Active Directory-based authentication, access control and role-based privilege management for Windows, Linux & UNIX
Standard Edition + privileged user auditing
Enterprise Edition + encryption of data-in-motion and server isolation
Any Edition + single sign-on for SAP, Apache and J2EE/Java applications
Single sign-on for cloud apps + mobile device supportMac Edition
Active Directory-based authentication and Group Policy management for Macs + mobile device supportPremium Edition
SaaS and Mac Editions + mobile device supportCentrify for Samsung KNOX
Active Directory-based SSO, MCM and MDM for KNOX-enabled devices
Centrify understands the pressure on IT organizations to optimize costs while enforcing controls and demonstrating compliance. IT managers know that fractured identity silos across their data center systems, cloud and mobile environments is a major barrier to efficient operations and improved security. With Centrify's unified identity architecture, IT operations and security staff can eliminate fractured identity and policy silos by consolidating UNIX and Linux identities and privileges into Active Directory. The same Active Directory-centric approach makes centralized management of Macs and mobile devices easy while giving users the one login they want. Centrify goes well beyond "Active Directory Bridging" products by providing an integrated solution for identity consolidation, authentication, single sign-on, Group Policy enforcement on non-Windows systems, and mobile security management.
Consolidate disparate UNIX and Linux identity stores into Active Directory to streamline operations and enforce separation of duties
Replace NIS with Active Directory — a fault-tolerant LDAP database that seamlessly integrates Kerberos-based authentication — to enhance security while simplifying your environment
Centrally manage mobile devices and apps using your existing Active Directory infrastructure and provisioning/lifecycle processes.
Use familiar Windows-based tools and processes to apply consistent access, configuration and security policies across your Mac OS X desktops
Enforce consistent security and configuration policies across heterogeneous systems