Resources

White Papers


Reports by Independent Analysts

  • Enterprise Management Associates: Three Important Reasons for Privileged Identity Management (and One Surprising Benefit)

    In this report Enterprise Management Associates (EMA) analysts explore the ways in which gaining visibility and control over high-privilege access helps organizations achieve regulatory compliance, assure responsible governance, and improve security all while reducing IT operational costs. The characteristics of an effective privileged access management solution are examined, along with evidence from EMA research that supports the values of a more consistent approach to operational IT control.

    Language: English

    Get the Report

  • Enterprise Management Associates: Trois bonnes raisons pour une gestion de l’identité des comptes privilégiés (et un avantage étonnant)

    L'accès des comptes à privilèges est l'un des aspects les plus sensibles en informatique. Les comptes administrateurs ont la capacité de réaliser des changements radicaux et fondamentaux dans les systèmes informatiques dont dépendent les sociétés. Lorsqu’utilisés de manière frauduleuse, leur impact peut causer de vastes dégâts allant du non-respect des conformités donnant droit à des amendes, en passant par des incidents de sécurité causant une perte de confiance dans la marque et une perte de revenus.

    Language: French

    Get the Report

  • Enterprise Management Associates: Drei wichtige Gründe für privilegiertes Identitätsmanagement (und ein überraschender Vorteil)

    In diesem Bericht untersuchen Analysten von ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) die Arten, durch die die Transparenz von und Kontrolle der Privilegien Unternehmen nicht nur beim Erreichen dieser Ziele hilft, sondern auch noch einen Vorteil bietet, dessen sich viele nicht bewusst sind: Eine verbesserte IT-Zuverlässigkeit, die die Betriebskosten senken kann. Diese Schrift untersucht die Charakteristika einer effektiven Lösung und bietet auch den durch die EMA-Untersuchungen erbrachten Nachweis, der den Wert eines konsistenteren Ansatzes in Bezug auf die operative Steuerung durch IT stützt.

    Language: German

    Get the Report

  • Enterprise Strategy Group: Large Organizations Need a Unified Approach to IAM

    For the most part, IAM is considered a set of IT operations tasks associated with a specific business unit or application. Executives realize that identity management is important but they delegate the details to others. This laissez faire attitude is understandable but ESG believes it is about to change in a big way. IAM will evolve from an IT administrator to executive management issue over the next few years.

    Language: English

    Get the Report

  • Forrester: Centrify Cited as a Strong Performer in Privileged Identity Management Wave Report

    In the Forrester Research, Inc., Feb. 3 report, “The Forrester Wave™: Privileged Identity Management, Q1 2014”, analysts evaluated nine vendors based on 18 key criteria, including current offering, strategy and market presence. Centrify Server Suite was the only solution to earn the highest possible score for its Active Directory Bridge and tied for the highest scores in privileged session spawning, privileged session recording, and privilege escalation. Centrify also earned the highest possible score for customer satisfaction.

    Language: English

    Get the Report

  • Forrester: Centrify is the top vendor for strategy in the 2015 Forrester Wave for Cloud Identity and Access Management

    Tom Kemp, CEO of Centrify says “Centrify is the first IDaaS vendor that integrates identity and mobility management to provide secure, managed application access from any device — all based on a single user identity. We see our position as a strong performer with the top ranked strategy as validation of our vision to give IT customers a solution that manages both access to applications, as well as the devices from which those apps are accessed.”

    Language: English

    Get the Report

  • Forrester: The Fifteen Most Important Questions to Ask Your Cloud IAM Provider

    This report by Forrester analyst Andras Cser helps IT managers understand the right questions to ask any potential IAM vendor in order to meet all necessary feature and workflow requirements for a successful cloud IAM project.

    Language: English

    Get the Report

  • Gartner: Centrify Positioned as a Visionary in the 2015 Gartner Magic Quadrant for Identity and Access Management as a Service

    This Magic Quadrant rates vendors on their abilities to be global, general purpose identity and access management service providers for multiple use cases, providing some level of functionality in all of the following: identity governance and administration, access (user authentication, single sign-on and authorization enforcement) and intelligence (logging and reporting activity).  A top vendor in the IDaaS market, Centrify was named a Visionary in this year's Gartner Magic Quadrant.

    Language: English

    Get the Report

  • IDC: Centrify Private Vendor Watchlist Profile: Bridging Linux/Mac/Mobile Platforms for Increased Security and Managed Access Control via Microsoft AD

    In this vendor profile, IDC's Sally Hudson concludes that Centrify is a company to watch because of its "established, proven record of accomplishment" in the IAM space. Hudson notes that "Centrify's ability to grow out and expand its product line to meet the emerging needs of the customer has been insightful and impressive. Centrify has successfully identified existing and emerging customer pain points, such as management, audit, and PIM, and focused on delivering appropriate solutions."

    Language: English

    Get the Report

  • KuppingerCole: Centrify Identity Service

    Centrify positions its Identity Service as “Unified Identity Management” for Cloud and Mobile. This approach is still rather unique, despite the fact that there has been a recent announcement by another vendor also providing integrated capabilities, and with others being expected to follow this strategy. However, Centrify is well-positioned due to its longer history and the strong integration already available, including the support for the leading-edge Samsung KNOX platform.

    Language: English

    Get the Report

  • KuppingerCole: Centrify Server Suite

    Whether the target of using Centrify Server Suite is improving Privilege Management or just optimizing the user management of Linux and UNIX environments or providing Single Sign-on to a number of environments: There are a number of use cases where the suite can provide significant benefit.

    Language: English

    Get the Report

  • KuppingerCole: Centrify Server Suite

    Whether the target of using Centrify Server Suite is improving Privilege Management or just optimizing the user management of Linux and UNIX environments or providing Single Sign-On to a number of environments: There are a number of use cases where the suite can provide significant benefit.

    Language: German

    Get the Report

  • Sarrel Group: Speeding Office 365 Implementation Using Identity-as-a-Service

    Office 365 is one of the fastest growing cloud apps, yet implementation using Microsoft's tools is not trouble-free. There are many benefits of using identity-as-a-service (IDaaS) to implement Office 365 including the ability to provision users, manage multiple directories, manage multiple passwords, mobile devices, and licenses, and track and report on usage. Read this paper from Sarrel Group to understand how to evaluate IDaaS for your organization's Office 365 implementation.

    Language: English

    Get the Report



White Papers

  • A Practical Path to Unified Identity Across Data Center, Cloud and Mobile

    Today’s fractured identity environments can be a significant management challenge for IT and a source of frustration and lower productivity for users. Windows, Linux and UNIX servers as well as applications (on-premise, SaaS and mobile) and mobile devices must be brought into line with security best practices and compliance.

    Language: English

    Download the White Paper

  • Best Practices for Adding Macs to Microsoft Networks

    Adding Macs to a Microsoft-based corporate network can be a challenge. Are Microsoft tools, Apple tools or third party tools the best solution? Are Mac-oriented management tools the best option or is it best to incorporate the Macs within existing management and security infrastructure?

    Language: English

    Download the White Paper

  • Best Practices for Privileged Identity Management in the Modern Enterprise

    Data breaches continue to be top of mind for organizations large and small. Two key dynamics are making that challenge much harder: the cloud and the growing sophistication of attackers. The modern enterprise is now a hybrid organization with infrastructure spread across on-premises data centers and in the cloud, with IT functions split between internal and third-party administrators. This white paper examines these trends and formulates best practices for managing risks in these areas of identity consolidation, privileged session management, superuser privilege management, shared account password management, and secure VPN-less remote access.

    Language: English

    Download the White Paper

  • Erfolgsmethoden für Privileged Identity Management in modernen Unternehmen

    Datenpannen stehen weiterhin ganz oben auf der Liste von sowohl kleinen, als auch großen Organisationen. Insbesondere zwei Entwicklungen verstärken diese Herausforderung — die Cloud, sowie die stetig wachsende Raffinesse der Angreifer. In diesem Paper widmen wir uns dem modernen Unternehmen  — einer Hybrid-Organisation, deren Infrastruktur sich über Rechenzentren vor Ort, sowie auf die Cloud erstreckt und deren IT-Funktionen auf interne und außenstehende Administratoren verteilt ist. Wir betrachten sowohl diese, als auch ähnliche Trends mit Einfluss auf unsere Datensicherheit und besprechen insbesondere Erfolgsmethoden zum Management und zur Verwaltung von Privileged User Accounts, um die Risiken so zu minimieren.

    Language: German

    Download the White Paper

  • Práticas recomendadas para o gerenciamento privilegiado de identidades na empresa moderna

    As violações de dados continuam sendo a principal preocupação das organizações de grande e pequeno porte. Duas dinâmicas importantes estão tornando esse desafio muito mais difícil — a nuvem e a sofisticação crescente dos invasores.

    Language: Portuguese

    Download the White Paper

  • Mejores prácticas para la gestión de identidad privilegiada en empresas modernas

    La filtración de datos sigue siendo un problema prioritario para las organizaciones grandes y pequeñas. Existen dos dinámicas clave que dificultan aún más ese tema: la nube y la creciente sofisticación de los atacantes.

    Language: Spanish

    Download the White Paper

  • Close the Window on Three Windows Server Threat Scenarios

    Companies as well as government agencies are looking for solutions to mitigate the risk of both inside and advanced persistent threats. Today’s cutting-edge strategies allow organizations to manage their identity-related risk posture and cost-effectively address regulatory mandates, making compliance repeatable and sustainable.

    Language: English

    Download the White Paper

  • Verhindern Sie drei Windows Server-Bedrohungsszenarien​

    Dieses Whitepaper zeigt drei häufige Windows Server Bedrohungsszenarien auf und erläutert, wie diese neutralisiert werden können. Durch das Befolgen der Richtlinien in diesem Weißbuch können Unternehmen Bedrohungen von außen sowie aus dem internen Netzerk abwehren, ihre Windows Server-Infrastruktur und sensible Daten schützen, sowie die entsprechenden rechtlichen Anforderungen erfüllen.

    Language: German

    Download the White Paper

  • FISMA Compliance through Centralized IAM Leveraging Active Directory

    The Federal Information Security Management Act (FISMA) lays out a comprehensive set of security requirements for federal IT managers. While FISMA compliance is a complex process, its core IAM requirements come down to common sense and well established principles that can be addressed through a strategy of centralized management, policy enforcement and continuous monitoring.

    Language: English

    Download the White Paper

  • How Global Financial Firms Can Effectively Address Technology Risk Guidelines

    The June 2013 MAS guidelines for Internet Banking and Technology Risk Management (TRM) comprehensively identify security and risk management issues, covering everything from identity assurance and access controls to accountability and audit.

    Language: English

    Download the White Paper

  • How Identity Management Solves Five Hadoop Security Risks

    Integrate Hadoop clusters into existing Active Directory infrastructure for centralized identity management, cross-platform privilege management and auditing.

    Language: English

    Download the White Paper

  • Comment la gestion de l’identité numérique peutelle résoudre les cinq failles de sécurité d’Hadoop ?

    Les avantages liés au déploiement d’Hadoop sont extraordinaires mais pour toute infrastructure qui stocke des données précieuses pour l’entreprise, il est essentiel que les entreprises prennent conscience de l’existence de failles de sécurité éventuelles et prennent les mesures nécessaires pour les résoudre. Et la première étape est de mettre en application une gestion efficace de l’identité.

    Language: French

    Download the White Paper

  • Identitätsmanagement zur Lösung von fünf Sicherheitsrisiken bei Hadoop

    Die Vorteile bei der Anwendung Hadoops sind erheblich. Bei jeder Infrastruktur, die zur Sicherung der wertvollsten Daten einer Organisation dient, ist es für Unternehmen jedoch unbedingt notwendig, sich über die potentiellen Sicherheitsrisiken im Klaren zu sein und entsprechende Lösungsschritte einzuleiten. Der erste Schritt beinhaltet die Einführung eines effektiven Identitätsmanagement.

    Language: German

    Download the White Paper

  • Come la Gestione delle Identità può Risolvere Cinque Rischi connessi alla Sicurezza di Hadoop

    I vantaggi dello sviluppo di Hadoop sono notevoli, ma con qualsiasi infrastruttura che immagazzini i dati più preziosi di un’organizzazione, è essenziale che le aziende siano consapevoli dei potenziali rischi per la sicurezza e intraprendano i passi adeguati per gestirli. il primo passo è implementare una gestione efficace delle identità.

    Language: Italian

    Download the White Paper

  • Manage your Mac with Active Directory Group Policies

    With Centrify Identity Service Mac Edition (“Centrify for Mac”), you can use Active Directory to centrally manage authentication, policy enforcement, single sign-on (SSO) and user self-service for popular endpoint devices running Mac OS X, iOS and Android. By leveraging your existing identity infrastructure, processes and trained IT staff, you can reduce costs and improve operational efficiency. The following Group Policies are a representative list of what is available to manage Mac OS X systems as of the Centrify for Mac product release that came out in February 2015.

    Language: English

    Download the White Paper

  • Modern Enterprise Management for Mac and Mobile Devices

    Download this whitepaper to see how you can maximize the benefits of mobility, BYOD and SaaS while reducing the complexity of IT management for Mac and mobile devices.

    Language: English

    Download the White Paper

  • Office 365 Single Sign-On: High Availability Without High Complexity

    For most organizations, the move to Office 365 is a leap forward in user experience, productivity, IT simplification, and savings. But organizations that fail to implement Single Sign-On (SSO) reliably can slip backwards in several key areas. Risk increases and productivity suffers.

    Language: English

    Download the White Paper

  • L’authentification unique dans Office 365 : la disponibilité sans la complexité

    Ce livre blanc expliquera pourquoi une authentification unique très fiable (le SSO) entre votre réseau sur site et Office 365 est si important, pourquoi l’implémentation est étonnamment si difficile à mettre en oeuvre si l’on utilise les outils accessoires fournis avec Office 365, et comment Centrify élève le niveau de votre infrastructure Active Directory (AD) multi-sites déjà existante pour rendre l’authentification unique (le SSO) fiable et simple.

    Language: French

    Download the White Paper

  • Office 365 Single Sign-On: Hohe Verfügbarkeit ohne hohe Komplexität

    Dieses White Paper erklärt, weshalb eine besonders verlässliche SSO zwischen Ihrem Netzwerk vor Ort und Office 365 von zentraler Bedeutung ist, weshalb die Umsetzung mit den von Office 365 bereitgestellten Werkzeugen kompliziert ist und auf welche Art Centrify von Ihrem bereits vorhandenem, Mehrfachstandort-Active Directory (AD) Gebrauch macht, um die Einführung von SSO auf verlässliche und gleichzeitig einfache Art zu gestalten.

    Language: German

    Download the White Paper

  • Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security

    Capturing the detailed actions of privileged users is critical in today's business environment as companies seek out cost efficiencies through IT outsourcing, leverage third-party cloud providers and ISVs, and strive to comply with industry and federal regulations. User activity auditing can improve security and speed compliance in virtually every organization.

    Language: English

    Download the White Paper

  • Samsung KNOX: An Overview for Business Customers

    Samsung has introduced Samsung KNOX™ for its Android-based mobile platforms to satisfy the device management and security needs of business and government customers. This document provides a more detailed overview of the enterprise integration and management features in Samsung KNOX, with a focus on its capabilities for Microsoft Active Directory integration, policy management, enterprise mobility management and single sign-on.

    Language: English

    Download the White Paper

  • Simplifying the Management of Macs and Mobile Devices

    The workplace invasion of personal technology and an increasingly mobile workforce present both opportunities and challenges. Consumerization gives employees a choice, and they’re choosing personal products, such as Mac laptops and iOS and Android phones. Smart leaders are seeing consumerization as an opportunity to increase employee efficiency, productivity and self-sufficiency

    Language: English

    Download the White Paper

  • Stop Password Sprawl with App Single Sign-On (SSO) via Active Directory

    Using Centrify Identity Service, organizations can address password sprawl with single sign-on, and centralizing control cloud applications. Users get single sign-on and self-service features that let them locate, lock or wipe their mobile devices, and reset their Active Directory passwords. IT gets an easy-to-deploy, cloud-based service that seamlessly integrates into Microsoft Active Directory, which enables them to provision access to cloud applications, deploy secure app single sign on, and manage mobile devices and apps.

    Language: English

    Download the White Paper

  • Active Directory を介したアプリへのシングル サインオンを使用してパスワード スプロールを止める

    モバイルデバイスが企業に入り込み、それに伴いクラウドアプリが入ってきました。アプリ数の急増は、アカウントパスワードの複製を招き、会社データが危険にさらされることを意味します。その結果、不満を持ったユーザからヘルプデスクへの電話の増加につながります。Centrify Identity Service を利用すると、IT 部門はユーザ生産性を改善し、SaaS とモバイルアプリを介して可視化とコントールを実装し、パスワードスプロールを止めることができます。

    Language: Japanese

    Download the White Paper

  • Pare a proliferação de senhas com o aplicativo Single Sign-on através do Active Directory

    Os dispositivos móveis têm o caminho de sua adoção impulsionado nas empresas e eles trouxeram os aplicativos em nuvem para o passeio. Esta explosão de apps significa que o número de contas e senhas estão se multiplicando, o que expõe os dados corporativos e aumenta o número de chamadas ao suporte de usuários frustrados. Com Centrify User Suite, a TI pode melhorar a produtividade do usuário, ganhar visibilidade e controle sobre os aplicativos SaaS e móveis e parar de proliferação de senhas.

    Language: Portuguese

    Download the White Paper

  • The Case for Privileged Identity Management​

    In order to truly protect their data, organizations need to look beyond just security threats and see how technology has fundamentally changed how we approach privileged identity in the enterprise. The advent of mobility, cloud and outsourced IT services has sparked this transformation. In this paper, Bill Mann, Chief Products Officer of Centrify, discusses the essentials of privileged identity management

    Language: English

    Download the White Paper

  • The Essential Guide to Managing Access to SaaS Applications

    This Essential Guide, written independently by Windows IT Pro's Sean Deuby, examines the opportunities and challenges of empowering, yet controlling, user access to SaaS applications. Specifically, identity management as a service promises to simplify secure access to and management of SaaS applications while reducing password sprawl. It also reviews how mobile computing has added to the complexity of managing access to both corporate data and SaaS, and ways to evaluate the options available on the market.

    Language: English

    Download the White Paper

  • The Top 7 Ways to Protect Your Data in the New World of Shadow IT and Shadow Data

    Is protecting your company’s sensitive data a challenge? Most companies are running over 500 apps on their network at any given time. Many are native mobile apps running on wireless networks, others are cloud-based. Re-used passwords are common, but open up the possibility of data breaches that can expose sensitive data.

    Language: English

    Download the White Paper

  • Top 3 Reasons to Give Insiders a Unified Identity

    Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. Forbes recently cited internal threats as the third most significant cyber-security threat for 2013. The magazine noted that internal attacks can be “the most devastating” due to the amount of damage privileged users can inflict and the type of data they can access.

    Language: English

    Download the White Paper

  • Top Six Things to Consider with an Identity-as-a-Service (IDaaS) Solution

    Today’s most successful organizations are facing a number of key challenges: They need to provide employees with access to apps and other resources from any device. They need to ensure that IT can access security features across heterogeneous IT environments. They need to establish a single point of control (and monitoring) for improved security. And they need to establish granular user accountability and demonstrate controlled user access.

    Language: English

    Download the White Paper

  • Using Microsoft Active Directory to Address Payment Card Industry (PCI) Data Security Standard Requirements in Heterogeneous Environments

    Merchants, payment processors, point-of-sale vendors, and financial institutions must follow the Data Security Standard (DSS), a rigorous set of requirements from the Security Standards Council of the Payment Card Industry (PCI). These requirements are designed to ensure that merchants and service providers work to maintain consumer trust of payment cards.

    Language: English

    Download the White Paper

  • Who Moved My Secure Perimeter?

    In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service. 

    Language: English

    Download the White Paper

  • Windows Least-Privilege Management and Beyond

    Devising an enterprise-wide privilege access scheme for Windows systems is complex. For example, each Window system object has its own access control list, and the myriad OS-level rights and integrity levels vary by Windows version.  And yet, for Windows environments it is critical that organizations can delegate administration and establish granular privileges quickly and efficiently to restrict administrators so they access only the servers and resources required to perform their job and only during the approved times to perform specific tasks. This white paper explains how Centrify enables IT managers to enforce granular access and privilege controls efficiently without imposing usability burdens on their admins.

    Language: English

    Download the White Paper



Best Practices Briefs



Solution Briefs

  • Unified Identity Management for Box

    Centrify Identity Service provides seamless access to Box and other apps across devices. With Centrify, IT can centrally provision new users and applications, create custom access policies across devices, and automatically revoke access when needed. Directory integration is flexible and secure, while not requiring replication to the cloud.

    Language: English

    Download the Solution Brief

  • Centrify Alliance - Unified Identity Management for CallidusCloud

    CallidusCloud provides the full suite of apps you need to turn LEADS into CASH. CallidusCloud enables its customers to turn more leads into more revenue, more quickly. Time is money. Delays in access and adoption hinder productivity so you need to simplify the job for IT and insure sensitive customer and financial data is secure. This means getting rid of weak user managed passwords, as well as shared passwords. Centrify brings you this security and ease of use without the hassles and costs of password resets, while eliminating separate logins for each app without using passwords.

    Language: English

    Download the Solution Brief

  • Centrify Alliance - Unified Identity Management for Code42

    Code42 protects and gives IT needed visibility into endpoint data — all while letting users work how they want. Centrify streamlines the deployment of CrashPlan, SharePlan and other applications while providing stringent security and access controls. Centrify Identity Service improves end-user productivity and secures access to cloud, mobile, and on-premises apps via single sign-on, user provisioning and multi-factor authentication.

    Language: English

    Download the Solution Brief

  • Centrify Alliance - Unified Identity Management for Dropbox for Business

    Centrify Identity Service improves end-user productivity and secures access to cloud, mobile, and on-premises apps via single sign-on, user provisioning and multi-factor authentication. Centrify can automatically provision your users in to Dropbox for Business based on their role and group within Active Directory or LDAP, and can provision the Dropbox apps across all devices.

    Language: English

    Download the Solution Brief

  • Centrify Alliance - Unified Identity Management for Samanage

    Samanage offers a multi-tenant, unified cloud service desk and asset management platform. Centrify’s secure and unified identity across cloud, mobile and data center improves productivity, user experience and security. Together, Samanage and Centrify enable organizations to reduce IT costs through centralized visibility and automation of tedious tasks, enabling IT to increase service levels and focus more resources on strategic IT initiatives

    Language: English

    Download the Solution Brief

  • Centrify Alliance - Unified Identity Management for Zendesk

    Zendesk provides a cloud-based customer service platform designed to bring organizations and their customers closer together. Centrify Identity Service improves user experience and IT productivity while securing identities across cloud, mobile and data center. Users love faster deployment, single sign-on and seamless access to Zendesk and thousands of apps from all their devices. IT loves automated provisioning of users into Zendesk based on their role and group within Active Directory or LDAP, provisioning of the Zendesk app across devices, and full-featured mobility management.

    Language: English

    Download the Solution Brief

  • Centrify for Office 365

    Centrify Identity Service for Office 365 is a Microsoft-validated and Azure-based identity as a service (IDaaS) that offers the industry’s easiest-to-deploy and most comprehensive solution for Active Directory-based user provisioning, single sign-on and mobile management. End-users will love the single sign-on and self-service features. IT will love the automated user provisioning and lifecycle management, unified mobile management, visibility and granular app access control. And Centrify also supports single sign-on to thousands of other cloud-based applications.

    Language: English

    Download the Solution Brief

  • Centrify for Office 365 - Portuguese

    Centrify Identity Service para Office 365 é uma identidade baseada na plataforma Azure e validada pela Microsoft como serviço (IDaaS) que oferece a solução mais fácil de implantar e mais abrangente do setor para o provisionamento de usuário baseado em Active Directory, logon único e gerenciamento móvel.

    Language: Portuguese

    Download the Solution Brief

  • Centrify for Office 365 - Spanish

    Centrify Identity Service para Office 365 es una solución de Identidad como Servicio (Identity as a Service o IDaaS) validada por Microsoft y basada en Azure. Es la más exhaustiva de la industria y la más fácil de implementar para provisión de datos para el usuario basada en directorio activo, inicio de sesión única (SSO, por su sigla en inglés) y gestión de tecnología móvil.

    Language: Spanish

    Download the Solution Brief

  • Centrify for Red Hat

    Advanced Red Hat Enterprise Linux to Active Directory Integration, Group Policy Enforcement, Privilege Management and Audit

    Language: English

    Download the Solution Brief

  • Centrify Solution for CDM and CMaaS

    Centrify Server Suite addresses critical requirements within Phase 2 of the CDM Program as defined by the Department
    of Homeland Security:
    • Network Access Controls (NAC)
    • Manage Credentials and Authentication (MCA)
    • Manage Account Access (MAA)

    Language: English

    Download the Solution Brief

  • Eight Great Reasons to Use Centrify with Office 365

    We’re bringing you eight great reasons to use Centrify with Office 365. Centrify Identity Service is an Identity-asa-Service (IDaaS) solution that federates user identity from Active Directory, LDAP directories, or the Centrify Cloud Directory. By federating identity from a central directory, you can give your users single sign-on to Office 365, while making the rollout much simpler for your IT department. Centrify also manages access to thousands of other Software as a Service (SaaS) applications from any device.

    Language: English

    Download the Solution Brief

  • Five Simple Steps to Securing Your Corporate Identities

    Identity Challenges in Today’s Cloud and Mobile World: The days of on-site servers running local applications that could only be accessed via on-site PCs are over. An ever-increasing number of cloud apps are now available to consumers and businesspeople, and all it takes to adopt these new services is a browser and simple registration. In today’s cloud and mobile world, there’s no way IT can enforce a secure a perimeter around business data.

    Language: English

    Download the Solution Brief

  • Cinq étapes simples pour sécuriser les identités numériques au sein de votre entreprise

    Un nombre toujours plus grand d’applications émanant du Cloud sont désormais à la disposition des consommateurs et des chefs d’entreprises, et tout ce qui est nécessaire pour profiter de ces services est un simple navigateur et une inscription. Dans le monde du Cloud et de la mobilité d’aujourd’hui, il est impossible que l’informatique puisse appliquer un périmètre de sécurité pour des données commerciales.



    Language: French

    Download the Solution Brief

  • Five Simple Steps to Securing Your Corporate Identities - German

    Konsumenten und Geschäftsleuten steht heutzutage eine immer größere Auswahl an Cloud-Apps zur Verfügung, zu deren Nutzung es nicht mehr als einem Browser und einer einfachen Registrierung bedarf. In der heutigen Welt von Clouds und mobilen Geräten ist es aus informationstechnologischer Sicht daher schlicht nicht möglich, kommerzielle Daten sicher abzugrenzen.

    Language: German

    Download the Solution Brief

  • Cinque Semplici Passaggi per Proteggere i vostri Account Aziendali

    Oggigiorno sono disponibili sempre più applicazioni cloud per i consumatori e i professionisti del business, e per adottare questi nuovi servizi sono necessari soltanto un browser e una semplice procedura di registrazione. Nel mondo attuale basato su cloud e dispositivi mobili, la IT non ha modo di delineare un perimetro di sicurezza attorno ai dati aziendali.

     

    Language: Italian

    Download the Solution Brief

  • Identity and Access Management for Cloudera

    The Centrify Server Suite solution for Cloudera Enterprise is an enterprise-class offering that makes securing even the most complex Cloudera environments simple and straightforward by connecting your enterprise data hub to your existing Active Directory infrastructure. The result is enterprise-wide authentication, access control, privilege management, auditing and secure machine-to-machine communications which includes your Cloudera clusters, nodes and services.

    Language: English

    Download the Solution Brief

  • Identity and Access Management for Hortonworks

    The Centrify Server Suite solution for Hortonworks Data Platform is an enterprise-class offering that makes securing even the most complex Hortonworks environments simple and straightforward by connecting your Hortonworks Data Platform to your existing Active Directory infrastructure. The result is enterprise-wide authentication, access control, privilege management, auditing and secure machine-to-machine communications which includes your Hortonworks clusters, nodes and services.

    Language: English

    Download the Solution Brief

  • Identity and Access Management for MapR

    The Centrify Server Suite solution for MapR is an enterprise-class offering that makes securing even the most complex MapR environments simple and straightforward by connecting your MapR Distribution including Apache Hadoop to your existing Active Directory infrastructure. The result is enterprise-wide authentication, access control, privilege management, auditing and secure machine-to-machine communications which includes your MapR clusters, nodes and services.

    Language: English

    Download the Solution Brief

  • If You Manage Identity for App Access, You Must Manage Mobile

    In this Solution Brief, we review each of these technology areas, device type, security posture, usage, as well as user identity and app access policy, and then examine how organizations can benefit when identity is cleanly integrated across these two solutions.

    Language: English

    Download the Solution Brief

  • If You Manage Identity for App Access, You Must Manage Mobile - Portuguese

    Vamos examinar cada uma dessas áreas de tecnologia e depois examinar como as organizações podem se beneficiar quando a identidade é integrada entre essas duas soluções.

    Language: Portuguese

    Download the Solution Brief

  • If You Manage Identity for App Access, You Must Manage Mobile - Spanish

    Analicemos cada una de estas áreas de la tecnología y, a continuación, examinemos qué beneficio pueden obtener las organizaciones cuando la identidad se integra sin complicaciones con estas dos soluciones.

    Language: Spanish

    Download the Solution Brief

  • On-Premises App Gateway

    As organizations transition some of their key functions into the cloud, other applications remain hosted on servers on-premises. Concerns over security, application readiness, and return on investment are some of the reasons why CIOs want to keep some applications in-house. At the same time, end users want to access the applications they need, from any device and any location. Thus, IT must expand its security perimeter both directions—out to the cloud, and back into their data centers. Traditionally, IT has managed remote access with virtual private networks (VPNs). Now, Centrify offers an alternative to VPNs.

    Language: English

    Download the Solution Brief

  • Protect PCI Data from Domain Admins

    You're handed a mandate from management - restrict access to the PCI and SOX servers in order pass to the upcoming audit. On Windows Servers, there's a problem. Every member of the Domain Admin group has access to the PCI and SOX servers – access that they shouldn’t have. How do you solve the problem and restrict access by your domain administrators to those servers? This document answers this question.

    Language: English

    Download the Solution Brief

  • Proteja dados de servidores PCI dos Domain Admins

    Você recebeu uma ordem do seu gerente – restringir acesso aos servidores PCI e SOX para que a empresa passe na próxima auditoria. Para servidores Windows, isso é um problema. Todos os membros do grupo Domain Admins possuem acesso aos servidores PCI e SOX – algo que não deveriam ter. Como você consegue resolver o problema de restringir acesso dos administradores de domínio a esses servidores?

    Language: Portuguese

    Download the Solution Brief

  • Secure Management of Windows Services

    In today’s heterogeneous IT environments, administrative identities are growing at an uncontrolled rate. Server environments continue to expand in both scale and diversity as physical and virtualized servers are spun up on-premise and in the cloud. Add to this the plethora of devices that connect users to an increasing number of corporate and line-of-business applications, and it’s easy to see why it’s increasingly difficult to maintain control over and visibility into insiders and all of their privileges.

    Language: English

    Download the Solution Brief

  • Gestão segura de serviços Windows

    Nos ambientes heterogêneos de TI de hoje em dia, o número de identidades administrativas está crescendo em um ritmo descontrolado. O número de servidores continua a crescer em número e diversidade e servidores físicos e virtuais são facilmente criados on-premise ou na nuvem. Adicione isso a infinidade de dispositivos que os usuários utilizam para se conectar a aplicações de negócios, que fica fácil enxergar porquê é cada vez mais difícil manter o controle e visibilidade sobre usuários privilegiados e seus privilégios.

    Language: Portuguese

    Download the Solution Brief

  • Shared Accounts with Accountability

    IT organizations are required to create user accounts in Active Directory and share both the account name and its password with multiple users. Unfortunately, shared user accounts in Active Directory are hard to manage and difficult-to- impossible to secure using traditional privileged account management (PAM) technologies. This solution brief illustrates how Centrify Server Suite enables IT organizations to create and deploy shared user accounts safely and with guaranteed accountability that actions are associated with the correct end user.

    Language: English

    Download the Solution Brief

  • Top 10 Things to Consider Before Implementing Office 365

    Call it what you want — consumerization, the democratization of IT, the maturation of cloud — but the fact is that both endpoint resources and IT infrastructure are moving outside of the traditional business network. Bring Your Own Device led to Bring Your Own App, driven largely by the first round of file sharing apps that consumers brought into business. But the current focus of cloud migration has moved more squarely into the center of IT responsibility, with email moving from on-premises to cloud infrastructure. The best example of this trend — across verticals, across business size, and across geographies — is Microsoft Office 365.

    Language: English

    Download the Solution Brief



Policy Guides

Case Studies


  • Apttus

    Centrify has aided the Apttus IT team in saving time and reducing costs. The authentication process has been simplified for users via single sign-on, eliminating a significant percentage of help desk requests. IT activities have been reduced by bringing identity management under one centralized solution, taking significant pressure off the team.

    Language: English

    Download Case Study

  • Canadian Automobile Association Saskatchewan (CAA)

    Since implementing Centrify Identity Service, CAA Saskatchewan has logged significant cost savings through reduced user licensing fees, help-desk calls and internal development costs as well as multi-device support, increased security, and the ability to incorporate new, productivity enhancing technologies.

    Language: English

    Download Case Study

  • Essendon Volkswagen

    Since Centrify was deployed at Essendon Volkswagen, the company’s employees have only needed to remember a single personal password. As a result, security standards have improved.

    Language: English

    Download Case Study

  • FastMed Urgent Care

    Through Centrify, more than 1,000 FastMed users securely access over 200 apps, websites and cloud services every day — virtually every resource required across the organization — saving a potential thousands of dollars on reduced help desk calls.

    Language: English

    Download Case Study

  • Morehouse College

    Centrify is helping to decrease the cost of deploying and managing Office 365 and other cloud apps while at the same time improving user adoption and productivity. As a result, a strategic risk mitigation program has emerged with minimal impact on IT.

    Language: English

    Download Case Study

  • Morris Communications, Inc.

    Implementing Centrify Identity Service resulted in simplified user provisioning, significant savings in Box licensing costs and reduced help desk password resets. Identity federation services for Office 365 saved thousands of dollars in AD FS hardware and administrator costs.

    Language: English

    Download Case Study

  • National Weather Service, Southern Region

    With Centrify Server Suite, HSPD-12 requirements are met with ease and CAC smart cards are now used across the agency’s Windows, Linux and Mac systems. Day-one support for new OS releases and automated identity management together now save the agency tens of thousands of dollars a year.

    Language: English

    Download Case Study

  • Ouachita Parish School District

    Rapid implementation of Centrify Identity Service has provided faculty and staff with SSO across an unlimited number of apps, with a fraction of the servers require for the ADFS solution and no additional IT resources.

    Language: English

    Download Case Study

  • SBA Communications Corporation

    Centrify Identity Service saved SBA an estimated $50,000 a year in AD FS costs and negated the need for a separate MDM solution. Low maintenance requirements have freed up IT staff. Compliance with SOX regulations have been reinforced.

    Language: English

    Download Case Study

  • Simply Healthcare Case Study

    Simply Healthcare selected Centrify Identity Service to automate the company’s move to Office 365, provide single sign-on access and authentication for all cloud apps and to give IT centralized access control and visibility. Auditors can see who logged in to which apps, when they logged in and for how long — in support of HIPAA compliance and forensics efforts.

    Language: English

    Download Case Study

  • Snowy Hydro, Ltd.

    Implementing Centrify Identity Service for centralized management of mobile devices means field employees are accessible 24/7 to deal with issues as they arise – even when climbing a utility pole in a remote location. IT ensures user access to all mobile critical apps from any location. 

    Language: English

    Download Case Study

  • University of Southern California

    USC’s School of Engineering now uses University Central Active Directory to create a trust environment for the entire department. An SSO solution automatically grants permissions and access to individuals based on course enrollment, without having to manage user accounts, log-in credentials or passwords. Each student uses their primary USC log-in to gain access to the computing resources they need.

    Language: English

    Download Case Study

Datasheets


Centrify Products

  • Centrify Identity Service

    Cloud and mobile are here to stay. Cloud and mobile apps are quickly forcing their way into the enterprise, facilitating employee productivity, but exposing business-critical data. Cloud apps, and the mobile devices that can access app data, are often outside of IT control.

    Language: English

    Download the Datasheet

  • Centrify Identity Service

    Identité unifiée et gestion mobile en vue d’éliminer les mots de passe multiples et de faire respecter la politique de sécurité sur les appareils et les applications. Des centaines d’applications mobiles et cloud s’insinuent rapidement au sein de l’entreprise, facilitant la productivité des employés, mais exposant des données critiques aux affaires. Alors que les données circulent de plus en plus dans le cloud, il est également possible d’y avoir accès et de les stocker sur des terminaux mobiles qui se trouvent hors du périmètre de contrôle du service informatique.

    Language: French

    Download the Datasheet

  • Centrify Identity Service

    Hunderte von Cloud- und Mobile-Apps bahnen sich immer schneller ihren Weg in Unternehmen, steigern einerseits die Produktivität der Mitarbeiter, gefährden andererseits geschäftskritische Daten. Da immer mehr Daten in die Cloud gelangen, sind das Speichern und der Zugriff auf diese Daten auch über Mobilgeräte möglich, die von der IT nicht kontrolliert werden können.

    Language: German

    Download the Datasheet

  • Centrify Identity Service

    Centinaia di applicazioni cloud e per i dispositivi mobilisi stanno prepotentemente facendo strada nelle aziende, facilitando la produttività dei dipendenti, ma mostrando dati di importanza critica per il business. Poiché i dati si muovono sempre più verso il cloud, essi vengono consultati e archiviati anche tramite dispositivi mobili al di fuori del controllo IT.

    Language: Italian

    Download the Datasheet

  • Centrify Identity Service

    これからは、クラウドとモバイルの時代

    クラウドとモバイルのアプリは、急速に企業に浸透し、社員の生産性向上に寄与していますが、ビジネスに不可欠なデータが危険にさらされています。 クラウド アプリも、アプリ データにサクセスできるモバイル デバイスも、IT 管理が及ばないことがよくあります。 

    Language: Japanese

    Download the Datasheet

  • Centrify Identity Service

    Nuvem e mobilidade chegaram para ficar. Os aplicativos móveis e de nuvem estão chegando rapidamente às organizações e facilitando a produtividade dos funcionários, mas também estão expondo dados importantes das empresas. Os aplicativos de nuvem e os dispositivos móveis que podem acessar dados de aplicativos são frequentemente usados sem o controle de TI.

    Language: Portuguese

    Download the Datasheet

  • Centrify Identity Service

    La nube y los dispositivos móviles llegaron para quedarse. Las aplicaciones móviles y en la nube están abriéndose paso rápidamente en la empresa para facilitar la productividad de los empleados, pero dejan expuestos datos críticos para los negocios. Las aplicaciones en la nube, y los dispositivos móviles con acceso a los datos de las aplicaciones, suelen estar más allá del control de TI.

    Language: Spanish

    Download the Datasheet

  • Centrify Identity Service

    Birleştirilmiş kimlik ve mobil yönetim ile çoklu parolaların ortadan kaldırılması, uygulama ve cihaz politikalarının uygulanması. Yüzlerce bulut ve mobil uygulama hızlı bir şekilde kendilerini şirketin içine yerleştirerek çalışan üretkenliğini arttırıyor, ancak bir yandan da iş için kritik olan verileri ortaya döküyor. Veriler gittikçe artan bir şekilde buluta doğru taşınırken, aynı zamanda IT kontrolü dışında olan mobil cihazlarla erişiliyor ve bu cihazlarda depolanıyor.

    Language: Turkish

    Download the Datasheet

  • Centrify Identity Service, Enterprise Mobility Management

    Centrify Identity Service offers an easy-to-deploy, cloud-based service that enables centralized and secure mobile device management using existing directory service infrastructure. It provides single sign-on to cloud, on-premises and mobile apps on from mobile devices, as well as multi-factor authentication. Centrify uses cloud policy, or familiar Active Directory Group Policy to manage devices, and enforce app policies over a secure, cloud connection. Centrify Identity Service gives mobile users single sign on to cloud, mobile and custom apps, while enabling device-aware policy to meet IT security needs.

    Language: English

    Download the Datasheet

  • Centrify Identity Service, Enterprise Mobility Management

    Centrify Identity Service では、既存のディレクトリ サービス インフラストラクチャーを使用した集中管理型の安全 なモバイル デバイス管理を可能にする、導入しやすいクラウドベース サービスをご提供します。モバイル デバイス からのクラウド、オンプレミスおよびモバイル アプリへのシングル サインオンとともに、多要素認証も利用可能です。 Centrify は、クラウド ポリシー、または使い慣れた Active Directory グループを使用して、デバイスを管理し、アプリ のポリシー管理を行うことでセキュアなクラウド利用を実現します。Centrify Identity Service では、クラウド、モバイ ルおよびカスタム アプリへのシングル サインオンがモバイル ユーザに提供されるとともに、IT組織のセキュリティ 基準に準拠させるデバイス対応ポリシーも適用可能です。

    Language: Japanese

    Download the Datasheet

  • Centrify Identity Service, Enterprise Mobility Management

    Centrify Identity Service ofrece un servicio en la nube de fácil implementación que permite la gestión centralizada y segura de los dispositivos móviles, usando la infraestructura del servicio de directorio existente. Brinda un inicio de sesión única en la nube, acceso desde los dispositivos móviles a aplicaciones alojadas en el sitio y móviles, al igual que autenticación de múltiples factores. 

    Language: Portuguese

    Download the Datasheet

  • Centrify Identity Service, Enterprise Mobility Management

    Centrify Identity Service ofrece un servicio en la nube de fácil implementación que permite la gestión centralizada y segura de los dispositivos móviles, usando la infraestructura del servicio de directorio existente. Brinda un inicio de sesión única en la nube, acceso desde los dispositivos móviles a aplicaciones alojadas en el sitio y móviles, al igual que autenticación de múltiples factores. 

    Language: Spanish

    Download the Datasheet

  • Centrify Identity Service, Mac Edition

    Active Directory-Based Security and Management for Mac and Mobile Devices

    Apple Mac desktops and laptops are increasingly being utilized in today’s workplaces. Employees are bringing their own Macs to work and many organizations are choosing to deploy Macs to their users. Yet managing Macs and securing access to corporate networks and data can be challenging — especially for organizations that rely on Microsoft management solutions.

    Language: English

    Download the Datasheet

  • Centrify Identity Service, Mac Edition

    Segurança baseada em Active Directory e gerenciamento para Mac e dispositivos móveis. Laptops e desktops Apple Mac cada vez mais estão sendo utilizados nos locais de trabalho atualmente. Os funcionários estão trazendo seus próprios Macs para trabalhar e muitas organizações estão optando por implantar Macs para seus usuários.

    Language: Portuguese

    Download the Datasheet

  • Centrify Identity Service, Mac Edition

    En la actualidad, es cada vez mayor la incorporación de las computadoras de escritorio y portátiles de Apple Mac en los ámbitos laborales. Los empleados llevan sus propias Mac al trabajo y muchas organizaciones eligen la implementación de dispositivos Mac para sus usuarios. No obstante, la gestión de las Mac y su uso para un acceso seguro a las redes y datos de naturaleza corporativa puede plantear un desafío, en especial para las organizaciones que recurren a las soluciones de gestión de Microsoft.

    Language: Spanish

    Download the Datasheet

  • Centrify Identity Service, Mac Smart Card Edition

    Centrify Identity Service, Mac Smart Card Edition enables IT administrators to manage and secure Mac OS X systems using existing tools and processes so that Macs become a security peer to Windows systems. Centrify extends its proven Centrify for Mac solution with support for the most commonly used smart card systems.

    Language: English

    Download the Datasheet

  • Centrify Identity Service, Mac Smart Card Edition

    Mac OS X  Avançado para a integração do Active Directory, Aplicação de Política de Grupo e CAC, CAC NG e Suporte de Smart Card PIV. O Centrify Identity Service, Mac Smart Card Edition permite que os administradores de TI gerenciem e protejam os sistemas Mac OS X usando ferramentas e processos existentes para que os Mac se tornem um ponto de segurança para sistemas Windows. 

    Language: Portuguese

    Download the Datasheet

  • Centrify Identity Service, Mac Smart Card Edition

    La Edición para tarjetas inteligentes Mac de Centrify Identity Service les permite a los administradores de TI gestionar y asegurar los sistemas Mac OS X con las herramientas y procesos existentes, a fin de que las Mac funcionen como un elemento de seguridad que trabaja a la par de los sistemas Windows. Centrify extiende su reconocida solución Centrify para Mac y brinda soporte para los sistemas para tarjetas inteligentes de uso más común. 

    Language: Spanish

    Download the Datasheet

  • Centrify Privilege Service

    Centrify Privilege Service is a cloud-based password and access management solution. Privilege Service combines shared account password management with the ability to securely manage and audit access by internal and outsourced IT. The net result is increased security when sharing privileged accounts, simplified compliance, and secure remote access to on-premises and cloud-based infrastructure.

    Language: English

    Download the Datasheet

  • Centrify Privilege Service

    Les entreprises informatiques sont de plus en plus appelées à gérer des déploiements hybrides combinant une infrastructure basée sur le Cloud et un centre de données. Les administrateurs informatiques, qu'ils soient en interne ou qu'ils soient externalisés, ont besoin d'identifiants de connexion pour se connecter en dehors ou au sein du cadre corporatif.

    Language: French

    Download the Datasheet

  • Centrify Privilege Service

    クラウドベースのパスワード管理とアクセス管理

    IT 組織は、クラウドベース インフラストラクチャーとデータ センター インフラストラクチャーを組み合わせたハイブリッド配備の管理の必要性に迫られています。 このため、IT 管理者は、社内および社外から、社内およびアウトソース先のりソースに対して、ログインしないといけない状況になっています。 このような課題に対処するため、特権アカウントを共有する IT 組織は、パスワードとアクセスの管理ソリューションを構築して現代の企業でセキュリティを高め、法令遵守を簡素化し、サーバやネットワーク機器へのリモート アクセスを管理する必要があります。

    Language: Japanese

    Download the Datasheet

  • Centrify Privilege Service

    Cada vez mais as organizações de TI precisam gerenciar ambientes híbridos que compreendem o data center e recursos em nuvem. Os administradores de TI, tanto internos quanto terceirizados, precisam acessar recursos de dentro e de fora da rede da empresa. Para atenderem a esses desafios, as organizações de TI que usam contas privilegiadas compartilhadas precisam de uma solução de gestão de senhas e de acesso para que a empresa aumente a segurança, simplifique a conformidade e controle o acesso remoto a servidores e dispositivos de rede.

    Language: Portuguese

    Download the Datasheet

  • Centrify Privilege Service

    Las organizaciones de TI deben gestionar cada vez más implementaciones híbridas que combinan infraestructuras de centros de datos y basadas en la nube. Los administradores de TI, tanto internos como tercerizados, necesitan iniciar sesión desde dentro y fuera del perímetro corporativo. Para satisfacer esas expectativas, las organizaciones de TI que comparten cuentas privilegiadas necesitan una solución para la gestión de las contraseñas y el acceso ideada para empresas modernas, con el fin de incrementar la seguridad, simplificar el cumplimiento normativo y controlar el acceso remoto a los servidores y equipos de red.

    Language: Spanish

    Download the Datasheet

  • Centrify Server Suite

    Centrify Server Suite delivers unified identity management and audit across on-premisesÿand cloud-based Windows, Linux, and UNIX servers.

    Language: English

    Download the Datasheet

  • Centrify Server Suite

    Egal, ob das Risiko von Insiderbedrohungen oder APT-Angriffen (Advanced Persistent Threats) eingrenzt oder in einer Multi-Plattform- und cloudbasierten Umgebung die Einhaltung der PCI-DSS-, SOX- oder anderen Industrierichtlinien und gesetzlichen Vorschriften gew„hrleistet werden soll, IT-Organisationen ben”tigen eine einheitliche L”sung fr Identit„tsverwaltung und Audit, die eine zentralisierte šbersicht und Kontrolle der Identit„tsinfrastruktur, Zugriffsrechte und Aktivit„ten erm”glicht.

    Language: German

    Download the Datasheet

  • Centrify Server Suite

    オンプレミスおよびクラウドベースの Windows、Linux、および  UNIX サーバにおける統合型 ID 管理と監査

    インサイダーの脅威や APT (Advanced Persistent Threat) 攻撃対策、増大するプラットフォームとクラウドベース環境を PCIDSS、SOX などの規定や法令への対応。IT 組織は様々な問題に取り組む必要があります。これらに対処するためには、アイデンティティ管理、特権アカウント管理、そしてユーザアクティビティの集中管理による状況把握とコントロールとを可能にする、統合型アイデンティティ管理および監査ソリューションが必要です。

    Language: Japanese

    Download the Datasheet

  • Centrify Server Suite

    Seja para mitigar os riscos de amea‡as internas e amea‡as persistentes avan‡adas (APT), ou para atender a PCI-DSS, SOX ou outras normas regulat¢rias da ind£stria e regulamenta‡oes governamentais em um ambiente multi-plataforma e cada vez mais na nuvem, as organiza‡oes de TI necessitam de uma solu‡ao de gestao de identidade unificada e auditoria que permita visibilidade e controle centralizados sobre identidades, gestao de acesso privilegiado e atividades de usu rios.

    Language: Portuguese

    Download the Datasheet

  • Centrify Server Suite

    Auditoría y administración de identidad unificada para servidores Windows, Linux y UNIX en la premisa y en la nube.

    Language: Spanish

    Download the Datasheet

Webinars

Demo Videos


Chalktalks

  • Accelerating Deployment of Salesforce.com with Centrify Identity Service

    Nick Gamb and Kayne McGladrey from Centrify Professional Services discuss how to rapidly deploy Salesforce.com and other SaaS apps with the Centrify Identity Service. We also discuss and demonstrate SAML authentication and provisioning of Active Directory users to Salesforce.com.​

    Watch the Demo

  • Automated Centrify Zone Provisioning in a Multi-Platform UNIX Environment

    Ian Guthrie and Kayne McGladrey from Centrify Professional Services discuss the challenges of automatically provisioning UNIX home directories in a multi-platform network environment. We also discuss the use of the Zone Provisioning Agent and Group Policies for UNIX, and provide guidance on how to apply this design to other scenarios.

    Watch the Demo

  • Centrify DirectAuthorize for UNIX and Linux

    Than Chariya and Kayne McGladrey from Centrify Professional Services discuss the challenges and benefits associated with centrally managing user privileges on UNIX and Linux. We also discuss the creation and management of Roles and Rights and migrating away from legacy technologies like sudo. Finally, we also discuss achieving regulatory compliance by auditing the use of privileged commands.

    Watch the Demo

  • Centrify DirectAuthorize for Windows Part 1: Windows Security and Privilege Management

    Rich Loose and Brad Zehring open this six-part technical deep-dive into Centrify DirectAuthorize for Windows. In preparation for later topics, Rich begins with an exploration of some of the key architectural components of Windows security and demonstrates a Microsoft utility for examining privileges of running processes.

    Watch the Demo

  • Centrify DirectAuthorize for Windows Part 2: Seamless, Audited Privilege Elevation

    Rich Loose and Brad Zehring discuss what Windows privilege elevation means, how Windows enforces different levels of access for different users based on their privileges, and how Centrify elevates a user’s privilege for specific applications, network resources, and privileged desktops. Rich explains Windows User Access Control (UAC) and how it works with privilege elevation and administrator accounts.

    Watch the Demo

  • Centrify DirectAuthorize for Windows Part 3: DirectAuthorize Architecture

    Rich Loose lays out the overall architecture of DirectAuthorize, how it connects to the Windows Local Security Authority, and how it works with Windows to enable granular user privileges for applications, network resources, and desktops.

    Watch the Demo

  • Centrify DirectAuthorize for Windows Part 4: Windows Sessions, Desktops, and Diagnostics

    Rich Loose explains the relationship between Windows sessions, user desktops and DirectAuthorize, and demonstrates utility and diagnostic tools for examining the underlying properties of user identity, privileges, and running processes.

    Watch the Demo

  • Centrify DirectAuthorize for Windows Part 5: The Privileged Desktop

    Rich Loose and Brad Zehring discuss the functionality and underlying architecture of the privileged desktop, a feature that elevates privilege for all operations across an entire desktop and (along with DirectAudit) audits the user's activity.

    Watch the Demo

  • Centrify DirectAuthorize for Windows Part 6: Network Access Rights

    Rich Loose and Brad Zehring discuss privileged account management over remote connections, a unique ability of Centrify DirectAuthorize for Windows. Rich explains the architecture of Windows authentication over remote connections, logon IDs, the credential cache, and remote privilege elevation, finishing with a demonstration of privilege elevation using a DirectAuthorize network access right.

    Watch the Demo

  • Centrify Privilege Management Overview

    Fabrice Viguier and Kayne McGladrey from Centrify Professional Services discuss the usage of Role-Based Access Control solution in three use-case scenarios. This video also provides project guidance for our best practices in managing Access Control and Privileges on Unix and Linux systems using the Centrify Server Suite solution.

    Watch the Demo

  • Introduction to SAML

    In this brief introduction to Security Assertion Markup Language (SAML), Centrify CTO Paul Moore and Senior Director of Product Management, Corey Williams, describe how the industry standard protocol is used by web applications to security authenticate and authorize users to access secure content. They detail a key use case that illustrates the basic principles.

    Watch the Demo

  • Migrating NIS to a Modern UNIX Environment

    Cindy Ritchie and Kayne McGladrey from Centrify Professional Services discuss the regulatory challenges associated with NIS in a modern UNIX environment, and then discuss migrating away from legacy NIS to a secure, centralized Active Directory environment. This video also provides project guidance for our best practices in assisting customers with NIS migrations for over nine years.

    Watch the Demo

Documentation


Documentation and Release Notes

ReleaseDate Centrify Cloud Release Notes
15.7 August 9, 2015 Centrify Cloud 15.7 Release Notes
15.6 July 12, 2015 Centrify Cloud 15.6 Release Notes
15.5 June 13, 2015 Centrify Cloud 15.5 Release Notes
15.4 (Hot Fix 1) May 18, 2015 Centrify Cloud 15.4 Hot Fix Release Notes
15.4 May 2, 2015 Centrify Cloud 15.4 Release Notes
15.3 (Hot Fix 1) April 23, 2015 Centrify Identity Service 15.3 Hot Fix Release Notes
15.3 April 4, 2015 Centrify Identity Service 15.3 Release Notes
15.2 March 7, 2015 Centrify Identity Service 15.2 Release Notes
15.1 January 24, 2015 Centrify Identity Service 15.1 Release Notes
14.10 December 13, 2014 Centrify User Suite 14.10 Release Notes
14.9 (Hot Fix 1) November 22, 2014 Centrify User Suite 14.9 Hot Fix Release Notes
14.9 November 8, 2014 Centrify User Suite 14.9 Release Notes
14.8 October 18, 2014 Centrify User Suite 14.8 Release Notes
14.7 September 13, 2014 Centrify User Suite 14.7 Release Notes
14.6 July 26, 2014 Centrify User Suite 14.6 Release Notes
14.5 June 21, 2014 Centrify User Suite 14.5 Release Notes
14.4 May 31, 2014 Centrify User Suite 14.4 Release Notes
14.3 April 26, 2014 Centrify for SaaS 14.3 Release Notes
14.2 (Hot Fix 1) April 1, 2014 Centrify for SaaS 14.2 Hot Fix Release Notes
14.2 March 29, 2014 Centrify for SaaS 14.2 Release Notes
14.1 March 8, 2014 Centrify for SaaS 14.1 Release Notes
13.13 February 2, 2014 Centrify for SaaS 13.13 Release Notes
13.12 January 11, 2014 Centrify for SaaS 13.12 Release Notes
13.11 December 14, 2013 Centrify for SaaS 13.11 Release Notes
13.10 November 3, 2013 Centrify for SaaS 13.10 Release Notes
13.9 October 1, 2013 Centrify for SaaS 13.9 Release Notes
13.8 September 8, 2013 Centrify for SaaS 13.8 Release Notes
13.7 August 19, 2013 Centrify for SaaS 13.7 Release Notes
13.6 July 25, 2013 Centrify for SaaS 13.6 Release Notes
13.5 June 14, 2013 Centrify for SaaS 13.5 Release Notes
13.4 May 28, 2013 Centrify for SaaS 13.4 Release Notes
13.3 May 3, 2013 Centrify for SaaS 13.3 Release Notes
13.2 April 12, 2013 Centrify for SaaS 13.2 Release Notes
13.1 March 22, 2013 Centrify for SaaS 13.1 Release Notes