Download the 2018 Gartner Magic Quadrant for Access Management
Centrify has been named a Visionary by Gartner, Inc. in the 2018 Magic Quadrant for Access Management, Worldwide. According to Gartner, “visionaries are noted for their innovative approach to access management technology, methodology and/or means of delivery.”
We believe being recognized as a visionary in access management is a testament to the progress Centrify has made in delivering an innovative and class-leading solution while validating Centrify’s position as a top vendor in the access management market. Centrify’s innovative approach to access management is rooted in our Zero Trust Security approach and Next-Gen Access platform that stops breaches not just for workforce users, but privileged users, partners and consumers — across all applications and infrastructure, both on-premises and in the cloud.
It should also be noted that in this MQ, Gartner makes a single planning assumption: “By 2022, identity and access management as a service (IDaaS) will be the chosen delivery model for more than 80% of new access management purchases globally, up from 50% today.”
So, a buyer should be cautious when selecting an access management vendor, as the most common method of consuming access management (on-premises software) is quickly giving way to Identity as a Service (IDaaS) — and for good reasons! IDaaS is where the majority of innovation and investment is happening today. For example, Centrify is working hard to deliver on the promise of Zero Trust Security through the power of Next-Gen Access.
Zero Trust Security assumes that untrusted actors already exist both inside and outside the network. Trust must therefore be entirely removed from the equation. Centrify’s Zero Trust Security presumes that everything (users, endpoints, networks, resources) is untrusted and must be verified first so that security is not compromised.
Centrify’s Zero Trust Security verifies every user, validates every device, limits their access and privilege intelligently, and continually learns and adapts, using machine learning to discover risky behavior without impacting user experience. Centrify offers Zero Trust Security through the power of Next-Gen Access — a unified set of mature and proven technologies and capabilities — including single sign-on, multifactor authentication, mobility management, privilege management and behavior analytics.
Organizations may consider approaching Zero Trust Security by implementing IDaaS, MFA, EMM, PAM and User Behavior Analytics (UBA) technologies from separate vendors, but disparate solutions leave gaps and are expensive to separately license, implement, integrate and maintain. Only Centrify delivers an industry-recognized solution that uniquely converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM,) providing Next-Gen Access across applications, endpoints and infrastructure for all users, without sacrificing best-of-breed features.
Access your complimentary copy of the 2018 Gartner Access Management Magic Quadrant, Worldwide here.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Gartner, Magic Quadrant for Access Management, Worldwide, Gregg Kreizman, 18 June 2018
This is written by the individual author in his/her personal capacity, and the opinions, views and/or thoughts expressed herein are solely the author’s own. They are not intended to and may not necessarily reflect the official policy or position, or the opinions or views of ThycoticCentrify or its affiliates, employees, or any other group or individual.