Resources

White Papers


White Papers

  • A Practical Path to Unified Identity Across Data Center, Cloud and Mobile

    Today’s fractured identity environments can be a significant management challenge for IT and a source of frustration and lower productivity for users. Windows, Linux and UNIX servers as well as applications (on-premise, SaaS and mobile) and mobile devices must be brought into line with security best practices and compliance.

    Language: English

    Download the White Paper

  • Ein praktischer Pfad zur Vereinheitlichung der Identitäten für Rechenzentrum, Cloud und Mobilität

    Dieses Whitepaper bietet die beste Gesamt Einführung in Centrify, zu erklären, wie unser einheitliches Identitätsmanagement-Ansatz sorgt für eine Unternehmens lokalen Active Directory-Infrastruktur sicher genutzt werden, um schnell zu bringen Servern (Windows, Linux, UNIX), Anwendungen (On-Premise werden, SaaS und mobil) und Endpunkte (Macs und mobile Geräte) in Einklang mit den best-Practice-Sicherheit und Compliance.

    Language: German

    Download the White Paper

  • Best Practices for Adding Macs to Microsoft Networks

    Adding Macs to a Microsoft-based corporate network can be a challenge. Are Microsoft tools, Apple tools or third party tools the best solution? Are Mac-oriented management tools the best option or is it best to incorporate the Macs within existing management and security infrastructure?

    Language: English

    Download the White Paper

  • Best Practices for Privileged Identity Management in the Modern Enterprise

    Data breaches continue to be top of mind for organizations large and small. Two key dynamics are making that challenge much harder: the cloud and the growing sophistication of attackers. The modern enterprise is now a hybrid organization with infrastructure spread across on-premises data centers and in the cloud, with IT functions split between internal and third-party administrators. This white paper examines these trends and formulates best practices for managing risks in these areas of identity consolidation, privileged session management, superuser privilege management, shared account password management, and secure VPN-less remote access.

    Language: English

    Download the White Paper

  • Erfolgsmethoden für Privileged Identity Management in modernen Unternehmen

    Datenpannen stehen weiterhin ganz oben auf der Liste von sowohl kleinen, als auch großen Organisationen. Insbesondere zwei Entwicklungen verstärken diese Herausforderung — die Cloud, sowie die stetig wachsende Raffinesse der Angreifer. In diesem Paper widmen wir uns dem modernen Unternehmen  — einer Hybrid-Organisation, deren Infrastruktur sich über Rechenzentren vor Ort, sowie auf die Cloud erstreckt und deren IT-Funktionen auf interne und außenstehende Administratoren verteilt ist. Wir betrachten sowohl diese, als auch ähnliche Trends mit Einfluss auf unsere Datensicherheit und besprechen insbesondere Erfolgsmethoden zum Management und zur Verwaltung von Privileged User Accounts, um die Risiken so zu minimieren.

    Language: German

    Download the White Paper

  • Práticas recomendadas para o gerenciamento privilegiado de identidades na empresa moderna

    As violações de dados continuam sendo a principal preocupação das organizações de grande e pequeno porte. Duas dinâmicas importantes estão tornando esse desafio muito mais difícil — a nuvem e a sofisticação crescente dos invasores.

    Language: Portuguese

    Download the White Paper

  • Mejores prácticas para la gestión de identidad privilegiada en empresas modernas

    La filtración de datos sigue siendo un problema prioritario para las organizaciones grandes y pequeñas. Existen dos dinámicas clave que dificultan aún más ese tema: la nube y la creciente sofisticación de los atacantes.

    Language: Spanish

    Download the White Paper

  • Centrify Solutions for PCI DSS

    The Security Standards Council of the Payment Card Industry (PCI) owns and maintains the Data Security Standard (DSS), a rigorous set of requirements that all merchants, payment processors, point-of-sale vendors and financial institutions must follow. The PCI DSS 3.1 consists of 12 requirements spread across six domains. Since the core concern of PCI is the protection of cardholder data, these requirements focus on user access to the servers that host this data, or through which such data passes. This white paper examines each of the 12 requirements and identifies capabilities of the Server Suite and Privilege Service that customers can leverage to help achieve compliance.

    Language: English

    Download the White Paper

  • Close the Window on Three Windows Server Threat Scenarios

    Companies as well as government agencies are looking for solutions to mitigate the risk of both inside and advanced persistent threats. Today’s cutting-edge strategies allow organizations to manage their identity-related risk posture and cost-effectively address regulatory mandates, making compliance repeatable and sustainable.

    Language: English

    Download the White Paper

  • Verhindern Sie drei Windows Server-Bedrohungsszenarien​

    Dieses Whitepaper zeigt drei häufige Windows Server Bedrohungsszenarien auf und erläutert, wie diese neutralisiert werden können. Durch das Befolgen der Richtlinien in diesem Weißbuch können Unternehmen Bedrohungen von außen sowie aus dem internen Netzerk abwehren, ihre Windows Server-Infrastruktur und sensible Daten schützen, sowie die entsprechenden rechtlichen Anforderungen erfüllen.

    Language: German

    Download the White Paper

  • FISMA Compliance through Centralized IAM Leveraging Active Directory

    The Federal Information Security Management Act (FISMA) lays out a comprehensive set of security requirements for federal IT managers. While FISMA compliance is a complex process, its core IAM requirements come down to common sense and well established principles that can be addressed through a strategy of centralized management, policy enforcement and continuous monitoring.

    Language: English

    Download the White Paper

  • How Global Financial Firms Can Effectively Address Technology Risk Guidelines

    The June 2013 MAS guidelines for Internet Banking and Technology Risk Management (TRM) comprehensively identify security and risk management issues, covering everything from identity assurance and access controls to accountability and audit.

    Language: English

    Download the White Paper

  • How Identity Management Solves Five Hadoop Security Risks

    Integrate Hadoop clusters into existing Active Directory infrastructure for centralized identity management, cross-platform privilege management and auditing.

    Language: English

    Download the White Paper

  • Comment la gestion de l’identité numérique peutelle résoudre les cinq failles de sécurité d’Hadoop ?

    Les avantages liés au déploiement d’Hadoop sont extraordinaires mais pour toute infrastructure qui stocke des données précieuses pour l’entreprise, il est essentiel que les entreprises prennent conscience de l’existence de failles de sécurité éventuelles et prennent les mesures nécessaires pour les résoudre. Et la première étape est de mettre en application une gestion efficace de l’identité.

    Language: French

    Download the White Paper

  • Lösen von Hadoop-Sicherheitsrisiken mithilfe der Identitätsverwaltung

    Die Vorteile bei der Anwendung Hadoops sind erheblich. Bei jeder Infrastruktur, die zur Sicherung der wertvollsten Daten einer Organisation dient, ist es für Unternehmen jedoch unbedingt notwendig, sich über die potentiellen Sicherheitsrisiken im Klaren zu sein und entsprechende Lösungsschritte einzuleiten. Der erste Schritt beinhaltet die Einführung eines effektiven Identitätsmanagement.

    Language: German

    Download the White Paper

  • Come la Gestione delle Identità può Risolvere Cinque Rischi connessi alla Sicurezza di Hadoop

    I vantaggi dello sviluppo di Hadoop sono notevoli, ma con qualsiasi infrastruttura che immagazzini i dati più preziosi di un’organizzazione, è essenziale che le aziende siano consapevoli dei potenziali rischi per la sicurezza e intraprendano i passi adeguati per gestirli. il primo passo è implementare una gestione efficace delle identità.

    Language: Italian

    Download the White Paper

  • Manage your Mac with Active Directory Group Policies

    With Centrify Identity Service Mac Edition (“Centrify for Mac”), you can use Active Directory to centrally manage authentication, policy enforcement, single sign-on (SSO) and user self-service for popular endpoint devices running Mac OS X, iOS and Android. By leveraging your existing identity infrastructure, processes and trained IT staff, you can reduce costs and improve operational efficiency. The following Group Policies are a representative list of what is available to manage Mac OS X systems as of the Centrify for Mac product release that came out in February 2015.

    Language: English

    Download the White Paper

  • Modern Enterprise Management for Mac and Mobile Devices

    Download this whitepaper to see how you can maximize the benefits of mobility, BYOD and SaaS while reducing the complexity of IT management for Mac and mobile devices.

    Language: English

    Download the White Paper

  • Office 365 Single Sign-On: High Availability Without High Complexity

    For most organizations, the move to Office 365 is a leap forward in user experience, productivity, IT simplification, and savings. But organizations that fail to implement Single Sign-On (SSO) reliably can slip backwards in several key areas. Risk increases and productivity suffers.

    Language: English

    Download the White Paper

  • L’authentification unique dans Office 365 : la disponibilité sans la complexité

    Ce livre blanc expliquera pourquoi une authentification unique très fiable (le SSO) entre votre réseau sur site et Office 365 est si important, pourquoi l’implémentation est étonnamment si difficile à mettre en oeuvre si l’on utilise les outils accessoires fournis avec Office 365, et comment Centrify élève le niveau de votre infrastructure Active Directory (AD) multi-sites déjà existante pour rendre l’authentification unique (le SSO) fiable et simple.

    Language: French

    Download the White Paper

  • Einmaliges Anmelden bei Office 365: Hohe Verfügbarkeit ohne hohe Komplexität

    Dieses White Paper erklärt, weshalb eine besonders verlässliche SSO zwischen Ihrem Netzwerk vor Ort und Office 365 von zentraler Bedeutung ist, weshalb die Umsetzung mit den von Office 365 bereitgestellten Werkzeugen kompliziert ist und auf welche Art Centrify von Ihrem bereits vorhandenem, Mehrfachstandort-Active Directory (AD) Gebrauch macht, um die Einführung von SSO auf verlässliche und gleichzeitig einfache Art zu gestalten.

    Language: German

    Download the White Paper

  • Platform Approach to Securing Enterprise Identities

    In this paper we will examine how securing identity is at the center of protecting your users, systems and data. In fact, today’s threats require a next-generation identity platform. And how Centrify secures enterprise identities through the Centrify Identity Platform.

    Language: English

    Download the White Paper

  • Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security

    Capturing the detailed actions of privileged users is critical in today's business environment as companies seek out cost efficiencies through IT outsourcing, leverage third-party cloud providers and ISVs, and strive to comply with industry and federal regulations. User activity auditing can improve security and speed compliance in virtually every organization.

    Language: English

    Download the White Paper

  • Samsung KNOX: An Overview for Business Customers

    Samsung has introduced Samsung KNOX™ for its Android-based mobile platforms to satisfy the device management and security needs of business and government customers. This document provides a more detailed overview of the enterprise integration and management features in Samsung KNOX, with a focus on its capabilities for Microsoft Active Directory integration, policy management, enterprise mobility management and single sign-on.

    Language: English

    Download the White Paper

  • Simplifying the Management of Macs and Mobile Devices

    The workplace invasion of personal technology and an increasingly mobile workforce present both opportunities and challenges. Consumerization gives employees a choice, and they’re choosing personal products, such as Mac laptops and iOS and Android phones. Smart leaders are seeing consumerization as an opportunity to increase employee efficiency, productivity and self-sufficiency

    Language: English

    Download the White Paper

  • Stop Password Sprawl with App Single Sign-On (SSO) via Active Directory

    Using Centrify Identity Service, organizations can address password sprawl with single sign-on, and centralizing control cloud applications. Users get single sign-on and self-service features that let them locate, lock or wipe their mobile devices, and reset their Active Directory passwords. IT gets an easy-to-deploy, cloud-based service that seamlessly integrates into Microsoft Active Directory, which enables them to provision access to cloud applications, deploy secure app single sign on, and manage mobile devices and apps.

    Language: English

    Download the White Paper

  • Active Directory を介したアプリへのシングル サインオンを使用してパスワード スプロールを止める

    モバイルデバイスが企業に入り込み、それに伴いクラウドアプリが入ってきました。アプリ数の急増は、アカウントパスワードの複製を招き、会社データが危険にさらされることを意味します。その結果、不満を持ったユーザからヘルプデスクへの電話の増加につながります。Centrify Identity Service を利用すると、IT 部門はユーザ生産性を改善し、SaaS とモバイルアプリを介して可視化とコントールを実装し、パスワードスプロールを止めることができます。

    Language: Japanese

    Download the White Paper

  • Pare a proliferação de senhas com o aplicativo Single Sign-on através do Active Directory

    Os dispositivos móveis têm o caminho de sua adoção impulsionado nas empresas e eles trouxeram os aplicativos em nuvem para o passeio. Esta explosão de apps significa que o número de contas e senhas estão se multiplicando, o que expõe os dados corporativos e aumenta o número de chamadas ao suporte de usuários frustrados. Com Centrify Identity Service, a TI pode melhorar a produtividade do usuário, ganhar visibilidade e controle sobre os aplicativos SaaS e móveis e parar de proliferação de senhas.

    Language: Portuguese

    Download the White Paper

  • Detenga la expansión de contraseñas con el inicio de sesión único a aplicaciones mediante Active Directory

    Mediante el uso de Centrify Identity Service, las organizaciones pueden solucionar el problema de la expansión de contraseñas con el inicio de sesión único y centralizar las aplicaciones en la nube. Los usuarios obtienen las funciones de inicio de sesión único y autoservicio que les permiten ubicar, bloquear o borrar sus dispositivos móviles y restablecer las contraseñas de Active Directory. Los encargados de TI obtienen un servicio basado en la nube fácil de implementar que se integra perfectamente con Microsoft Active Directory, lo que les permite ofrecer acceso a las aplicaciones en la nube, implementar el inicio de sesión único seguro a aplicaciones y administrar dispositivos móviles y aplicaciones.

     

    Language: Spanish

    Download the White Paper

  • The Case for Privileged Identity Management​

    In order to truly protect their data, organizations need to look beyond just security threats and see how technology has fundamentally changed how we approach privileged identity in the enterprise. The advent of mobility, cloud and outsourced IT services has sparked this transformation. In this paper, Bill Mann, Chief Products Officer of Centrify, discusses the essentials of privileged identity management

    Language: English

    Download the White Paper

  • The Essential Guide to Managing Access to SaaS Applications

    This Essential Guide, written independently by Windows IT Pro's Sean Deuby, examines the opportunities and challenges of empowering, yet controlling, user access to SaaS applications. Specifically, identity management as a service promises to simplify secure access to and management of SaaS applications while reducing password sprawl. It also reviews how mobile computing has added to the complexity of managing access to both corporate data and SaaS, and ways to evaluate the options available on the market.

    Language: English

    Download the White Paper

  • The Top 7 Ways to Protect Your Data in the New World of Shadow IT and Shadow Data

    Is protecting your company’s sensitive data a challenge? Most companies are running over 500 apps on their network at any given time. Many are native mobile apps running on wireless networks, others are cloud-based. Re-used passwords are common, but open up the possibility of data breaches that can expose sensitive data.

    Language: English

    Download the White Paper

  • Top 3 Reasons to Give Insiders a Unified Identity

    Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. Forbes recently cited internal threats as the third most significant cyber-security threat for 2013. The magazine noted that internal attacks can be “the most devastating” due to the amount of damage privileged users can inflict and the type of data they can access.

    Language: English

    Download the White Paper

  • Top 3 Reasons to Give Insiders a Unified Identity - French

    Même si le battage médiatique autour de la sécurité informatique concerne, pour la plupart, les pirates et autres attaques externes, les menaces internes peuvent être particulièrement insidieuses et dangereuses, qu’elles soient délibérées ou dues à la négligence d’un employé. Dans sa liste énumérant les huit menaces les plus importantes en matière de cybersécurité pour 2013, Forbes mentionne les menaces internes en n° 3, et remarque que les attaques internes peuvent être « les plus dévastatrices » en raison de l’importance des dommages que des utilisateurs privilégiés peuvent infliger et du type de données auquel ils ont accès.1

    Language: French

    Download the White Paper

  • Die drei wichtigsten Gründe dafür, Insidern eine einheitliche Identität zu geben

    Obwohl viel Aufsehen um Computersicherheit durch Hacker und andere von außen kommende Angriffen gemacht wird, können insbesondere Insider-Bedrohungen heimtückisch und gefährlich sein, gleich ob diese aus Bosheit oder Fahrlässigkeit von Angestellten herrührt. Auf der Liste der acht bedeutendsten Bedrohungen in Sachen Internetsicherheit für das Jahr 2013 führt Forbes interne Bedrohungen unter Beachtung interner Angriffe auf Basis des Schadens, den privilegierte Benutzer verursachen, sowie die Art von Daten, zu denen diese Zugang haben, auf Platz 3 “der Verheerendsten” an.

    Language: German

    Download the White Paper

  • Top Six Things to Consider with an Identity-as-a-Service (IDaaS) Solution

    Today’s most successful organizations are facing a number of key challenges: They need to provide employees with access to apps and other resources from any device. They need to ensure that IT can access security features across heterogeneous IT environments. They need to establish a single point of control (and monitoring) for improved security. And they need to establish granular user accountability and demonstrate controlled user access.

    Language: English

    Download the White Paper

  • Les six points principaux à considérer avec une solution IDaaS (« Identity-as-a-Service »)

    Le nombre et la diversité des applications en cours d’adoption par les organisations - des solutions sur site, web ou SaaS (« software as a service ») en passant par les applications mobiles - augmentent rapidement. Alors que l’informatique continue de proposer de nouvelles applications variées, certains secteurs commerciaux, et même des individus, adoptent des applications indépendantes de l’informatique à un rythme étonnant.

    Language: French

    Download the White Paper

  • Die sechs wichtigsten Dinge, die bei einer Identity-as-a-Service (IDaaS)-Lösung zu beachten sind

    Die Anzahl und Vielfalt von Applikationen (Apps), die von Organisationen verwendet werden – von On-Premise zu cloudbasierten und Software as a Service (SaaS) bis zu mobilen Apps– nimmt rasch zu. Während die IT-Branche weiterhin neue und variierende Anwendungen auf den Markt bringt, nimmt die Verwendungsrate von Apps in anderen Geschäftszweigen und sogar bei einzelnen Personen unabhängig von der IT-Branche erstaunlich zu.

    Language: German

    Download the White Paper

  • Sei Aspetti Fondamentali da Considerare in una Soluzione Identity-as-a-Service (IDaaS)

    Il numero e la varietà di applicazioni adoperate dalle organizzazioni – applicazioni on premise, basate su cloud, del tipo software as a service (SaaS) e per dispositivi mobili – si stanno espandendo e stanno crescendo rapidamente. Mentre l’ IT continua a sviluppare nuove applicazioni in costante evoluzione, le linee commerciali e anche individuali adesso stanno usando applicazioni indipendenti dalla IT in maniera sbalorditiva.

    Language: Italian

    Download the White Paper

  • As seis coisas principais a considerar em uma Solução de Identidade como um Serviço (IDaaS)

    O número e a variedade de aplicativos que estão sendo adotados pelas empresas — desde aplicativos no local, aplicativos baseados em nuvem, até aplicativos móveis — estão aumentando rapidamente. Enquanto o Departamento de TI continua a fornecer aplicativos novos e variados, diversas áreas de negócios e até mesmo indivíduos estão também utilizando aplicativos independentemente do Departamento de TI num ritmo surpreendente. 

    Language: Portuguese

    Download the White Paper

  • Using Microsoft Active Directory to Address Payment Card Industry (PCI) Data Security Standard Requirements in Heterogeneous Environments

    Merchants, payment processors, point-of-sale vendors, and financial institutions must follow the Data Security Standard (DSS), a rigorous set of requirements from the Security Standards Council of the Payment Card Industry (PCI). These requirements are designed to ensure that merchants and service providers work to maintain consumer trust of payment cards.

    Language: English

    Download the White Paper

  • Usar el directorio activo de Microsoft para cumplir con los requisitos estándares de seguridad de datos del Consejo de la Industria de tarjetas de pago (PCI) en entornos heterogéneos

    Con el Directorio Activo de Microsoft y Centrify para Servidores, se puede utilizar la infraestructura ya existente en su empresa para resolver la problemática de otras plataformas, y beneficios comomayor fortaleza en los controles de seguridad, mejoras en las operaciones de tecnología de la información, reportes de auditoria, y la captura y reproducción de las sesiones de los usuarios. Más importante aún, en conjunto ayudan a cumplir con varios de los requerimientos de las normas de seguridad de la Industria de Tarjetas de Pago (PCI DSS).

    Language: Spanish

    Download the White Paper

  • Who Moved My Secure Perimeter?

    Your organization’s sensitive information is everywhere — on mobile devices, in the cloud and, of course, behind your firewall — so where is your secure perimeter? This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service.

    Also check out the related Infographic at: http://www.centrify.com/media/1773948/security-perimeter-infographic.pdf

    Language: English

    Download the White Paper

  • Windows Least-Privilege Management and Beyond

    Devising an enterprise-wide privilege access scheme for Windows systems is complex. For example, each Window system object has its own access control list, and the myriad OS-level rights and integrity levels vary by Windows version.  And yet, for Windows environments it is critical that organizations can delegate administration and establish granular privileges quickly and efficiently to restrict administrators so they access only the servers and resources required to perform their job and only during the approved times to perform specific tasks. This white paper explains how Centrify enables IT managers to enforce granular access and privilege controls efficiently without imposing usability burdens on their admins.

    Language: English

    Download the White Paper

  • Windows Least-Privilege Management und darüber hinaus

    Die Entwicklung eines unternehmensweiten Rechtezugriffsschemas für Windows-Systeme ist komplex (zum Beispiel hat jedes Windows-Systemobjekt seine eigene Zugriffskontrollliste und die Vielzahl von Rechten auf Betriebssystemebene und Integritätsstufen unterscheidet sich je nach Windows-Version).

    Language: German

    Download the White Paper



Other Reports

  • Centrify Alliance Partner Referral Program

    The Centrify Alliance Partner Referral Program provides generous rewards in return for referring sales opportunities to Centrify. If you are not a formal Centrify alliance partner, you can participate in the Centrify Referral Program without a contract as long as you like. This program guide explains the program and how to participate.

    Language: English

    Get the Report

  • Centrify Alliance Referral Rewards

    This program guide provides detailed descriptions of the types of referral rewards available to Centrify Alliance partners, plus what you must do to qualify.

    Language: English

    Get the Report

  • Systems Integrators & Consulting Partners Program

    The System Integrator/Consulting category is designed to support organizations that provide advisory, consultation, and delivery of services as their primary business objective. System Integrators (SI) and Consulting Partners can benefit from referral fees for opportunities as well as other incentives based on maintaining Centrify sales and technical certification competencies.

    Language: English

    Get the Report

  • The Centrify Channel Partner Network

    The Centrify Channel Partner Network is a global network of world-class solution providers, including value added resellers, system integrators, managed service partners and distributors. The Program is designed to help partners achieve growth and profit by delivering Unified Identity Services solutions that help your customers strengthen security, meet compliance requirements, reduce IT expenses, and extend and enable the cloud and mobile enterprise. 

    Language: English

    Get the Report



Best Practices Briefs

  • 10 Best Practices for Managing and Securing Apple Devices in the Enterprise

    Many IT organizations have built their management infrastructure through Microsoft tools, but are now seeing a significant influx of Apple computers and mobile devices being used for work. Rather than barring employees from using Apple devices, IT should look for ways to extend their existing management processes to the Apple platform. This protects corporate resources without compromising the user experience. Following are ten best practices allowing workers to use their preferred devices while maintaining strong corporate IT security policies.

    Language: English

    Download the Best Practices Brief

  • Best Practices for Managing Corporate Applications

    As organizations continue to adopt diverse computing platforms, IT administrators struggle to manage and secure the latest devices, apps and usage scenarios. An effective mobile enterprise security strategy should address three elements: user management, device management and app management. Read this best practice brief to understand how to create an integrated approach to enterprise app management.

    Language: English

    Download the Best Practices Brief

  • Maximizing Mac Security Through Modern Enterprise Management

    With all the security features that Apple has already baked into the Mac, it's hard to remember that Macs aren't invincible. Company practices around people, process, and technology can severely compromise the security of a Mac. In this best practices brief, we'll show you these pitfalls and how to get to a truly secure Mac platform.​

    Language: English

    Download the Best Practices Brief

  • Partner Identity Federation

    Secure single sign-on to business applications from partner organizations. Sharing apps with your business partners doesn’t have to be an all-or-nothing proposition. You don’t need the hassles of managing external users in your network, or the concerns of enabling too much access. Get secure integration without the micro-management, with Centrify Identity Service. 

    Language: English

    Download the Best Practices Brief

  • Strengthening App Security with Multi-factor Authentication

    Every web-based application we need to use, whether in the cloud or on-premises, requires an account secured with a username and password. But these “traditional” credentials have become the weakest point of defense, offering individuals and enterprises insufficient protection against cyber attacks, data breaches, and follow-on crimes using stolen identities. Multi-factor authentication (MFA) can help enforce stronger security. Following are some best practices for optimizing MFA to strengthen security for cloud and on-premises apps. 

    Language: English

    Download the Best Practices Brief



Solution Briefs

  • B2C Authentication with Centrify Identity Service

    When your enterprise extends to the Web, you want to make it easy for visitors to sign up for your services. But registering for another service is a hassle for individuals, and managing identity and access is a hassle for most enterprises. Centrify gives customers single sign-on to websites, portals, and SaaS applications, from a single identity platform.

    Language: English

    Download the Solution Brief

  • Centrify Alliance - Complete Cloud Security Centrify + Skyhigh Networks

    Centrify Identity Service integrates with Skyhigh Networks to provide a unified identity platform that enables SaaS application security. By driving the authentication process through Centrify, Skyhigh Networks obtains the necessary information about users, their devices and their location to effectively manage access to and monitor user activity within cloud apps.

    Language: English

    Download the Solution Brief

  • Centrify Alliance - Complete Cloud Security with Centrify + Adallom

    Adallom manages and protects cloud apps across the enterprise. Adallom manages and protects these applications by injecting security policies that provide additional security features, including inside-app visibility, governance and data protection. Centrify improves end-user and IT productivity, while securing access to cloud, mobile, and on-premises apps via single sign-on, multi-factor authentication and provisioning of users and mobile apps.

    Language: English

    Download the Solution Brief

  • Centrify Alliance - Complete Cloud Security with Centrify + Elastica

    The Cloud Access Security Broker (CASB) model is quickly becoming the de facto standard for securing cloud apps across the enterprise. Elastica’s CloudSOC allows organizations to audit and protect their cloud apps. Elastica can create and enforce policies for your cloud services that prevent attacks and ensure corporate governance. Centrify improves end-user and IT productivity, while securing access to cloud, mobile, and on-premises apps via single sign-on, multi-factor authentication and provisioning of users and mobile apps.

    Language: English

    Download the Solution Brief

  • Centrify Alliance - Complete Cloud Security with Centrify + Imperva

    Centrify Identity Service and the Imperva Skyfence Cloud Gateway together provide an integrated approach for ensuring the safe and productive use of cloud apps. From Office 365 to any unsanctioned app, Imperva Skyfence helps organizations monitor and analyze user activity, protect data in motion and at rest, and enforce user access control policies for both unmanaged and managed endpoints.

    Language: English

    Download the Solution Brief

  • Centrify Alliance - Complete Cloud Security with Centrify + Netskope

    Centrify Identity Service integrates with Netskope to provide a unified identity platform that enables SaaS application security. By driving the authentication process through Centrify, Netskope obtains the necessary information about users, their devices and their location to effectively manage access to and monitor user activity within cloud apps.

    Language: English

    Download the Solution Brief

  • Centrify Alliance - Unified Identity for Concur

    The Concur integration with Centrify streamlines setup and administration of user accounts, improves usability with single sign-on across devices, and resolves security exposures. With Centrify, IT can centrally provision new users, create custom access policies, and automatically revoke access when needed. IT spends less time and money deploying and managing Concur and other cloud services. With easy access to Concur from any device, employees are more likely to save on travel expenses and submit their reports on time.

    Language: English

    Download the Solution Brief

  • Unified Identity Management for Box

    Centrify Identity Service provides seamless access to Box and other apps across devices. With Centrify, IT can centrally provision new users and applications, create custom access policies across devices, and automatically revoke access when needed. Directory integration is flexible and secure, while not requiring replication to the cloud.

    Language: English

    Download the Solution Brief

  • Centrify Alliance - Unified Identity Management for CallidusCloud

    CallidusCloud provides the full suite of apps you need to turn LEADS into CASH. CallidusCloud enables its customers to turn more leads into more revenue, more quickly. Time is money. Delays in access and adoption hinder productivity so you need to simplify the job for IT and insure sensitive customer and financial data is secure. This means getting rid of weak user managed passwords, as well as shared passwords. Centrify brings you this security and ease of use without the hassles and costs of password resets, while eliminating separate logins for each app without using passwords.

    Language: English

    Download the Solution Brief

  • Centrify Alliance - Unified Identity Management for Code42

    Code42 protects and gives IT needed visibility into endpoint data — all while letting users work how they want. Centrify streamlines the deployment of CrashPlan, SharePlan and other applications while providing stringent security and access controls. Centrify Identity Service improves end-user productivity and secures access to cloud, mobile, and on-premises apps via single sign-on, user provisioning and multi-factor authentication.

    Language: English

    Download the Solution Brief

  • Centrify Alliance - Unified Identity Management for Dropbox for Business

    Centrify Identity Service improves end-user productivity and secures access to cloud, mobile, and on-premises apps via single sign-on, user provisioning and multi-factor authentication. Centrify can automatically provision your users in to Dropbox for Business based on their role and group within Active Directory or LDAP, and can provision the Dropbox apps across all devices.

    Language: English

    Download the Solution Brief

  • Centrify Alliance - Unified Identity Management for Samanage

    Samanage offers a multi-tenant, unified cloud service desk and asset management platform. Centrify’s secure and unified identity across cloud, mobile and data center improves productivity, user experience and security. Together, Samanage and Centrify enable organizations to reduce IT costs through centralized visibility and automation of tedious tasks, enabling IT to increase service levels and focus more resources on strategic IT initiatives

    Language: English

    Download the Solution Brief

  • Centrify Alliance - Unified Identity Management for Zendesk

    Zendesk provides a cloud-based customer service platform designed to bring organizations and their customers closer together. Centrify Identity Service improves user experience and IT productivity while securing identities across cloud, mobile and data center. Users love faster deployment, single sign-on and seamless access to Zendesk and thousands of apps from all their devices. IT loves automated provisioning of users into Zendesk based on their role and group within Active Directory or LDAP, provisioning of the Zendesk app across devices, and full-featured mobility management.

    Language: English

    Download the Solution Brief

  • Centrify for Google for Work

    Enhance security and simplify management across a broad range of Google for Work products. Google for Work delivers tools businesses rely on — Google Apps, Android, Chromebooks and Google Compute Engine. Centrify for Google for Work secures and simplifies multiple Google for Work products, allowing companies to confidently go Google for work.  

    Language: English

    Download the Solution Brief

  • Centrify for Office 365

    Centrify Identity Service for Office 365 is a Microsoft-validated and Azure-based identity as a service (IDaaS) that offers the industry’s easiest-to-deploy and most comprehensive solution for Active Directory-based user provisioning, single sign-on and mobile management. End-users will love the single sign-on and self-service features. IT will love the automated user provisioning and lifecycle management, unified mobile management, visibility and granular app access control. And Centrify also supports single sign-on to thousands of other cloud-based applications.

    Language: English

    Download the Solution Brief

  • Centrify for Office 365 - Portuguese

    Centrify Identity Service para Office 365 é uma identidade baseada na plataforma Azure e validada pela Microsoft como serviço (IDaaS) que oferece a solução mais fácil de implantar e mais abrangente do setor para o provisionamento de usuário baseado em Active Directory, logon único e gerenciamento móvel.

    Language: Portuguese

    Download the Solution Brief

  • Centrify for Office 365 - Spanish

    Centrify Identity Service para Office 365 es una solución de Identidad como Servicio (Identity as a Service o IDaaS) validada por Microsoft y basada en Azure. Es la más exhaustiva de la industria y la más fácil de implementar para provisión de datos para el usuario basada en directorio activo, inicio de sesión única (SSO, por su sigla en inglés) y gestión de tecnología móvil.

    Language: Spanish

    Download the Solution Brief

  • Centrify for Red Hat

    Advanced Red Hat Enterprise Linux to Active Directory Integration, Group Policy Enforcement, Privilege Management and Audit

    Language: English

    Download the Solution Brief

  • Centrify Solution for CDM and CMaaS

    Centrify Server Suite addresses critical requirements within Phase 2 of the CDM Program as defined by the Department
    of Homeland Security:
    • Network Access Controls (NAC)
    • Manage Credentials and Authentication (MCA)
    • Manage Account Access (MAA)

    Language: English

    Download the Solution Brief

  • Eight Great Reasons to Use Centrify with Office 365

    We’re bringing you eight great reasons to use Centrify with Office 365. Centrify Identity Service is an Identity-asa-Service (IDaaS) solution that federates user identity from Active Directory, LDAP directories, or the Centrify Cloud Directory. By federating identity from a central directory, you can give your users single sign-on to Office 365, while making the rollout much simpler for your IT department. Centrify also manages access to thousands of other Software as a Service (SaaS) applications from any device.

    Language: English

    Download the Solution Brief

  • Five Simple Steps to Securing Your Corporate Identities

    Identity Challenges in Today’s Cloud and Mobile World: The days of on-site servers running local applications that could only be accessed via on-site PCs are over. An ever-increasing number of cloud apps are now available to consumers and businesspeople, and all it takes to adopt these new services is a browser and simple registration. In today’s cloud and mobile world, there’s no way IT can enforce a secure a perimeter around business data.

    Language: English

    Download the Solution Brief

  • Cinq étapes simples pour sécuriser les identités numériques au sein de votre entreprise

    Un nombre toujours plus grand d’applications émanant du Cloud sont désormais à la disposition des consommateurs et des chefs d’entreprises, et tout ce qui est nécessaire pour profiter de ces services est un simple navigateur et une inscription. Dans le monde du Cloud et de la mobilité d’aujourd’hui, il est impossible que l’informatique puisse appliquer un périmètre de sécurité pour des données commerciales.



    Language: French

    Download the Solution Brief

  • Fünf einfache Schritte zur Sicherung Ihrer Corporate Identities

    Konsumenten und Geschäftsleuten steht heutzutage eine immer größere Auswahl an Cloud-Apps zur Verfügung, zu deren Nutzung es nicht mehr als einem Browser und einer einfachen Registrierung bedarf. In der heutigen Welt von Clouds und mobilen Geräten ist es aus informationstechnologischer Sicht daher schlicht nicht möglich, kommerzielle Daten sicher abzugrenzen.

    Language: German

    Download the Solution Brief

  • Cinque Semplici Passaggi per Proteggere i vostri Account Aziendali

    Oggigiorno sono disponibili sempre più applicazioni cloud per i consumatori e i professionisti del business, e per adottare questi nuovi servizi sono necessari soltanto un browser e una semplice procedura di registrazione. Nel mondo attuale basato su cloud e dispositivi mobili, la IT non ha modo di delineare un perimetro di sicurezza attorno ai dati aziendali.

     

    Language: Italian

    Download the Solution Brief

  • Identity and Access Management for Cloudera

    The Centrify Server Suite solution for Cloudera Enterprise is an enterprise-class offering that makes securing even the most complex Cloudera environments simple and straightforward by connecting your enterprise data hub to your existing Active Directory infrastructure. The result is enterprise-wide authentication, access control, privilege management, auditing and secure machine-to-machine communications which includes your Cloudera clusters, nodes and services.

    Language: English

    Download the Solution Brief

  • Identity and Access Management for Couchbase

    The Centrify Server Suite solution for Couchbase Server is an enterprise-class offering that makes securing even the most complex multi-cluster Couchbase environments simple and straightforward by connecting your Couchbase nodes to your existing Active Directory infrastructure. The result is enterprise-wide authentication, access control, privilege management and auditing your Couchbase clusters & nodes.

    Language: English

    Download the Solution Brief

  • Identity and Access Management for DataStax

    The Centrify Server Suite solution for DataStax Enterprise is an enterprise-class offering that makes securing even the most complex multi-cluster DataStax environments simple and straightforward by connecting your DataStax nodes to your existing Active Directory infrastructure. The result is enterprise-wide authentication, access control, privilege management and auditing your DataStax clusters & nodes.

    Language: English

    Download the Solution Brief

  • Identity and Access Management for Hortonworks

    The Centrify Server Suite solution for Hortonworks Data Platform is an enterprise-class offering that makes securing even the most complex Hortonworks environments simple and straightforward by connecting your Hortonworks Data Platform to your existing Active Directory infrastructure. The result is enterprise-wide authentication, access control, privilege management, auditing and secure machine-to-machine communications which includes your Hortonworks clusters, nodes and services.

    Language: English

    Download the Solution Brief

  • Identity and Access Management for MapR

    The Centrify Server Suite solution for MapR is an enterprise-class offering that makes securing even the most complex MapR environments simple and straightforward by connecting your MapR Distribution including Apache Hadoop to your existing Active Directory infrastructure. The result is enterprise-wide authentication, access control, privilege management, auditing and secure machine-to-machine communications which includes your MapR clusters, nodes and services.

    Language: English

    Download the Solution Brief

  • Identity and Access Management for MongoDB

    The Centrify Server Suite solution for MongoDB Enterprise is an enterprise-class offering that makes securing even the most complex multi-cluster MongoDB environments simple and straightforward by connecting your MongoDB nodes to your existing Active Directory infrastructure. The result is enterprise-wide authentication, access control, privilege management and auditing your MongoDB clusters & nodes.

    Language: English

    Download the Solution Brief

  • Identity Services Automation for ServiceNow

    Identity meets Enterprise Service Management. End-users are seeking modern ways to interact with IT and other shared services groups across their organization. They look for self help — where they can get secure access to apps, manage their own passwords, search for known apps or servers, request access to services that they need. IT-users need to automate tasks like account provisioning and password resets, and manage privileged access to on-premises and cloud-based infrastructure. Centrify’s identity management integrations with ServiceNow help automate processes, improve visibility, and provide a better experience for ServiceNow end-users and privileged IT-users.

    Language: English

    Download the Solution Brief

  • If You Manage Identity for App Access, You Must Manage Mobile

    In this Solution Brief, we review each of these technology areas, device type, security posture, usage, as well as user identity and app access policy, and then examine how organizations can benefit when identity is cleanly integrated across these two solutions.

    Language: English

    Download the Solution Brief

  • If You Manage Identity for App Access, You Must Manage Mobile - Portuguese

    Vamos examinar cada uma dessas áreas de tecnologia e depois examinar como as organizações podem se beneficiar quando a identidade é integrada entre essas duas soluções.

    Language: Portuguese

    Download the Solution Brief

  • If You Manage Identity for App Access, You Must Manage Mobile - Spanish

    Analicemos cada una de estas áreas de la tecnología y, a continuación, examinemos qué beneficio pueden obtener las organizaciones cuando la identidad se integra sin complicaciones con estas dos soluciones.

    Language: Spanish

    Download the Solution Brief

  • On-Premises App Gateway

    As organizations transition some of their key functions into the cloud, other applications remain hosted on servers on-premises. Concerns over security, application readiness, and return on investment are some of the reasons why CIOs want to keep some applications in-house. At the same time, end users want to access the applications they need, from any device and any location. Thus, IT must expand its security perimeter both directions—out to the cloud, and back into their data centers. Traditionally, IT has managed remote access with virtual private networks (VPNs). Now, Centrify offers an alternative to VPNs.

    Language: English

    Download the Solution Brief

  • Protect PCI Data from Domain Admins

    You're handed a mandate from management - restrict access to the PCI and SOX servers in order pass to the upcoming audit. On Windows Servers, there's a problem. Every member of the Domain Admin group has access to the PCI and SOX servers – access that they shouldn’t have. How do you solve the problem and restrict access by your domain administrators to those servers? This document answers this question.

    Language: English

    Download the Solution Brief

  • Proteja dados de servidores PCI dos Domain Admins

    Você recebeu uma ordem do seu gerente – restringir acesso aos servidores PCI e SOX para que a empresa passe na próxima auditoria. Para servidores Windows, isso é um problema. Todos os membros do grupo Domain Admins possuem acesso aos servidores PCI e SOX – algo que não deveriam ter. Como você consegue resolver o problema de restringir acesso dos administradores de domínio a esses servidores?

    Language: Portuguese

    Download the Solution Brief

  • Secure Management of Windows Services

    In today’s heterogeneous IT environments, administrative identities are growing at an uncontrolled rate. Server environments continue to expand in both scale and diversity as physical and virtualized servers are spun up on-premise and in the cloud. Add to this the plethora of devices that connect users to an increasing number of corporate and line-of-business applications, and it’s easy to see why it’s increasingly difficult to maintain control over and visibility into insiders and all of their privileges.

    Language: English

    Download the Solution Brief

  • Gestão segura de serviços Windows

    Nos ambientes heterogêneos de TI de hoje em dia, o número de identidades administrativas está crescendo em um ritmo descontrolado. O número de servidores continua a crescer em número e diversidade e servidores físicos e virtuais são facilmente criados on-premise ou na nuvem. Adicione isso a infinidade de dispositivos que os usuários utilizam para se conectar a aplicações de negócios, que fica fácil enxergar porquê é cada vez mais difícil manter o controle e visibilidade sobre usuários privilegiados e seus privilégios.

    Language: Portuguese

    Download the Solution Brief

  • Seven Reasons to Use Centrify with Google for Work

    Centrify enables companies to confidently adopt mobile, cloud apps and cloud infrastructure from Google, by adding a critical layer of security and management based on identity — of the device and user.  

    Language: English

    Download the Solution Brief

  • Shared Accounts with Accountability

    IT organizations are required to create user accounts in Active Directory and share both the account name and its password with multiple users. Unfortunately, shared user accounts in Active Directory are hard to manage and difficult-to- impossible to secure using traditional privileged account management (PAM) technologies. This solution brief illustrates how Centrify Server Suite enables IT organizations to create and deploy shared user accounts safely and with guaranteed accountability that actions are associated with the correct end user.

    Language: English

    Download the Solution Brief

  • Top 10 Things to Consider Before Implementing Office 365

    Call it what you want — consumerization, the democratization of IT, the maturation of cloud — but the fact is that both endpoint resources and IT infrastructure are moving outside of the traditional business network. Bring Your Own Device led to Bring Your Own App, driven largely by the first round of file sharing apps that consumers brought into business. But the current focus of cloud migration has moved more squarely into the center of IT responsibility, with email moving from on-premises to cloud infrastructure. The best example of this trend — across verticals, across business size, and across geographies — is Microsoft Office 365.

    Language: English

    Download the Solution Brief



Policy Guides

Analyst Reports


  • Enterprise Management Associates: Three Important Reasons for Privileged Identity Management (and One Surprising Benefit)

    In this report Enterprise Management Associates (EMA) analysts explore the ways in which gaining visibility and control over high-privilege access helps organizations achieve regulatory compliance, assure responsible governance, and improve security all while reducing IT operational costs. The characteristics of an effective privileged access management solution are examined, along with evidence from EMA research that supports the values of a more consistent approach to operational IT control.

    Language: English

    Get the Report

  • Enterprise Management Associates: Trois bonnes raisons pour une gestion de l’identité des comptes privilégiés (et un avantage étonnant)

    L'accès des comptes à privilèges est l'un des aspects les plus sensibles en informatique. Les comptes administrateurs ont la capacité de réaliser des changements radicaux et fondamentaux dans les systèmes informatiques dont dépendent les sociétés. Lorsqu’utilisés de manière frauduleuse, leur impact peut causer de vastes dégâts allant du non-respect des conformités donnant droit à des amendes, en passant par des incidents de sécurité causant une perte de confiance dans la marque et une perte de revenus.

    Language: French

    Get the Report

  • Enterprise Management Associates: Drei wichtige Gründe für privilegiertes Identitätsmanagement (und ein überraschender Vorteil)

    In diesem Bericht untersuchen Analysten von ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) die Arten, durch die die Transparenz von und Kontrolle der Privilegien Unternehmen nicht nur beim Erreichen dieser Ziele hilft, sondern auch noch einen Vorteil bietet, dessen sich viele nicht bewusst sind: Eine verbesserte IT-Zuverlässigkeit, die die Betriebskosten senken kann. Diese Schrift untersucht die Charakteristika einer effektiven Lösung und bietet auch den durch die EMA-Untersuchungen erbrachten Nachweis, der den Wert eines konsistenteren Ansatzes in Bezug auf die operative Steuerung durch IT stützt.

    Language: German

    Get the Report

  • Enterprise Strategy Group: Large Organizations Need a Unified Approach to IAM

    For the most part, IAM is considered a set of IT operations tasks associated with a specific business unit or application. Executives realize that identity management is important but they delegate the details to others. This laissez faire attitude is understandable but ESG believes it is about to change in a big way. IAM will evolve from an IT administrator to executive management issue over the next few years.

    Language: English

    Get the Report

  • Forrester: Centrify Cited as a Strong Performer in Privileged Identity Management Wave Report

    In the Forrester Research, Inc., Feb. 3 report, “The Forrester Wave™: Privileged Identity Management, Q1 2014”, analysts evaluated nine vendors based on 18 key criteria, including current offering, strategy and market presence. Centrify Server Suite was the only solution to earn the highest possible score for its Active Directory Bridge and tied for the highest scores in privileged session spawning, privileged session recording, and privilege escalation. Centrify also earned the highest possible score for customer satisfaction.

    Language: English

    Get the Report

  • Forrester: Centrify is the top vendor for strategy in the 2015 Forrester Wave for Cloud Identity and Access Management

    In Forrester’s 17-criteria evaluation of B2E cloud identity and access management (IAM) vendors, they identified the nine most significant SaaS providers in the category and researched, analyzed, and scored them. This report details the findings about how well each vendor fulfills their criteria and where they stand in relation to each other to help security and risk (S&R) professionals select the right partner for their B2E cloud IAM, also known as identity-as-a-service (IDaaS), needs.

    Language: English

    Get the Report

  • Forrester: The Fifteen Most Important Questions to Ask Your Cloud IAM Provider

    This report by Forrester analyst Andras Cser helps IT managers understand the right questions to ask any potential IAM vendor in order to meet all necessary feature and workflow requirements for a successful cloud IAM project.

    Language: English

    Get the Report

  • Gartner: Best Practices for PIM in the Modern Enterprise

    In this newsletter, Gartner highlights the huge risks to the business when both individual and privileged accounts are compromised and abused. The cornerstone of the newsletter is a recently released Gartner paper covering the best practices for mitigating these risks. Gartner advocates the use of specialized tools to govern privileges and enforce access controls, outlining 12 best practices that dovetail well with Centrify's approach to protecting enterprise identities against cyberthreats.

    Language: English

    Get the Report

  • Gartner: Centrify Positioned as a Visionary in the 2015 Gartner Magic Quadrant for Identity and Access Management as a Service

    This Magic Quadrant rates vendors on their abilities to be global, general purpose identity and access management service providers for multiple use cases, providing some level of functionality in all of the following: identity governance and administration, access (user authentication, single sign-on and authorization enforcement) and intelligence (logging and reporting activity).  A top vendor in the IDaaS market, Centrify was named a Visionary in this year's Gartner Magic Quadrant.

    Language: English

    Get the Report

  • IDC: Centrify Private Vendor Watchlist Profile: Bridging Linux/Mac/Mobile Platforms for Increased Security and Managed Access Control via Microsoft AD

    In this vendor profile, IDC's Sally Hudson concludes that Centrify is a company to watch because of its "established, proven record of accomplishment" in the IAM space. Hudson notes that "Centrify's ability to grow out and expand its product line to meet the emerging needs of the customer has been insightful and impressive. Centrify has successfully identified existing and emerging customer pain points, such as management, audit, and PIM, and focused on delivering appropriate solutions."

    Language: English

    Get the Report

  • KuppingerCole: Centrify for Big Data

    Organizations using Big Data need to remain compliant with a wide range of laws and regulations. An information centric approach to big data is needed to ensure: availability, integrity and confidentiality; and, this can only be achieved with appropriate identity and access management for the big data technologies. 

    Language: English

    Get the Report

  • KuppingerCole: Centrify Identity Service

    Centrify positions its Identity Service as “Unified Identity Management” for Cloud and Mobile. This approach is still rather unique, despite the fact that there has been a recent announcement by another vendor also providing integrated capabilities, and with others being expected to follow this strategy. However, Centrify is well-positioned due to its longer history and the strong integration already available, including the support for the leading-edge Samsung KNOX platform.

    Language: English

    Get the Report

  • KuppingerCole: Centrify Server Suite

    Whether the target of using Centrify Server Suite is improving Privilege Management or just optimizing the user management of Linux and UNIX environments or providing Single Sign-on to a number of environments: There are a number of use cases where the suite can provide significant benefit.

    Language: English

    Get the Report

  • KuppingerCole: Centrify Server Suite

    Whether the target of using Centrify Server Suite is improving Privilege Management or just optimizing the user management of Linux and UNIX environments or providing Single Sign-On to a number of environments: There are a number of use cases where the suite can provide significant benefit.

    Language: German

    Get the Report

  • Sarrel Group: Speeding Office 365 Implementation Using Identity-as-a-Service

    Office 365 is one of the fastest growing cloud apps, yet implementation using Microsoft's tools is not trouble-free. There are many benefits of using identity-as-a-service (IDaaS) to implement Office 365 including the ability to provision users, manage multiple directories, manage multiple passwords, mobile devices, and licenses, and track and report on usage. Read this paper from Sarrel Group to understand how to evaluate IDaaS for your organization's Office 365 implementation.

    Language: English

    Get the Report

Case Studies


  • Apttus

    Centrify has aided the Apttus IT team in saving time and reducing costs. The authentication process has been simplified for users via single sign-on, eliminating a significant percentage of help desk requests. IT activities have been reduced by bringing identity management under one centralized solution, taking significant pressure off the team.

    Language: English

    Download Case Study

  • Canadian Automobile Association Saskatchewan (CAA)

    Since implementing Centrify Identity Service, CAA Saskatchewan has logged significant cost savings through reduced user licensing fees, help-desk calls and internal development costs as well as multi-device support, increased security, and the ability to incorporate new, productivity enhancing technologies.

    Language: English

    Download Case Study

  • Dynatrace Case Study

    Dynatrace Streamlines Mass Migration to the Cloud with Centrify Identity Service. Centrify helped Dynatrace rapidly onboard 2,000 employees using a cloud-first approach. Centrify provided single sign-on access for Office 365 and an array of critical software applications across desktop and mobile devices.

    Language: English

    Download Case Study

  • Early Learning Coalition Case Study

    Early Learning Coalition evaluated several SSO and EMM providers and found the Centrify solution met their needs across both areas, also delivering multi-factor authentication for remote users. Centrify was selected as a three-products-in-one solution.

    Language: English

    Download Case Study

  • Essendon Volkswagen

    Since Centrify was deployed at Essendon Volkswagen, the company’s employees have only needed to remember a single personal password. As a result, security standards have improved.

    Language: English

    Download Case Study

  • FastMed Urgent Care

    Through Centrify, more than 1,000 FastMed users securely access over 200 apps, websites and cloud services every day — virtually every resource required across the organization — saving a potential thousands of dollars on reduced help desk calls.

    Language: English

    Download Case Study

  • Interval International Case Study

    Interval International leverages Centrify’s zone technology to easily Implement least privilege management. Large integration projects and outsourced app development required granular management of privilege. Centrify’s patented Zone technology provides least-access and least-privilege security models for easy implementation across diverse users, systems and roles. 

    Language: English

    Download Case Study

  • Lithium Technologies Case Study

    Centrify Identity Service for Mac helped Lithium Technologies come into compliance with ISO 27001 and SSAE 16 SOC 2 and reduced help desk calls for password resets by 80%, saving approximately $128,000 annually.

    Language: English

    Download Case Study

  • Morehouse College

    Centrify is helping to decrease the cost of deploying and managing Office 365 and other cloud apps while at the same time improving user adoption and productivity. As a result, a strategic risk mitigation program has emerged with minimal impact on IT.

    Language: English

    Download Case Study

  • Morris Communications, Inc.

    Implementing Centrify Identity Service resulted in simplified user provisioning, significant savings in Box licensing costs and reduced help desk password resets. Identity federation services for Office 365 saved thousands of dollars in AD FS hardware and administrator costs.

    Language: English

    Download Case Study

  • National Weather Service, Southern Region

    With Centrify Server Suite, HSPD-12 requirements are met with ease and CAC smart cards are now used across the agency’s Windows, Linux and Mac systems. Day-one support for new OS releases and automated identity management together now save the agency tens of thousands of dollars a year.

    Language: English

    Download Case Study

  • Nine Network Case Study

    At Nine Network, Australia, Centrify has enabled a secure Mac expansion, simplified password management and cut password reset support calls by 50%. Today, the company’s 150 Macs are managed by just two people.

    Language: English

    Download Case Study

  • Nine Network Customer Spotlight

    Nine Network, one of the two largest broadcasters in Australia, chose Centrify Identity Service, Mac Edition to securely manage Mac user identity, with the ability to access both broadcast and corporate IT networks with a single login through Active Directory. This insured that the 2012 expansion of Nine Network’s broadcast editing environment could be based on the Mac platform rather than Windows, affording better options for production and post-production software.

    Language: English

    Download Case Study

  • Ouachita Parish School District

    Rapid implementation of Centrify Identity Service has provided faculty and staff with SSO across an unlimited number of apps, with a fraction of the servers require for the ADFS solution and no additional IT resources.

    Language: English

    Download Case Study

  • SBA Communications Corporation

    Centrify Identity Service saved SBA an estimated $50,000 a year in AD FS costs and negated the need for a separate MDM solution. Low maintenance requirements have freed up IT staff. Compliance with SOX regulations have been reinforced.

    Language: English

    Download Case Study

  • Simply Healthcare Case Study

    Simply Healthcare selected Centrify Identity Service to automate the company’s move to Office 365, provide single sign-on access and authentication for all cloud apps and to give IT centralized access control and visibility. Auditors can see who logged in to which apps, when they logged in and for how long — in support of HIPAA compliance and forensics efforts.

    Language: English

    Download Case Study

  • Snowy Hydro, Ltd.

    Implementing Centrify Identity Service for centralized management of mobile devices means field employees are accessible 24/7 to deal with issues as they arise – even when climbing a utility pole in a remote location. IT ensures user access to all mobile critical apps from any location. 

    Language: English

    Download Case Study

  • SulAmérica Case Study

    Founded in 1895, SulAmérica is one of the largest insurance companies in Brazil with more than seven million customers. The company provides life, health, auto and home insurance services through a broad network of more than 30,000 brokers, joint ventures and strategic alliances.

    Language: English

    Download Case Study

  • SulAmérica Case Study

    Fundada em 1895, a SulAmérica é uma das maiores empresas seguradoras do Brasil, com mais de sete milhões de clientes. A empresa oferece seguros de vida, saúde, carros e residências através de uma ampla rede com mais de sete milhões de corretores, joint ventures e alianças estratégicas.

    Language: Portuguese

    Download Case Study

  • SulAmérica Case Study

    Fundada en 1895, SulAmérica es una de las aseguradoras más importantes de Brasil, con más de siete millones de clientes. La empresa presta servicios de seguros de vida, médico, de automóviles y de vivienda a través de una amplia red de más de siete millones de corredores, empresa de riesgo compartido y alianzas estratégicas.

    .

    Language: Spanish

    Download Case Study

  • The Citizens Bank of Philadelphia Case Study

    Citizens Bank of Philadelphia meets GLBA compliance using Centrify Identity Service for secure single-sign, multi-factor authentication and for federation of Office 365

    Language: English

    Download Case Study

  • University of Southern California

    USC’s School of Engineering now uses University Central Active Directory to create a trust environment for the entire department. An SSO solution automatically grants permissions and access to individuals based on course enrollment, without having to manage user accounts, log-in credentials or passwords. Each student uses their primary USC log-in to gain access to the computing resources they need.

    Language: English

    Download Case Study

Datasheets


Centrify Products

  • Centrify Corporate Overview

    The Centrify Identity Platform protects against the leading point of attack used in data breaches — compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts. Trusted by more than 5,000 customers, including half of the Fortune 50, Centrify secures identities across hybrid, cloud, mobile and on-premises IT environments.

    Language: English

    Download the Datasheet

  • Centrify Corporate Overview A4

    The Centrify Identity Platform protects against the leading point of attack used in data breaches — compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts. Trusted by more than 5,000 customers, including half of the Fortune 50, Centrify secures identities across hybrid, cloud, mobile and on-premises IT environments.

    Language: English

    Download the Datasheet

  • Centrify for Google Apps Datasheet

    Google Apps, one of the fastest growing email and collaboration solutions in the enterprise, represents another suite of SaaS and mobile apps for user access and a new silo of user identity that needs to be provisioned, managed and controlled by an IT staff that is already spread thin managing an ever-growing set of on-prem, cloud and mobile apps.

    Language: English

    Download the Datasheet

  • Centrify Identity Platform Datasheet

    Centrify secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.  Centrify delivers stronger security, continuous compliance and enhanced user productivity through single sign-on, multi-factor authentication, mobile and Mac management, privileged access security and session monitoring.  

    Language: English

    Download the Datasheet

  • Centrify Identity Service

    Cloud and mobile are here to stay. Cloud and mobile apps are quickly forcing their way into the enterprise, facilitating employee productivity, but exposing business-critical data. Cloud apps, and the mobile devices that can access app data, are often outside of IT control

    Language: English

    Download the Datasheet

  • Centrify Identity Service - A4

    This is A4 for printing in EMEA.

    Cloud and mobile are here to stay. Cloud and mobile apps are quickly forcing their way into the enterprise, facilitating employee productivity, but exposing business-critical data. Cloud apps, and the mobile devices that can access app data, are often outside of IT control.

    Language: English

    Download the Datasheet

  • Centrify Identity Service

    Identité unifiée et gestion mobile en vue d’éliminer les mots de passe multiples et de faire respecter la politique de sécurité sur les appareils et les applications. Des centaines d’applications mobiles et cloud s’insinuent rapidement au sein de l’entreprise, facilitant la productivité des employés, mais exposant des données critiques aux affaires. Alors que les données circulent de plus en plus dans le cloud, il est également possible d’y avoir accès et de les stocker sur des terminaux mobiles qui se trouvent hors du périmètre de contrôle du service informatique.

    Language: French

    Download the Datasheet

  • Centrify Identity Service

    Hunderte von Cloud- und Mobile-Apps bahnen sich immer schneller ihren Weg in Unternehmen, steigern einerseits die Produktivität der Mitarbeiter, gefährden andererseits geschäftskritische Daten. Da immer mehr Daten in die Cloud gelangen, sind das Speichern und der Zugriff auf diese Daten auch über Mobilgeräte möglich, die von der IT nicht kontrolliert werden können.

    Language: German

    Download the Datasheet

  • Centrify Identity Service

    Centinaia di applicazioni cloud e per i dispositivi mobilisi stanno prepotentemente facendo strada nelle aziende, facilitando la produttività dei dipendenti, ma mostrando dati di importanza critica per il business. Poiché i dati si muovono sempre più verso il cloud, essi vengono consultati e archiviati anche tramite dispositivi mobili al di fuori del controllo IT.

    Language: Italian

    Download the Datasheet

  • Centrify Identity Service

    これからは、クラウドとモバイルの時代

    クラウドとモバイルのアプリは、急速に企業に浸透し、社員の生産性向上に寄与していますが、ビジネスに不可欠なデータが危険にさらされています。 クラウド アプリも、アプリ データにサクセスできるモバイル デバイスも、IT 管理が及ばないことがよくあります。 

    Language: Japanese

    Download the Datasheet

  • Centrify Identity Service

    Nuvem e mobilidade chegaram para ficar. Os aplicativos móveis e de nuvem estão chegando rapidamente às organizações e facilitando a produtividade dos funcionários, mas também estão expondo dados importantes das empresas. Os aplicativos de nuvem e os dispositivos móveis que podem acessar dados de aplicativos são frequentemente usados sem o controle de TI.

    Language: Portuguese

    Download the Datasheet

  • Centrify Identity Service

    La nube y los dispositivos móviles llegaron para quedarse. Las aplicaciones móviles y en la nube están abriéndose paso rápidamente en la empresa para facilitar la productividad de los empleados, pero dejan expuestos datos críticos para los negocios. Las aplicaciones en la nube, y los dispositivos móviles con acceso a los datos de las aplicaciones, suelen estar más allá del control de TI.

    Language: Spanish

    Download the Datasheet

  • Centrify Identity Service

    Birleştirilmiş kimlik ve mobil yönetim ile çoklu parolaların ortadan kaldırılması, uygulama ve cihaz politikalarının uygulanması. Yüzlerce bulut ve mobil uygulama hızlı bir şekilde kendilerini şirketin içine yerleştirerek çalışan üretkenliğini arttırıyor, ancak bir yandan da iş için kritik olan verileri ortaya döküyor. Veriler gittikçe artan bir şekilde buluta doğru taşınırken, aynı zamanda IT kontrolü dışında olan mobil cihazlarla erişiliyor ve bu cihazlarda depolanıyor.

    Language: Turkish

    Download the Datasheet

  • Centrify Identity Service, Enterprise Mobility Management

    Centrify Identity Service offers an easy-to-deploy, cloud-based service that enables centralized and secure mobile device management using existing directory service infrastructure. It provides single sign-on to cloud, on-premises and mobile apps on from mobile devices, as well as multi-factor authentication. Centrify uses cloud policy, or familiar Active Directory Group Policy to manage devices, and enforce app policies over a secure, cloud connection. Centrify Identity Service gives mobile users single sign on to cloud, mobile and custom apps, while enabling device-aware policy to meet IT security needs.

    Language: English

    Download the Datasheet

  • Centrify Identity Service, Enterprise Mobility Management

    Centrify Identity Service では、既存のディレクトリ サービス インフラストラクチャーを使用した集中管理型の安全 なモバイル デバイス管理を可能にする、導入しやすいクラウドベース サービスをご提供します。モバイル デバイス からのクラウド、オンプレミスおよびモバイル アプリへのシングル サインオンとともに、多要素認証も利用可能です。 Centrify は、クラウド ポリシー、または使い慣れた Active Directory グループを使用して、デバイスを管理し、アプリ のポリシー管理を行うことでセキュアなクラウド利用を実現します。Centrify Identity Service では、クラウド、モバイ ルおよびカスタム アプリへのシングル サインオンがモバイル ユーザに提供されるとともに、IT組織のセキュリティ 基準に準拠させるデバイス対応ポリシーも適用可能です。

    Language: Japanese

    Download the Datasheet

  • Centrify Identity Service, Enterprise Mobility Management

    Centrify Identity Service ofrece un servicio en la nube de fácil implementación que permite la gestión centralizada y segura de los dispositivos móviles, usando la infraestructura del servicio de directorio existente. Brinda un inicio de sesión única en la nube, acceso desde los dispositivos móviles a aplicaciones alojadas en el sitio y móviles, al igual que autenticación de múltiples factores. 

    Language: Portuguese

    Download the Datasheet

  • Centrify Identity Service, Enterprise Mobility Management

    Centrify Identity Service ofrece un servicio en la nube de fácil implementación que permite la gestión centralizada y segura de los dispositivos móviles, usando la infraestructura del servicio de directorio existente. Brinda un inicio de sesión única en la nube, acceso desde los dispositivos móviles a aplicaciones alojadas en el sitio y móviles, al igual que autenticación de múltiples factores. 

    Language: Spanish

    Download the Datasheet

  • Centrify Identity Service, Mac Edition

    Active Directory-Based Security and Management for Mac and Mobile Devices

    Apple Mac desktops and laptops are increasingly being utilized in today’s workplaces. Employees are bringing their own Macs to work and many organizations are choosing to deploy Macs to their users. Yet managing Macs and securing access to corporate networks and data can be challenging — especially for organizations that rely on Microsoft management solutions.

    Language: English

    Download the Datasheet

  • Centrify Identity Service, Mac Edition

    Segurança baseada em Active Directory e gerenciamento para Mac e dispositivos móveis. Laptops e desktops Apple Mac cada vez mais estão sendo utilizados nos locais de trabalho atualmente. Os funcionários estão trazendo seus próprios Macs para trabalhar e muitas organizações estão optando por implantar Macs para seus usuários.

    Language: Portuguese

    Download the Datasheet

  • Centrify Identity Service, Mac Edition

    En la actualidad, es cada vez mayor la incorporación de las computadoras de escritorio y portátiles de Apple Mac en los ámbitos laborales. Los empleados llevan sus propias Mac al trabajo y muchas organizaciones eligen la implementación de dispositivos Mac para sus usuarios. No obstante, la gestión de las Mac y su uso para un acceso seguro a las redes y datos de naturaleza corporativa puede plantear un desafío, en especial para las organizaciones que recurren a las soluciones de gestión de Microsoft.

    Language: Spanish

    Download the Datasheet

  • Centrify Identity Service, Mac Smart Card Edition

    Centrify Identity Service, Mac Smart Card Edition enables IT administrators to manage and secure Mac OS X systems using existing tools and processes so that Macs become a security peer to Windows systems. Centrify extends its proven Centrify for Mac solution with support for the most commonly used smart card systems.

    Language: English

    Download the Datasheet

  • Centrify Identity Service, Mac Smart Card Edition

    Mac OS X  Avançado para a integração do Active Directory, Aplicação de Política de Grupo e CAC, CAC NG e Suporte de Smart Card PIV. O Centrify Identity Service, Mac Smart Card Edition permite que os administradores de TI gerenciem e protejam os sistemas Mac OS X usando ferramentas e processos existentes para que os Mac se tornem um ponto de segurança para sistemas Windows. 

    Language: Portuguese

    Download the Datasheet

  • Centrify Identity Service, Mac Smart Card Edition

    La Edición para tarjetas inteligentes Mac de Centrify Identity Service les permite a los administradores de TI gestionar y asegurar los sistemas Mac OS X con las herramientas y procesos existentes, a fin de que las Mac funcionen como un elemento de seguridad que trabaja a la par de los sistemas Windows. Centrify extiende su reconocida solución Centrify para Mac y brinda soporte para los sistemas para tarjetas inteligentes de uso más común. 

    Language: Spanish

    Download the Datasheet

  • Centrify Identity Service for Mac and Apps

    Secure and Manage Macs, Mobile Devices and Cloud Apps. Macs, mobile devices and cloud apps have made their way into the enterprise. While they facilitate greater employee productivity, they also expose business-critical data to increased risk. IT organizations need to reduce the risk of Macs, mobile devices and cloud apps by implementing consistent, centrally-managed policies across all endpoints and cloud apps. 

    Language: English

    Download the Datasheet

  • Centrify Privilege Service

    IT organizations are increasingly required to manage hybrid deployments that combine cloud-based and data center infrastructure. IT admins, both internal and outsourced, need to login from inside and outside of the corporate perimeter. In order to meet these challenges, IT organizations that share privileged accounts need a password and access management solution built for the modern enterprise to increase security, simplify compliance and control remote access to servers and network equipment.

    Language: English

    Download the Datasheet

  • Centrify Privilege Service - A4

    This is A4 for printing in EMEA.

    Centrify Privilege Service is a cloud-based password and access management solution. Privilege Service combines shared account password management with the ability to securely manage and audit access by internal and outsourced IT. The net result is increased security when sharing privileged accounts, simplified compliance, and secure remote access to on-premises and cloud-based infrastructure.

    Language: English

    Download the Datasheet

  • Centrify Privilege Service Datasheet - A4 - German

    IT-Organisationen müssen sich zunehmend mit dem Management von Hybrid-Lösungen auseinandersetzen die Infrastrukturen auf Cloud-Basis und interne Rechenzentren miteinander verbinden. IT-Administratoren, sowohl interne, als auch externe, müssen sich von innerhalb und außerhalb des Unternehmens einwählen können. Um diesen Anforderungen gerecht zu werden, benötigen IT-Organisationen mit privilegierten Konten eine Lösung zum Verwalten der Passwörter und Zugänge, welche modernen Unternehmensbedingungen gerecht wird, die Sicherheit erhöht, die Überwachung vereinfacht und den Remote-Zugriff auf Server und Netzwerkgeräte kontrolliert.

    Language: German

    Download the Datasheet

  • Centrify Privilege Service

    Les entreprises informatiques sont de plus en plus appelées à gérer des déploiements hybrides combinant une infrastructure basée sur le Cloud et un centre de données. Les administrateurs informatiques, qu'ils soient en interne ou qu'ils soient externalisés, ont besoin d'identifiants de connexion pour se connecter en dehors ou au sein du cadre corporatif.

    Language: French

    Download the Datasheet

  • Centrify Privilege Service

    IT-Organisationen müssen sich zunehmend mit dem Management von Hybrid-Lösungen auseinandersetzen die Infrastrukturen auf Cloud-Basis und interne Rechenzentren miteinander verbinden. IT-Administratoren, sowohl interne, als auch externe, müssen sich von innerhalb und außerhalb des Unternehmens einwählen können. Um diesen Anforderungen gerecht zu werden, benötigen IT-Organisationen mit privilegierten Konten eine Lösung zum Verwalten der Passwörter und Zugänge, welche modernen Unternehmensbedingungen gerecht wird, die Sicherheit erhöht, die Überwachung vereinfacht und den Remote-Zugriff auf Server und Netzwerkgeräte kontrolliert.

    Language: German

    Download the Datasheet

  • Centrify Privilege Service

    クラウドベースのパスワード管理とアクセス管理

    IT 組織は、クラウドベース インフラストラクチャーとデータ センター インフラストラクチャーを組み合わせたハイブリッド配備の管理の必要性に迫られています。 このため、IT 管理者は、社内および社外から、社内およびアウトソース先のりソースに対して、ログインしないといけない状況になっています。 このような課題に対処するため、特権アカウントを共有する IT 組織は、パスワードとアクセスの管理ソリューションを構築して現代の企業でセキュリティを高め、法令遵守を簡素化し、サーバやネットワーク機器へのリモート アクセスを管理する必要があります。

    Language: Japanese

    Download the Datasheet

  • Centrify Privilege Service

    Cada vez mais as organizações de TI precisam gerenciar ambientes híbridos que compreendem o data center e recursos em nuvem. Os administradores de TI, tanto internos quanto terceirizados, precisam acessar recursos de dentro e de fora da rede da empresa. Para atenderem a esses desafios, as organizações de TI que usam contas privilegiadas compartilhadas precisam de uma solução de gestão de senhas e de acesso para que a empresa aumente a segurança, simplifique a conformidade e controle o acesso remoto a servidores e dispositivos de rede.

    Language: Portuguese

    Download the Datasheet

  • Centrify Privilege Service

    Las organizaciones de TI deben gestionar cada vez más implementaciones híbridas que combinan infraestructuras de centros de datos y basadas en la nube. Los administradores de TI, tanto internos como tercerizados, necesitan iniciar sesión desde dentro y fuera del perímetro corporativo. Para satisfacer esas expectativas, las organizaciones de TI que comparten cuentas privilegiadas necesitan una solución para la gestión de las contraseñas y el acceso ideada para empresas modernas, con el fin de incrementar la seguridad, simplificar el cumplimiento normativo y controlar el acceso remoto a los servidores y equipos de red.

    Language: Spanish

    Download the Datasheet

  • Centrify Server Suite

    Centrify Server Suite delivers unified identity management and audit across on-premisesÿand cloud-based Windows, Linux, and UNIX servers.

    Language: English

    Download the Datasheet

  • Centrify Server Suite - A4

    This is A4 size for printing in EMEA.

    Centrify Server Suite delivers unified identity management and audit across on-premises and cloud-based Windows, Linux, and UNIX servers.

    Language: English

    Download the Datasheet

  • Centrify Server Suite

    Qu’elles s’efforcent d’atténuer les risques de menaces internes et de menaces persistantes avancées, ou de respecter PCIDSS, SOX ou d’autres mandats industriels et réglementations gouvernementales dans un environnement de plus en plus en nuage et multiplateformes, les organisations informatiques ont besoin d’une solution de gestion d’identité et d’audit unifiée qui leur offre une visibilité centralisée et leur permette de contrôler les identités, la gestion des accès privilégiés et les activités.

    Language: French

    Download the Datasheet

  • Centrify Server Suite

    Egal, ob das Risiko von Insiderbedrohungen oder APT-Angriffen (Advanced Persistent Threats) eingrenzt oder in einer Multi-Plattform- und cloudbasierten Umgebung die Einhaltung der PCI-DSS-, SOX- oder anderen Industrierichtlinien und gesetzlichen Vorschriften gew„hrleistet werden soll, IT-Organisationen ben”tigen eine einheitliche L”sung fr Identit„tsverwaltung und Audit, die eine zentralisierte šbersicht und Kontrolle der Identit„tsinfrastruktur, Zugriffsrechte und Aktivit„ten erm”glicht.

    Language: German

    Download the Datasheet

  • Centrify Server Suite

    Che si tratti di ridurre i rischi di minacce interne alle aziende e di minacce avanzate persistenti, o di soddisfare i requisiti di normative industriali come PCIDSS, SOX etc. e di regolamenti nazionali in ambienti operativi multipiattaforma e basati sempre più diffusamente su cloud, gli operatori informatici hanno bisogno di soluzioni di gestione e verifica centralizzata delle identità che consentano l’osservazione ed il controllo centralizzati delle identità, della gestione degli accessi privilegiati e delle attività.

    Language: Italian

    Download the Datasheet

  • Centrify Server Suite

    オンプレミスおよびクラウドベースの Windows、Linux、および  UNIX サーバにおける統合型 ID 管理と監査

    インサイダーの脅威や APT (Advanced Persistent Threat) 攻撃対策、増大するプラットフォームとクラウドベース環境を PCIDSS、SOX などの規定や法令への対応。IT 組織は様々な問題に取り組む必要があります。これらに対処するためには、アイデンティティ管理、特権アカウント管理、そしてユーザアクティビティの集中管理による状況把握とコントロールとを可能にする、統合型アイデンティティ管理および監査ソリューションが必要です。

    Language: Japanese

    Download the Datasheet

  • Centrify Server Suite

    Seja para mitigar os riscos de amea‡as internas e amea‡as persistentes avan‡adas (APT), ou para atender a PCI-DSS, SOX ou outras normas regulat¢rias da ind£stria e regulamenta‡oes governamentais em um ambiente multi-plataforma e cada vez mais na nuvem, as organiza‡oes de TI necessitam de uma solu‡ao de gestao de identidade unificada e auditoria que permita visibilidade e controle centralizados sobre identidades, gestao de acesso privilegiado e atividades de usu rios.

    Language: Portuguese

    Download the Datasheet

  • Centrify Server Suite

    Auditoría y administración de identidad unificada para servidores Windows, Linux y UNIX en la premisa y en la nube.

    Language: Spanish

    Download the Datasheet

  • Centrify Server Suite

    İşyeri İçinde ve Bulut Tabanlı Windows, Linux ve UNIX Sunucularda Birleştirilmiş Kimlik Yönetimi ve Denetimi Gittikçe daha fazla çok platformlu ve bulut tabanlı olan bir ortamda ister iç tehditlerin ve gelişmiş kalıcı tehditlerin risklerini hafifletmeye çalışıyor olsun, isterse PCI- DSS, SOX veya diğer endüstri talimatlarının ve devlet düzenlemelerini sağlamaya çalışıyor olsun, IT kurumlarının nesneler üzerinde merkezleştirilmiş görünürlük ve kontrol, ayrıcalıklı erişim yönetimi ve aktivite sağlayan birleştirilmiş bir kimlik yönetimi ve denetimi çözümüne ihtiyacı olmaktadır.

    Language: Turkish

    Download the Datasheet

Webinars

Demo Videos


Chalktalks

  • Accelerating Deployment of Salesforce.com with Centrify Identity Service

    Nick Gamb and Kayne McGladrey from Centrify Professional Services discuss how to rapidly deploy Salesforce.com and other SaaS apps with the Centrify Identity Service. We also discuss and demonstrate SAML authentication and provisioning of Active Directory users to Salesforce.com.​

    Watch the Demo

  • Automated Centrify Zone Provisioning in a Multi-Platform UNIX Environment

    Ian Guthrie and Kayne McGladrey from Centrify Professional Services discuss the challenges of automatically provisioning UNIX home directories in a multi-platform network environment. We also discuss the use of the Zone Provisioning Agent and Group Policies for UNIX, and provide guidance on how to apply this design to other scenarios.

    Watch the Demo

  • Centrify DirectAuthorize for UNIX and Linux

    Than Chariya and Kayne McGladrey from Centrify Professional Services discuss the challenges and benefits associated with centrally managing user privileges on UNIX and Linux. We also discuss the creation and management of Roles and Rights and migrating away from legacy technologies like sudo. Finally, we also discuss achieving regulatory compliance by auditing the use of privileged commands.

    Watch the Demo

  • Centrify DirectAuthorize for Windows Part 1: Windows Security and Privilege Management

    Rich Loose and Brad Zehring open this six-part technical deep-dive into Centrify DirectAuthorize for Windows. In preparation for later topics, Rich begins with an exploration of some of the key architectural components of Windows security and demonstrates a Microsoft utility for examining privileges of running processes.

    Watch the Demo

  • Centrify DirectAuthorize for Windows Part 2: Seamless, Audited Privilege Elevation

    Rich Loose and Brad Zehring discuss what Windows privilege elevation means, how Windows enforces different levels of access for different users based on their privileges, and how Centrify elevates a user’s privilege for specific applications, network resources, and privileged desktops. Rich explains Windows User Access Control (UAC) and how it works with privilege elevation and administrator accounts.

    Watch the Demo

  • Centrify DirectAuthorize for Windows Part 3: DirectAuthorize Architecture

    Rich Loose lays out the overall architecture of DirectAuthorize, how it connects to the Windows Local Security Authority, and how it works with Windows to enable granular user privileges for applications, network resources, and desktops.

    Watch the Demo

  • Centrify DirectAuthorize for Windows Part 4: Windows Sessions, Desktops, and Diagnostics

    Rich Loose explains the relationship between Windows sessions, user desktops and DirectAuthorize, and demonstrates utility and diagnostic tools for examining the underlying properties of user identity, privileges, and running processes.

    Watch the Demo

  • Centrify DirectAuthorize for Windows Part 5: The Privileged Desktop

    Rich Loose and Brad Zehring discuss the functionality and underlying architecture of the privileged desktop, a feature that elevates privilege for all operations across an entire desktop and (along with DirectAudit) audits the user's activity.

    Watch the Demo

  • Centrify DirectAuthorize for Windows: Network Access Rights

    Rich Loose and Brad Zehring discuss privileged account management over remote connections, a unique ability of Centrify DirectAuthorize for Windows. Rich explains the architecture of Windows authentication over remote connections, logon IDs, the credential cache, and remote privilege elevation, finishing with a demonstration of privilege elevation using a DirectAuthorize network access right.

    Watch the Demo

  • Centrify Privilege Management Overview

    Fabrice Viguier and Kayne McGladrey from Centrify Professional Services discuss the usage of Role-Based Access Control solution in three use-case scenarios. This video also provides project guidance for our best practices in managing Access Control and Privileges on Unix and Linux systems using the Centrify Server Suite solution.

    Watch the Demo

  • Implementing Privilege Management on Windows

    Allen Stapp and Kayne McGladrey for Centrify Professional Services discuss and demonstrate how to securely and easily implement privilege management on Windows using the Centrify Suite. We also discuss logically grouping computers for simplified management, such as managing the rights of database administrators on database servers.​

    Watch the Demo

  • Introduction to SAML

    In this brief introduction to Security Assertion Markup Language (SAML), Centrify CTO Paul Moore and Senior Director of Product Management, Corey Williams, describe how the industry standard protocol is used by web applications to security authenticate and authorize users to access secure content. They detail a key use case that illustrates the basic principles.

    Watch the Demo

  • Migrating NIS to a Modern UNIX Environment

    Cindy Ritchie and Kayne McGladrey from Centrify Professional Services discuss the regulatory challenges associated with NIS in a modern UNIX environment, and then discuss migrating away from legacy NIS to a secure, centralized Active Directory environment. This video also provides project guidance for our best practices in assisting customers with NIS migrations for over nine years.

    Watch the Demo