Customers Say it Best

See how Centrify Zero Trust Privilege has benefited our customers, in their own words.

Kris Howitt, Director of Information Security Architecture,
Live nation entertainment
Ruben Marquez, Manager of Information Security Projects,
Live Nation Entertainment
Kris Howitt, Director of Information Security Architecture,
Live Nation Entertainment
Mark Hopkins, Information Security Operations Manager, Yapstone

With Centrify Zero Trust Privilege Services, I saw how one product could address all of our problems. It would help us manage both personal and shared credentials.

We’ll soon have 80% of our clients on the Centrify system. It’s been so effective that we’ve implemented a policy that all new clients will use Centrify for remote access. It's written into the contracts.

When you get a clear picture of the breadth of capabilities Centrify Zero Trust Privilege Services provide, you begin to understand just how many security check boxes it ticks. I’m still surprised at the number of issues I was able to address with just this single solution.

Previously, it wasn’t really possible for us to have one resource connected to two separate clients at the same time. But with Centrify we can connect to multiple clients simultaneously, each through a different browser window. And we can wrap multi-factor authentication (MFA) individually around each critical resource to ensure it remains secure.

Matt Horn, IT Operations Manager, GSI
State of Michigan

There isn’t a regulation that Centrify hasn’t helped us to meet. Today, every time an administrator touches a server, I have a record of it. I can pull a report, print it, and hand it to the auditor.

Peter Manina, IT Specialist and UNIX Systems Architect, State of Michigan Department of Technology, Management and Budget

“Centrify solves our audit and compliance issues by providing both centralized, privileged identity management and granular access controls.”

“Centrify Zero Trust Services presented us with all the centralized user identity management we’d been trying to build for years. It would allow us to eliminate both the hodgepodge of password files that had existed across the environment and the sudo files that had been usurping IT resource time.”

Brad Settles, Technical Services Administration Manager, State of Michigan

Centrify was up and running within 30 minutes in some of our field offices. The deployment manager made it simple and we had great support from customer service. We haven't had to do anything since implementation. If we conservatively estimate that Centrify saves just one hour for every system in our environment as we perform upgrades, we’re looking at well over $50,000 a year in cost savings.

Jeff Williams, Systems Integration Chief, National Weather Services

“With Centrify, we get a complete, holistic view of all activity across a given cluster of servers according to assigned privileges, and we can ensure regular user accounts are not elevated to root admin level.”

“I don’t want outsiders that somehow get insider credentials to gain extensive privileges. I need to minimize my attack surface wherever possible. Centrify Zone technology has been instrumental in this effort, and it was very easy to implement.”

Sasan Hamidi, Former CISO, Interval International

Ready to Protect Against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial