

    With Centrify Identity Service, Mac Edition (“Centrify for Mac”), you can use Active Directory to centrally manage authentication, policy enforcement, single sign-on (SSO) and user self-service for popular endpoint devices running Mac OS X, iOS and Android. By leveraging your existing identity infrastructure, processes and trained IT staff, you can reduce costs and improve operational efficiency. The following Group Policies are a representative list of what is available to manage Mac OS X systems as of the Centrify for Mac product release that came out in August 2014.

    Language: English

    Get the Report

  • Office 365 Single Sign-On: High Availability Without High Complexity

    For most organizations, the move to Office 365 is a leap forward in user experience, productivity, IT simplification, and savings. But organizations that fail to implement Single Sign-On (SSO) reliably can slip backwards in several key areas. Risk increases and productivity suffers.

    Language: English

    Get the Report

  • Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security

    Capturing the detailed actions of privileged users is critical in today's business environment as companies seek out cost efficiencies through IT outsourcing, leverage third-party cloud providers and ISVs, and strive to comply with industry and federal regulations. User activity auditing can improve security and speed compliance in virtually every organization.

    Language: English

    Get the Report

  • Samsung KNOX: An Overview for Business Customers

    Samsung has introduced Samsung KNOX™ for its Android-based mobile platforms to satisfy the device management and security needs of business and government customers. This document provides a more detailed overview of the enterprise integration and management features in Samsung KNOX, with a focus on its capabilities for Microsoft Active Directory integration, policy management, enterprise mobility management and single sign-on.

    Language: English

    Get the Report

  • Simplifying the Management of Macs and Mobile Devices

    The workplace invasion of personal technology and an increasingly mobile workforce present both opportunities and challenges. Consumerization gives employees a choice, and they’re choosing personal products, such as Mac laptops and iOS and Android phones. Smart leaders are seeing consumerization as an opportunity to increase employee efficiency, productivity and self-sufficiency

    Language: English

    Get the Report

  • Stop Password Sprawl with App Single Sign-On via Active Directory

    Using Centrify Identity Service, organizations can address password sprawl with single sign-on, and centralizing control cloud applications. Users get single sign-on and self-service features that let them locate, lock or wipe their mobile devices, and reset their Active Directory passwords. IT gets an easy-to-deploy, cloud-based service that seamlessly integrates into Microsoft Active Directory, which enables them to provision access to cloud applications, deploy secure app single sign on, and manage mobile devices and apps.

    Language: English

    Get the Report

  • The Essential Guide to Managing Access to SaaS Applications

    This Essential Guide, written independently by Windows IT Pro's Sean Deuby, examines the opportunities and challenges of empowering, yet controlling, user access to SaaS applications. Specifically, identity management as a service promises to simplify secure access to and management of SaaS applications while reducing password sprawl. It also reviews how mobile computing has added to the complexity of managing access to both corporate data and SaaS, and ways to evaluate the options available on the market.

    Language: English

    Get the Report

  • Top 3 Reasons to Give Insiders a Unified Identity

    Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. Forbes recently cited internal threats as the third most significant cyber-security threat for 2013. The magazine noted that internal attacks can be “the most devastating” due to the amount of damage privileged users can inflict and the type of data they can access.

    Language: English

    Get the Report

  • Top Six Things to Consider with an Identity-as-a-Service (IDaaS) Solution

    Today’s most successful organizations are facing a number of key challenges: They need to provide employees with access to apps and other resources from any device. They need to ensure that IT can access security features across heterogeneous IT environments. They need to establish a single point of control (and monitoring) for improved security. And they need to establish granular user accountability and demonstrate controlled user access.

    Language: English

    Get the Report

  • Using Microsoft Active Directory to Address Payment Card Industry (PCI) Data Security Standard Requirements in Heterogeneous Environments

    Merchants, payment processors, point-of-sale vendors, and financial institutions must follow the Data Security Standard (DSS), a rigorous set of requirements from the Security Standards Council of the Payment Card Industry (PCI). These requirements are designed to ensure that merchants and service providers work to maintain consumer trust of payment cards.

    Language: English

    Get the Report

  • Windows Least-Privilege Management and Beyond

    Devising an enterprise-wide privilege access scheme for Windows systems is complex. For example, each Window system object has its own access control list, and the myriad OS-level rights and integrity levels vary by Windows version.  And yet, for Windows environments it is critical that organizations can delegate administration and establish granular privileges quickly and efficiently to restrict administrators so they access only the servers and resources required to perform their job and only during the approved times to perform specific tasks. This white paper explains how Centrify enables IT managers to enforce granular access and privilege controls efficiently without imposing usability burdens on their admins.

    Language: English

    Get the Report

Datasheets


Centrify Products


Webinars

Demo Videos


Chalktalks

Documentation


Documentation and Release Notes

ReleaseDate Centrify for SaaS Release Notes
15.1 January 24, 2015 Centrify User Suite 15.1 Release Notes
14.10 December 13, 2014 Centrify User Suite 14.10 Release Notes
14.9 (Hot fix 1) November 22, 2014 Centrify User Suite 14.9 Release Notes
14.9 November 8, 2014 Centrify User Suite 14.9 Release Notes
14.8 October 18, 2014 Centrify User Suite 14.8 Release Notes
14.7 September 13, 2014 Centrify User Suite 14.7 Release Notes
14.6 July 26, 2014 Centrify User Suite 14.6 Release Notes
14.5 June 21, 2014 Centrify User Suite 14.5 Release Notes
14.4 May 31, 2014 Centrify User Suite 14.4 Release Notes
14.3 April 26, 2014 Centrify for SaaS 14.3 Release Notes
14.2 (Hot fix 1) April 1, 2014 Centrify for SaaS 14.2 Release Notes
14.2 March 29, 2014 Centrify for SaaS 14.2 Release Notes
14.1 March 8, 2014 Centrify for SaaS 14.1 Release Notes
13.13 February 2, 2014 Centrify for SaaS 13.13 Release Notes
13.12 January 11, 2014 Centrify for SaaS 13.12 Release Notes
13.11 December 14, 2013 Centrify for SaaS 13.11 Release Notes
13.10 November 3, 2013 Centrify for SaaS 13.10 Release Notes
13.9 October 1, 2013 Centrify for SaaS 13.9 Release Notes
13.8 September 8, 2013 Centrify for SaaS 13.8 Release Notes
13.7 August 19, 2013 Centrify for SaaS 13.7 Release Notes
13.6 July 25, 2013 Centrify for SaaS 13.6 Release Notes
13.5 June 14, 2013 Centrify for SaaS 13.5 Release Notes
13.4 May 28, 2013 Centrify for SaaS 13.4 Release Notes
13.3 May 3, 2013 Centrify for SaaS 13.3 Release Notes
13.2 April 12, 2013 Centrify for SaaS 13.2 Release Notes
13.1 March 22, 2013 Centrify for SaaS 13.1 Release Notes