Centrify Debuts Zero Trust Privilege at SecurIT: the Zero Trust Summit for CIOs and CISOs
Legacy PAM is no longer enough for modern attack surfaces, requiring a cloud-ready Zero Trust Privilege approach
October 30, 2018
New York City, CA — October 30, 2018 —Today at SecurIT, the Zero Trust Summit for CIOs and CISOs, Centrify formally debuts Zero Trust Privilege, a cybersecurity approach that helps customers grant least privilege access by verifying who is requesting access, the context of the request and the risk of the access environment. Centrify President Tim Steinkopf, named CEO effective January 1, 2019, will present Centrify’s vision of redefining the legacy approach to Privileged Access Management (PAM) to secure infrastructure, DevOps, cloud, containers, Big Data and other modern enterprise use cases. Centrify’s Zero Trust approach mandates a “never trust, always verify, enforce least privilege” mindset to stop the leading cause of breaches – privileged access abuse.
Privileged account management is one of the top 10 security projects for 2018, according to Gartner. From a hacker’s perspective, privileged access is the way to reach sensitive and potentially-valuable information that can then be exploited. Hackers are no longer breaking their way in; they are logging in using weak or compromised passwords, then moving laterally across the network to gain privileged access to steal data and cover their tracks. Organizations may consider approaching Privileged Access Management by solely implementing password vaults, a legacy approach that leaves gaps which can easily be exploited in an evolving threatscape that includes more modern enterprise use cases.
“Legacy PAM was designed for a time when all privileged access was constrained to humans logging in to servers and resources that were all located inside the datacenter. The expanded threatscape that modern enterprises are now facing simply can’t be secured by legacy solutions,” said Steinkopf. “As the fabric of IT has evolved, so must the approaches and solutions to protect the most privileged access credentials. We believe that starts with a cloud-ready Zero Trust Privilege approach to secure those modern use cases.”
Legacy PAM served its purpose when all privileged access was constrained to systems and resources inside the network. In today’s environment, privileged access not only covers infrastructure, databases and network devices but is extended to cloud environments, Big Data projects, DevOps, and must secure hundreds of containers or microservices. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. By implementing least privilege access, Centrify minimizes the attack surface, improves audit and compliance visibility, and reduces risk, complexity and costs for the modern, hybrid enterprise.
IDG research revealed that Zero Trust technologies are the most-researched security solutions, with 71 percent of security-focused IT decision-makers aware of the Zero Trust model. Centrify Zero Trust Privilege empowers a maturity model that reduces risk in phases. The first phase is discovering and vaulting everything, establishing a secure admin environment and enforcing session auditing and monitoring. The second phase focuses on identity consolidation with least access, providing just-enough privilege and just-in-time access while enforcing MFA. The third phase is hardening the environment with high assurance: centralized privileged account management, auditing and integration with SIEM, increased MFA everywhere enforcement, and more.
“Today’s enterprise IT environment is more diverse, sophisticated, and widespread than it was ten, or even five, years ago. Unfortunately, the old way of securing privileged access simply won’t work,” said Garrett Bekker, Principal Security Analyst at 451 Research. “Centrify has already established itself as one of the leaders in PAM solutions and was early to embrace the Zero Trust concept. Extending Zero Trust to the privileged access use cases offers a logical next step that can allow for a more modern approach to PAM.”
SecurIT, the Zero Trust Summit for CIOs and CISOs, is a two-day event produced by IDG in partnership with Centrify to clarify what Zero Trust is, why it’s emerging as a trend, and how organizations can capitalize on the adoption wave to secure their enterprise. For more information visit www.ZeroTrustSummit.com
For more information about Centrify Zero Trust Privilege, visit www.centrify.com
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. By implementing least privilege access, Centrify minimizes the attack surface, improves audit and compliance visibility, and reduces risk, complexity and costs for the modern, hybrid enterprise. Over half of the Fortune 100, the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse.
Centrify is a registered trademark of Centrify Corporation in the United States and other countries. IDaptive is a trademark of IDaptive, LLC in the United States. All other trademarks are the property of their respective owners.
Ready to Protect Against the #1 Attack Vector?
Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.