Centrify has been identified by Gartner, Inc. as a visionary in the 2017 Magic Quadrant for Access Management. Centrify received the honor for our ability to execute and our completeness of vision, which is evaluated based on a deep understanding of the industry, product innovation, and marketing, sales, and geographic strategy.
At a time when cyber breaches are rising in volume and velocity, Centrify represents a massive rethink of security. It is the only complete platform that stops breaches through a trifecta of Identity Services for applications, endpoints and infrastructure — both on premises and in the cloud. Unlike other vendors that solely address a subset of the secure access market, Centrify is the only provider to deliver an integrated platform that can secure access for a company’s entire identityscape, including end users, B2B, B2C and privileged users — who are the most critical access management use case today
For the past several years, Gartner has covered the Identity as a Service (IDaaS) market through a different Magic Quadrant. In the 2016 IDaaS Magic Quadrant, Centrify was positioned as a leader. This year, we believe Gartner decided to change gears and focus on the broader access management market including vendors from both the Web Access Management (WAM) and IDaaS market. WAM vendors have been around for nearly two decades and we believe represent a traditional approach to solving application access through on-prem infrastructure that must be deployed, scaled and integrated with applications using precious IT resources. A lot of this traditional WAM infrastructure was sold and is maintained today. We also believe by combining the traditional WAM vendors with the more recent IDaaS vendors this is an attempt by Gartner to unify coverage of access management solutions for the enterprise.
Intriguingly, in this MQ, coverage was not included of what we believe is the most pressing access management challenge facing enterprises today — privileged access management. Centrify offers both access management and privileged access management as a unified solution, being named a representative vendor in a separate Gartner research publication titled “Market Guide for Privileged Access Management” by Felix Gaehtgens and Anmol Singh. We believe that both app access and privileged access management research should be reconciled together in future research as their functionality greatly overlaps (adaptive MFA, SSO, federation, remote access and risk analytics).
We believe being recognized as a visionary in access management is a testament to the progress Centrify has made in delivering market-leading solutions and validates Centrify’s position as a top vendor in the access management market. According to Gartner, visionaries in the market understand where the market is going or have a vision for changing market rule, and we believe Centrify’s visionary approach to access management is rooted in next dimension security that stops the breach not just for workforce users, but privileged users, partners and consumers. Centrify delivers stronger security, better compliance and improved end user productivity through its common platform of Identity Services such as single sign-on, adaptive multi-factor authentication, risk-based access control, deep mobile and Mac management, as well as comprehensive privileged access security, privileged session monitoring and risk analytics.
Centrify is the trusted provider in access management. Led by a team with decades of experience redefining security, Centrify is trusted by over 5000 global customers, including more than half of the Fortune 50 to defend their organizations.
Access your complimentary copy here.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
This is written by the individual author in his/her personal capacity, and the opinions, views and/or thoughts expressed herein are solely the author’s own. They are not intended to and may not necessarily reflect the official policy or position, or the opinions or views of ThycoticCentrify or its affiliates, employees, or any other group or individual.