Active Directory-based authentication, access control and role-based privilege management for Windows, Linux & UNIX
Standard Edition + privileged user auditing
Enterprise Edition + encryption of data-in-motion and server isolation
Any Edition + single sign-on for SAP, Apache and J2EE/Java applications
Single sign-on for cloud apps + mobile device supportMac Edition
Active Directory-based authentication and Group Policy management for Macs + mobile device supportPremium Edition
SaaS and Mac Editions + mobile device supportCentrify for Samsung KNOX
Active Directory-based SSO, MCM and MDM for KNOX-enabled devices
Virtualization software creates a new IT platform that needs to be secured. Security policy enforcement solutions are needed in virtualized computing environments to supplement what is available in physical computing environments and to address blind spots within the virtual server that external physical security solutions can't see ... Favor vendors that offer a physical and virtual security solution and that provide a single management console and consistent policy framework across both environments.
Server virtualization platforms are becoming increasingly ubiquitous, but also increasingly heterogeneous, as organizations deploy hypervisors from vendors such as VMware and Citrix. At the same time, they are increasingly leveraging virtualization technology built into the latest UNIX, Linux and Windows operating systems. According to a survey recently conducted by Centrify, the number of sites that have virtualized a majority of their servers will double in the next 18 months, from 26% to 51%. This push to virtualization — driven by cost-cutting and IT agility issues — is so urgent that 55% say they are pressing ahead despite security concerns.
This rapid adoption of virtualization technologies, combined with the ability for business-critical guest systems to proliferate and seamlessly move across a data center, can lead to gaps in both management and security practices. In these dynamic environments, controlling who has access to the underlying hypervisor platform, and strictly defining what they can do based on their job role, become critical requirements.
In addition, as organizations begin the migration from a physical to a virtualized server infrastructure, IT managers need unified, global control over their evolving data center to meet security and compliance requirements — from management and segregation of duties to protection from external and internal threats — across any server instance.
The Centrify Suite addresses the need to secure the data center — no matter what hybrid state it is in along the migration path from physical to virtual — by giving IT managers a single point of administration for all of their heterogeneous systems and applications. By enabling administrators to secure the hypervisor platform and guest operating systems using the same Active Directory-based tools and skill sets that are already in place, Centrify is enabling organizations to embrace virtualization through a cost-effective solution that actually helps them simplify their environment while strengthening security and streamlining processes. With the Centrify Suite you can:
See our Cloud Security solution to see how Centrify addresses automated security and management for private and public cloud servers.
Centrify secures the industry's broadest range of cross-platform virtual computing environments, including: