As Traditional Perimeters Are Redefined, Privileged Access Security is Key to Securing the Hybrid Enterprise
Commissioned by Centrify Corporation, new Forrester study reveals inherent value of cloud-based Privileged Identity Management
May 11, 2016
Santa Clara, CA — Centrify, the leader in securing enterprise identities against cyberthreats, today released findings from a commissioned study conducted by Forrester Consulting, on behalf of Centrify, indicating that Privileged Identity Management (PIM)-as-a-Service is the ideal approach to securing hybrid IT infrastructures. More specifically, a PIM solution must secure access, manage privilege and audit activity across an organization’s entire security ecosystem, including secure outsourcing of IT and application development.
“A PIM-as-a-Service solution is incredibly effective in securing access to the IT infrastructure of today’s modern enterprise that has systems and application deployed in a hybrid mix of on-premises and in the cloud, and have users that are increasingly working remotely,” said Bill Mann, chief product officer of Centrify. “We believe this Forrester study shows that organizations running critical applications and servers in the cloud are just as secure as those running them on-premises. Ultimately, security correlates to solutions that can effectively reduce identity-related risk in today’s enterprise as they stretch across multiple datacenters, devices and users.”
Forrester surveyed 150 IT decision makers with the title of IT director or higher in companies with more than 500 total employees about privileged access security. Top-line findings are as follows:
- All organizations outsource at least some of their IT, application development, and infrastructure functions
- Nearly all organizations permit privileged remote access
- Decision makers choose PIM-as-a-Service for its ability to reap the benefits of the cloud while still providing quality security
- A majority of decision makers prefer to manage privileged access security through a single platform
The Forrester study states, “Organizations need a privileged access security solution that effectively manages access while still allowing employees and business partners to do their work and contribute to the business. Furthermore, decision-makers have found positive results utilizing PIM-as-a-Service solutions to solve this challenge.”
Centrify delivers a PIM-as-a-Service product called Centrify Privilege Service that addresses today’s hybrid IT environments of on-premises systems and apps, as well as Software-as-a-Service (SaaS) and Infrastructure-as-a-Service (IaaS). Privilege Service combines shared account password management — including support for vaulting and auto-rotation of enterprise passwords —with the ability to securely manage and audit access by internal users, outsourced IT and third party vendors. Centrify’s Privileged Access Security solution includes Privilege Service and Centrify Server Suite to deliver one of the industry’s most comprehensive PIM offerings for securing access to IT infrastructure.
For more information about this survey, please download the Thought Leadership Paper summarizing the findings at: http://www.centrify.com/forrester-study
Centrify is the leader in securing enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts. Centrify delivers stronger security, continuous compliance and enhanced user productivity through single sign-on, multi-factor authentication, mobile and Mac management, privileged access security and session monitoring. Centrify is trusted by over 5000 customers, including more than half of the Fortune 50.
Centrify is a registered trademark and Centrify Server Suite, Centrify Privilege Service and Centrify Identity Service are trademarks of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.
Ready to Protect Against the #1 Attack Vector?
Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.