Travel and Leisure
“With Centrify, we get a complete, holistic view of all activity across a given cluster of servers according to assigned privileges, and we can ensure regular user accounts are not elevated to root admin level.”
CENTRIFY INFRASTRUCTURE SERVICES CUSTOMER SPOTLIGHT
Due to a period of rapid organic growth combined with a series of acquisitions at Interval International, a constant flow of consultants, contractors and temp workers were accessing the environment. As a result, the company needed to carefully manage who had access to what.
Originally, the company’s data center was mostly Windows with a small number of Linux servers. A Service Oriented Architecture (SOA) was used to provide a much more robust platform deployed on top of Linux clusters which solved many challenges, but in the process the Linux environment grew to over 700 servers.
- Bridge a fast-growing Linux environment with Active Directory
- Implement a least privilege model for employees, contractors and consultants
- Streamline user on-boarding
- Help to meet and prove compliance with PCI guidelines
“I don’t want outsiders that somehow get insider credentials to gain extensive privileges,” says Sasan Hamidi, CISO at Interval International, Inc. “I need to minimize my attack surface wherever possible. Centrify Zone technology has been instrumental in this effort, and it was very easy to implement.”
Centrify’s patented Zone technology provides least-access and least-privilege security models for easy implementation across diverse users, systems and roles. Beyond the security aspect, the Centrify solution saves Interval International a significant amount of time, money and resources. User account provisioning used to take up to 30 minutes for each server. Now, it’s immediate.