Centrify Included in Gartner’s 2017 Market Guide for Privileged Access Management
Centrify’s best-in-class privileged access security solution minimizes the attack surface and stops breaches that abuse privilege
September 12, 2017
Santa Clara, CA ― Centrify, the leader in securing hybrid enterprises through the power of identity services, today announced it has been named a representative vendor in Gartner’s 2017 Market Guide for Privileged Access Management (PAM).
The increasingly hybrid nature of infrastructure, driven by the adoption of cloud-based workloads, is driving the need to secure privileged access across on-premises, private-cloud and public cloud infrastructure and apps with a single solution. Gartner predicts that “Through 2020, more than half of security failures associated with Iaas and PaaS will be attributable to significant security gaps caused by failure to adopt PAM technology and processes.” Gartner designates Privileged Account and Session Management (PASM) along with Privilege Elevation and Delegation Management (PEDM) as two distinct tool categories (that) have evolved as the predominant focus for security and risk management leaders considering investment in PAM tools. Centrify is unique in providing a single solution for PASM and cross-platform PEDM -- built-in house, Centrify’s solution controls privileged access for individual and shared accounts in the hybrid enterprise. Centrify simplifies the implementation of PAM best practices and strengthens an organization’s risk posture to stop the breach.
“We are delighted to be acknowledged as a representative vendor by Gartner again this year,” said Bill Mann, chief product officer at Centrify. “This report provides valuable insights into the need for a comprehensive privileged access management solution that includes PASM, PEDM, MFA and native CAC/PIV support. This report also comes on the heels of Centrify being positioned as a leader in the KuppingerCole Leadership Compass for Privilege Management.”
Centrify’s integrated privileged access security solution combines password vaulting with brokering of identities, MFA enforcement and just-enough privilege, all while securing remote access and monitoring all privileged sessions. By minimizing the attack surface and controlling privileged access to the hybrid enterprise, Centrify’s capabilities enable organizations to choose a comprehensive platform vs disparate point product solutions to ensure users are who they say they are, they only have the privileges they need to do their jobs and all privileged activity is monitored and attributed to an individual.
Centrify is the trusted provider in privileged access management. Led by a team with decades of experience redefining security, Centrify is trusted by over 5000 global customers, including more than half of the Fortune 50 to defend their organizations.
See how Centrify Stops the Breach.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure each user’s access to apps and infrastructure through the power of identity services. This is Next Dimension Security in the Age of Access. Centrify is enabling over 5,000 customers, including over half the Fortune 50, to defend their organizations. To learn more visit www.centrify.com.
The Breach Stops Here.
Centrify is a registered trademark and Centrify Server Suite, Centrify Privilege Service and Centrify Identity Service are trademarks of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.
Ready to Protect Against the #1 Attack Vector?
Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.