Identity consolidation and privileged access management across Windows, Linux, and UNIXEnterprise Edition
Detailed auditing of privileged user sessions on Windows, Linux and UNIXPlatinum Edition
Dynamic segmentation and isolation of cross-platform systemsApplication Edition
Secure, centralized single sign-on to on-premises business applications
Single sign-on and unified management for cloud and mobile apps and devicesMac Edition
Centralized security and management for Macs and mobile devicesPremium Edition
SaaS and Mac Editions combined with mobile security managementCentrify for Samsung KNOX
Enterprise management of SSO, MCM and MDM for Samsung KNOX
Every major compliance regulation requires organizations to link access controls, role-based privileges, and user activity to named users. In cross-platform environments, establishing this accountability is a complex task given the existence of multiple identity silos such as NIS and LDAP databases, platform-specific proprietary directories, and local config files managed system by system.
Centrify addresses these IT security and compliance requirements with a unified identity management solution: a single, integrated architecture for authentication, access control, privilege management, policy enforcement and compliance. See the topics below for details on how Centrify's unified approaches addresses specific compliance regulations.
|More Federal Solutions|
|Learn about Centrify's solutions for smart card authentication, NISPOM, FIPS 140-2 compliance, and more.|
IT security managers in federal agencies face increasingly complex challenges in securing and managing information systems that span Windows, Linux, UNIX and Mac platforms. While Active Directory serves as the single, central hub for managing Windows workstations and servers, many Linux and UNIX deployments have evolved in their own silos, each managed through separate identity stores and administrative processes. A growing number of Mac workstations are also entering the mix, introducing another layer of complexity. In addition, access to these diverse systems must be managed across a workforce that contains a mix of permanent and temporary employees, vendors and contractors.
With the passage of the Federal Information Systems Management Act (FISMA) in 2002, federal IT security managers - and the vendors and consultants who work for them - have been tasked with addressing loose practices around access control, privilege management, accountability and auditing in particular. The National Institute of Standards and Technology (NIST) has issued Special Publication 800-53 to provide guidance on complying with FISMA. While NIST SP 800-53 divides FISMA compliance into a wide range of issues, from physical security to training to IT auditing, four of its 17 sections are of specific interest to federal IT security managers. (See our FISMA white paper and on-demand webinar for a comprehensive examination of these issues.)
At a high level, however, the most essential requirements are to:
In addition, the Office of Management and Budget continues to push federal IT departments toward commercial off-the-shelf (COTS) procurement in order to reduce costs, promote standardization, and eliminate standalone solutions.
Centrify's FISMA solution simplifies and streamlines your IT infrastructure by centralizing identity and access management for Linux, UNIX and Mac systems and applications within Microsoft Active Directory. The Centrify Suite does this while addressing FISMA's essential identity and access management requirements to:
In addition, leveraging a ubiquitous platform like Active Directory helps you contain costs and eases the task of standardizing identity and access management processes across agencies and vendors.
Leave us your name and phone number and we'll call to discuss your needs
A guide to FISMA requirements in heterogeneous IT environments
Enables access to
protected websites, VPNs and secured email