Centrify Privilege Elevation Service minimizes risk exposure to cyber-attacks caused by individuals with too much privilege across Linux, UNIX, and Windows systems. The service streamlines just enough and just-in-time privileged access best practices, limiting potential damage from a security breach.
Secure and manage fine-grained privileges for individuals instead of sharing accounts. Get users to log in as themselves for accountability, and elevate privilege based on their role within an organization. Granting just enough privilege to administrators minimizes the power hackers wield through stolen privileged account credentials.
Consistent Security Policy Management
Centrally create and consistently apply roles and security policies that granularly control privilege across Windows, Linux, and UNIX. Centrify’s hierarchical privileged access security model delivers the flexibility to manage privilege the way your organization demands by creating relationships between users, job function, and system criticality. This model ensures scale, efficient delegation, and clear separation of duties.
Minimize risk with zero standing privileges. IT administrators request a new role on a specific resource, access to privileged account credentials, or a privileged session — from anywhere — to obtain the rights they need to get their job done when they need it. Privileged access requests enable organizations to grant temporary privileges and roles with a flexible, just-in-time model that accommodates business needs.
Multi-Factor Authentication (MFA) at Privilege Elevation
Running a highly privileged application or command should always require MFA for identity assurance. Validating that an authorized human is elevating privilege and that it is not a malicious actor leveraging stolen credentials can stop an attack in its tracks. Centrify delivers MFA for privileged access before system and vault login, password checkout, and privilege elevation with a broad range of supported authenticators.
We started out with very simple roles and now we manage user privileges with extreme granularity. The roles in Centrify are essential in limiting what people can access and locking our systems down., Systems Integration Chief, National Weather Services
Learn More About Centrify Privilege Elevation Service
Centrify Server Suite
Minimize Your Attack Surface and Control Privileged Access to Your On-Premises and Cloud-Hosted...
A Leader in The Forrester Wave: Privileged Identity Management (PIM), Q4 2020
The Forrester Wave™: Privileged Identity Management, Q4 2020 includes 10 providers based on a 24...