Centrify Achieves Highest Scores in Two of Three Use Cases in 2018 Gartner Critical Capabilities for Access Management, Worldwide
Centrify receives highest scores in ‘Workforce Users Accessing SaaS’ use case and ‘Business-to-Business (B2B)’ use case
September 12, 2018
SANTA CLARA, CA — Centrify, a leading provider of Zero Trust Security through the power of Next-Gen Access, today announced the company’s Next-Gen Access solutions received the highest product scores in the “Workforce Users Accessing SaaS” and “Business-to-Business (B2B)” use cases in the Gartner, Inc. 2018 “Critical Capabilities for Access Management, Worldwide” report.1
“We are honored to be recognized in the Gartner Critical Capabilities report, which we feel is due to our leadership and vision to secure the primary attack vector,” said Tom Kemp, co-founder and CEO of Centrify. “As catastrophic data breaches leveraging compromised identities become more common, the need for organizations to consider new approaches is escalating. It is clear that our Zero Trust Security approach is resonating in the market, powered by Centrify Next-Gen Access to secure every user, device and endpoint.”
Gartner evaluated 15 vendors’ services on nine critical capabilities and three common use cases: Workforce Users Accessing SaaS, Business-to-Business (B2B), and Business-to-Consumer (B2C). The report identifies solution providers in the market, evaluating each vendor against nine core functionalities.
In the 2018 Gartner “Magic Quadrant for Access Management, Worldwide,”2 the research firm named Centrify a Visionary for the second consecutive year, positioning the company further to the right for more completeness of vision.
Centrify’s approach to access management is rooted in Next-Gen Access, its comprehensive portfolio of Single Sign-on (SSO), Adaptive Multi-factor Authentication (MFA), Enterprise Mobility Management (EMM), User Behavior Analytics (UBA), and Privileged Access Management (PAM) solutions. Centrify secures access to applications, endpoints and infrastructure to empower Zero Trust Security. Centrify is trusted by over 5,000 global customers, including more than half of the Fortune 100, to defend their organizations.
To learn more about Centrify, please visit www.centrify.com.
2 Gartner “Magic Quadrant for Access Management, Worldwide” by Gregg Kreizman, June 2018.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Centrify delivers Zero Trust Security through the power of Next-Gen Access. The Centrify Zero Trust Security model assumes that users inside a network are no more trustworthy than those outside the network. Centrify verifies every user, validates their devices, and limits access and privilege. Centrify also utilizes machine learning to discover risky user behavior and apply conditional access — without impacting user experience. Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a-Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). Over 5,000 worldwide organizations, including over half the Fortune 100, trust Centrify to proactively secure their businesses.
Centrify is a registered trademark of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.
Ready to Protect Against the #1 Attack Vector?
Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.