Products

Centrify Vault Suite

Centrify Vault Suite establishes core privileged access management (PAM) security controls across an expanding number of attack surfaces. Whether human or machine, in the cloud or on-premises, Vault Suite securely governs privileged access to shared accounts and credentials, application passwords and secrets, as well as secure remote sessions. Centrify Vault Suite enables the above and administrative access via jump box, workflow-driven access requests and approvals, and multi-factor authentication (MFA) at the vault.

Shared-Account-PW-Management

Shared Account & Credential Vault

Continuous discovery of systems and automated enrollment in the Centrify platform ensures privileged access governance where shared account credentials are either vaulted or eliminated. Secure access to these accounts is brokered for users, services, and applications.

Secrets-Vault

Application Passwords & Secrets Vault

Store and manage application passwords and secrets (e.g., IP addresses, API keys, SSH credentials, AWS IAM credentials) and enable secure communication between applications, containers, and microservices without creating new service accounts.

dia-Monitor-sessions-vault-suite

Privileged Session Monitoring & Control

Identify suspicious user activity in real-time to stop in-progress attacks. Capture all actions within Centrify Vault Suite and remote sessions to govern privileged access and speed forensic analysis in the case of a security incident.

MFA Authenticators

MFA at Vault

Ensure that only authorized human users access privileged accounts and systems versus malware or bots trying to impersonate your IT staff. Behavior-based multi-factor authentication (MFA) at vault login, password checkout, and remote session initiation stops in-progress attacks.

Record-request-context

Access Request & Approval Workflow

Minimize your attack surface by eliminating static and long-lived privilege grants. Govern temporary access to roles that grant privilege, shared account credentials, and remote sessions with self-service access requests and multi-level approvals. Audit access approvals and reconcile approved access with actual access.

Distributed Jumpbox

Secure Administrative Access via Jump Box

Eliminate the risks associated with allowing direct connections to critical infrastructure from potentially infected workstations. Access to sensitive systems is granted through approved privilege admin consoles, which include web-based, native client or thick client via a Server Gateway as a jump box.

Secure-Remote-Access

Secure Remote Access

Provide remote admins, outsourced IT, and third-party vendors with secure access to the specific infrastructure they manage — in the cloud and on-premises. Risk-based MFA combined with VPN-less access and flexible deployment models deliver the security your hybrid IT environment demands.

When you get a clear picture of the breadth of capabilities Centrify Privileged Access Management provides, you begin to understand just how many security check boxes it ticks. I’m still surprised at the number of issues I was able to address with just this single solution.

Matt Horn, IT Operations Manager, GSI

Learn More About Centrify Vault Suite

Ready to Protect Against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial