Identity consolidation and privileged access management across Windows, Linux, and UNIXEnterprise Edition
Detailed auditing of privileged user sessions on Windows, Linux and UNIXPlatinum Edition
Dynamic segmentation and isolation of cross-platform systemsApplication Edition
Secure, centralized single sign-on to on-premises business applications
Single sign-on and unified management for cloud and mobile apps and devicesMac Edition
Centralized security and management for Macs and mobile devicesPremium Edition
SaaS and Mac Editions combined with mobile security managementCentrify for Samsung KNOX
Enterprise management of SSO, MCM and MDM for Samsung KNOX
Virtualization software creates a new IT platform that needs to be secured. Security policy enforcement solutions are needed in virtualized computing environments to supplement what is available in physical computing environments and to address blind spots within the virtual server that external physical security solutions can't see ... Favor vendors that offer a physical and virtual security solution and that provide a single management console and consistent policy framework across both environments.
Server virtualization platforms are becoming increasingly ubiquitous, but also increasingly heterogeneous, as organizations deploy hypervisors from vendors such as VMware and Citrix. At the same time, they are increasingly leveraging virtualization technology built into the latest UNIX, Linux and Windows operating systems. According to a survey recently conducted by Centrify, the number of sites that have virtualized a majority of their servers will double in the next 18 months, from 26% to 51%. This push to virtualization — driven by cost-cutting and IT agility issues — is so urgent that 55% say they are pressing ahead despite security concerns.
This rapid adoption of virtualization technologies, combined with the ability for business-critical guest systems to proliferate and seamlessly move across a data center, can lead to gaps in both management and security practices. In these dynamic environments, controlling who has access to the underlying hypervisor platform, and strictly defining what they can do based on their job role, become critical requirements.
In addition, as organizations begin the migration from a physical to a virtualized server infrastructure, IT managers need unified, global control over their evolving data center to meet security and compliance requirements — from management and segregation of duties to protection from external and internal threats — across any server instance.
The Centrify Suite addresses the need to secure the data center — no matter what hybrid state it is in along the migration path from physical to virtual — by giving IT managers a single point of administration for all of their heterogeneous systems and applications. By enabling administrators to secure the hypervisor platform and guest operating systems using the same Active Directory-based tools and skill sets that are already in place, Centrify is enabling organizations to embrace virtualization through a cost-effective solution that actually helps them simplify their environment while strengthening security and streamlining processes. With the Centrify Suite you can:
See our Cloud Security solution to see how Centrify addresses automated security and management for private and public cloud servers.
Centrify secures the industry's broadest range of cross-platform virtual computing environments, including: