Centrify Extends Zero Trust Security Ecosystem with New Technology Partners
Next-Gen Access Leader Unveils New Partner Program at North America’s First Zero Trust Summit for CIOs and CISOs
June 13, 2018
SAN FRANCISCO, CA — Centrify, a leading provider of Zero Trust Security through the power of Next-Gen Access, today announced it is extending the Zero Trust ecosystem with new partners and a new partner program, the Centrify Zero Trust Security Network. The expanded program, debuted at SecurIT, the Zero Trust Summit for CIOs and CISOs, unifies Centrify’s extensive community of technology partners, making it possible for new and existing customers to seamlessly integrate complementary technologies to extend and derive more value from their Centrify Zero Trust Security solutions.
The program, previously known as the Centrify Alliance Partner Program (CAPP), establishes a Zero Trust Security ecosystem of independent software vendors (ISVs), whose solutions are commonly used in conjunction with each other. The network spans product categories including Analytics, Big Data, Collaboration, Communications, Cloud, CRM, Customer Service, Education, ERP, Finance, HR, IT Workflows, Productivity, and Security (i.e., CASB, Identity Governance, Next-Gen Firewalls and SIEM), empowering joint customers to protect their businesses from advanced threats and the impacts of breaches, while achieving compliance.
“As identity and passwords are the primary point of attack for data breaches, organizations need to rethink their approach to security and move to an identity-centric approach based on a Zero Trust model,” said Ben Rice, Vice President, Business Development at Centrify. “The Centrify Zero Trust Security Network establishes a Zero Trust Security ecosystem that includes incredibly inventive third-party technologies. Combined with Centrify Next-Gen Access, these solutions enable our joint customers to strengthen security by implementing an ‘always verify’ approach for everything ― including users, endpoints, networks, servers and applications.”
Participating partners can now leverage a broad range of tools and program benefits, including:
- Extensive pre-sales and field training
- Joint webinars and events
- Key account targeting
- Joint sales and marketing campaigns
- Participation in Centrify user events
- Joint client roadshows
- Joint press releases and customer success stories
- Listing in the Centrify Zero Trust Security Network directory
- Referrals rewards
In addition to extending the benefits of the Centrify Zero Trust Security Network, the company has recently partnered with industry leaders to strengthen the Zero Trust ecosystem, including:
- Palo Alto Networks
- SailPoint Technologies
- Carbon Black
“The partnership between Cylance and Centrify offers our shared customers a combined Zero Trust Security solution that fuses threat prevention with next-gen access solutions for comprehensive identity verification and risk-based access controls,” said Didi Dayton, Vice President of Worldwide Channels and Alliances at Cylance. “Centrify and Cylance are a perfect match for building a security strategy that addresses today’s dynamic threat landscape and boundaryless enterprise.”
“SaaS, IaaS, and web present a slew of security challenges for enterprises, and a solution that enables these services and also secures each user’s identity is critical,” said Rick Holden, Vice President of Business Development at Netskope. “The Netskope and Centrify partnership provides joint customers with an industry-leading solution that delivers the most flexible deployment architecture, award-winning DLP and threat protection, and granular control for all activities.”
In partnership with CIO and CSO magazines, Centrify is co-presenting the first-ever industry event of its kind, “SecurIT: the Zero Trust Summit for CIOs and CSOs,” which brings together authoritative industry experts to explain Zero Trust Security, why it matters, and where to begin. The summit, held Wednesday, June 13 in San Francisco, allows attendees to gain an up-to-the-minute understanding of Zero Trust Security and hear from other organizations that are already implementing this new framework.
Information about the program, including links for prospective partners to apply, can be found at www.centrify.com/partners.
To learn more about Centrify Zero Trust Security, please visit www.centrify.com.
Centrify delivers Zero Trust Security through the power of Next-Gen Access. The Centrify Zero Trust Security model assumes that users inside a network are no more trustworthy than those outside the network. Centrify verifies every user, validates their devices, and limits access and privilege. Centrify also utilizes machine learning to discover risky user behavior and apply conditional access — without impacting user experience. Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a-Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). Over 5,000 worldwide organizations, including over half the Fortune 100, trust Centrify to proactively secure their businesses.
Centrify is a registered trademark of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.
Ready to Protect Against the #1 Attack Vector?
Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.