Centrify Unveils Extended Security and Compliance Value for Red Hat Platforms at 2012 Red Hat Summit and JBoss World
Company Announces Active Directory Integration for Red Hat Enterprise Linux 6.3 in Both Centrify Suite 2012 and Centrify Express 2012
June 25, 2012
BOSTON (Red Hat Summit, Booth 2512) — Centrify Corporation, the leading provider of security and compliance solutions that centrally control, secure and audit access to cross-platform systems, mobile devices and applications using Active Directory, today at the Red Hat Summit and JBoss World announced that it is demonstrating comprehensive security, compliance and auditing functionalities for Red Hat platforms in its booth No. 2512 this week.
Centrify also today announced Active Directory-based authentication, access control and auditing for the latest Red Hat Enterprise Linux version 6.3, which includes enhancements and new capabilities in the areas of developer tools, virtualization, security, scalability, file systems, and storage.
Centrify is a member of the Red Hat ISV partner program, and the Centrify Suite has been certified as Red Hat Ready for Red Hat Enterprise Linux 6 and JBoss Enterprise Middleware environments. In addition, Centrify also supports previous versions of Red Hat Enterprise Linux and Fedora Core. With Red Hat Ready certification, Centrify helps assure customers of the reliability of the DirectControl suite running on Red Hat servers, workstations and enterprise middleware applications running on Red Hat JBoss. For more information on Centrify's leading support for Red Hat platforms, visit /products/active-directory-authentication-for-red-hat-linux.asp.
"Centrify is unique in the industry in extending Active Directory authentication, privilege management and auditing to Red Hat systems and JBoss applications," said Shreyas Sadalgi, Centrify Senior Director, Business Development. "Centrify and Red Hat have worked closely together for many years to deliver integrated security solutions for on-premise Red Hat infrastructure, and are well aligned to partner and extend the value for organizations embracing the shift to virtualization and cloud computing models. Centrify addresses Red Hat customers' needs to secure their evolving data center with unified, global control over heterogeneous systems and applications, and to meet security and compliance requirements."
Centrify also announced that it has been selected to present on securing access to Red Hat Enterprise Linux and JBoss Enterprise Middleware with Active Directory integration. On June 28, Brian Durkin, Senior Systems Engineer, will present "Transform Your Access Management Experience to Red Hat Linux and JBoss Enterprise Middleware with Centrify" at noon in the Presentation Theater in the Red Hat booth No. 2530.
In its booth this week, Centrify will outline how it provides secure access for applications built on Red Hat's JBoss Enterprise Middleware, and how it helps IT administrators and developers who build, deploy and integrate mission-critical custom applications increase developer productivity and reduce application management costs. Centrify will also unveil how it is extending its security and compliance value to Red Hat's virtualization platform (REV) by enabling administrators to secure the hypervisor platform and guest operating systems using Active Directory-based tools and skill sets that are already in place. Centrify delivers value for Red Hat's cloud platform (CloudForms) with its "enterprise-out" approach that establishes Active Directory as the center of trust between enterprise and cloud servers, whether private or hosted, to make them as secure and compliant with regulations as those inside data centers. Finally, Centrify will demonstrate how Centrify DirectAudit helps data center administrators gain visibility into privilege account activity on systems running Red Hat Enterprise Linux and JBoss applications, for improved compliance to industry regulations.
About the Centrify Suite
The Centrify Suite lets organizations centrally control, secure and audit access to cross-platform systems, mobile devices and applications by leveraging an infrastructure they already own — Microsoft Active Directory. Built on an integrated architecture, the Centrify Suite strengthens security, enhances regulatory compliance initiatives, and reduces IT expense and complexity. The Centrify Suite — consisting of DirectControl DirectAuthorize, DirectAudit , DirectSecure and DirectManage — delivers secure authentication and single sign-on, role-based access control, mobile security management, privileged identity management, user-level auditing for Windows and UNIX systems, server isolation, and encryption of data-in-motion for the industry's broadest set of heterogeneous systems, mobile devices and applications.
The latest release of Centrify Suite 2012 with support for Red Hat Enterprise Linux 6.3 is now available for download. Current Centrify Suite customers can log in to the Centrify Online Support Portal, while new users can request a Centrify Suite trial or download the free Centrify Express 2012. For more information, visit http://www.centrify.com/.
Centrify delivers integrated software and cloud-based solutions that centrally control, secure and audit access to cross-platform systems, mobile devices and applications by leveraging the infrastructure organizations already own — Microsoft Active Directory. From the data center and into the cloud, more than 4,000 organizations, including 40 percent of the Fortune 50 and more than 60 Federal agencies, rely on Centrify's identity consolidation and privilege management solutions to reduce IT expenses, strengthen security and meet compliance requirements. For more information about Centrify and its solutions, call +1 (408) 542-7500 or visit http://www.centrify.com/.
Centrify, DirectAudit, DirectControl and DirectSecure are registered trademarks and DirectAuthorize and DirectManage are trademarks of Centrify Corporation in the United States and other countries.
Ready to Protect Against the #1 Attack Vector?
Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.