SANTA CLARA, CA — Centrify, a leading provider of Zero Trust Security through the power of Next-Gen Access, has been highlighted in a new report from analyst firm, 451 Research, about the company’s portfolio of identity and access solutions with enhanced analytics, providing Next-Gen Access to organizations as they implement Zero Trust approaches to cybersecurity.
Titled, “Centrify goes ‘all in’ on the zero-trust movement with its Next-Gen Access platform,” the report – written by principal analyst Garrett Bekker – details the need for a rethink of security, as network perimeters dissolve and are replaced with cloud-centric environments serving increasingly-mobile workforces. It posits that, “the notion of trust is no longer based on where you are, but more on who you are, and what you are allowed to do.”
“This new report from 451 Research validates Centrify’s Zero Trust approach of ‘never trust, always verify,’” said Tom Kemp, CEO of Centrify. “To do that, organizations need solutions that can verify the user, validate their device, limit access and privilege, and learn and adapt to user behavior. Centrify’s unified Next-Gen Access portfolio removes trust completely to significantly increase security, while also leveraging machine learning to minimize the impact on user productivity.”
The report details technologies frequently associated with Zero Trust frameworks, common use cases, Centrify’s solution portfolio, and other players in the space. Notably, it mentions that, “With respect to Next-Gen Access specifically, Centrify will potentially compete with DIY [do-it-yourself] efforts by enterprises looking to cobble together a zero-trust architecture using parts from various vendors offering PKI, MFA, VPN, SSO, CDNs and other tools.”
The report goes on to state:
Centrify is one of the vendors that was early to embrace the zero-trust concept, with a new offering that it refers to as its Next-Gen Access platform…tying together Centrify’s existing offerings for identity as a service (IDaaS), multi-factor authentication (MFA), enterprise mobility management (EMM) and privileged access management (PAM).
To download the full report, visit https://www.centrify.com/resources/all-in-on-zero-trust/
For more information about Centrify Zero Trust Security Powered by Next-Gen Access, visit www.centrify.com.
Centrify delivers Zero Trust Security through the power of Next-Gen Access. The Centrify Zero Trust Security model assumes that users inside a network are no more trustworthy than those outside the network. Centrify verifies every user, validates their devices, and limits access and privilege. Centrify also utilizes machine learning to discover risky user behavior and apply conditional access — without impacting user experience. Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a-Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). Over 5,000 worldwide organizations, including over half the Fortune 100, trust Centrify to proactively secure their businesses.
Centrify is a registered trademark of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.