Centrify Brings Zero Trust Security to Apple Devices with Day-One Support for New iOS12 and macOS Mojave Operating Systems
Centrify continues long-standing tradition of delivering day-one support for macOS and iOS releases
September 19, 2018
SANTA CLARA, CA — Centrify, a leading provider of Zero Trust Security through the power of Next-Gen Access, today announced that it is providing day-one support for the just-released iOS12 and macOS Mojave operating systems. This support extends Centrify’s track record of delivering day-one compatibility for macOS and iOS releases, allowing organizations to securely pursue their BYOD and mobility initiatives while stopping breaches that target Apple devices. The day-one support is effective across Centrify Endpoint Services and Centrify Application Services.
With the increasing desire to access cloud apps from any Apple device—including Macs, iPhones and iPads—the onus is squarely on IT to secure all these vital endpoints. Centrify customers have peace of mind knowing that as their users upgrade to the new iOS 12 and macOS Mojave releases, Centrify is securing their access at first availability.
As more employees rely on mobile devices and Macs for work, companies need to authorize and manage these devices with greater confidence and consistency. Centrify’s identity and access management solutions let organizations realize seamless, context-aware policy across all the applications, endpoints and devices their users prefer—all from a single integrated solution. What’s more, Centrify’s Mac and mobile management empowers mobile workers, supports BYOD initiatives and provides secure access to cloud, mobile and on-premises apps with integrated Mac, mobile and identity management.
“Centrify is proud to deliver day-one compatibility support for the latest macOS and iOS releases, enabling organizations to adopt the latest Apple technology with confidence,” said Archit Lohokare, VP of Product Management at Centrify. “As devastating data breaches continue at a startling pace, the need for organizations to consider a Zero Trust approach to security is escalating. That’s why we are committed to ensuring our customers can confidently embrace the latest technology and devices all while knowing sensitive corporate data is accessed only from devices that are verified and secure.”
For more information about Centrify Zero Trust Security, visit www.centrify.com/zero-trust-security/.
Centrify delivers Zero Trust Security through the power of Next-Gen Access. The Centrify Zero Trust Security model assumes that users inside a network are no more trustworthy than those outside the network. Centrify verifies every user, validates their devices, and limits access and privilege. Centrify also utilizes machine learning to discover risky user behavior and apply conditional access — without impacting user experience. Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a-Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). Over 5,000 worldwide organizations, including over half the Fortune 100, trust Centrify to proactively secure their businesses.
Centrify is a registered trademark of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.
Ready to Protect Against the #1 Attack Vector?
Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.