Centrify Vault Suite establishes core privileged access management (PAM) security controls across an expanding number of attack surfaces. Whether human or machine, in the cloud or on-premises, Vault Suite securely governs privileged access to shared accounts and credentials, application passwords and secrets, as well as secure remote sessions. Centrify Vault Suite enables the above and administrative access via jump box, workflow-driven access requests and approvals, and multi-factor authentication (MFA) at the vault.
Shared Account & Credential Vault
Continuous discovery of systems and automated enrollment in the Centrify platform ensures privileged access governance where shared account credentials are either vaulted or eliminated. Secure access to these accounts is brokered for users, services, and applications.
Application Passwords & Secrets Vault
Store and manage application passwords and secrets (e.g., IP addresses, API keys, SSH credentials, AWS IAM credentials) and enable secure communication between applications, containers, and microservices without creating new service accounts.
Privileged Session Monitoring & Control
Identify suspicious user activity in real-time to stop in-progress attacks. Capture all actions within Centrify Vault Suite and remote sessions to govern privileged access and speed forensic analysis in the case of a security incident.
MFA at Vault
Ensure that only authorized human users access privileged accounts and systems versus malware or bots trying to impersonate your IT staff. Behavior-based multi-factor authentication (MFA) at vault login, password checkout, and remote session initiation stops in-progress attacks.
Access Request & Approval Workflow
Minimize your attack surface by eliminating static and long-lived privilege grants. Govern temporary access to roles that grant privilege, shared account credentials, and remote sessions with self-service access requests and multi-level approvals. Audit access approvals and reconcile approved access with actual access.
Secure Administrative Access via Jump Box
Eliminate the risks associated with allowing direct connections to critical infrastructure from potentially infected workstations. Access to sensitive systems is granted through approved privilege admin consoles, which include web-based, native client or thick client via a Server Gateway as a jump box.
Secure Remote Access
Provide remote admins, outsourced IT, and third-party vendors with secure access to the specific infrastructure they manage — in the cloud and on-premises. Risk-based MFA combined with VPN-less access and flexible deployment models deliver the security your hybrid IT environment demands.
When you get a clear picture of the breadth of capabilities Centrify Privileged Access Management provides, you begin to understand just how many security check boxes it ticks. I’m still surprised at the number of issues I was able to address with just this single solution., IT Operations Manager, GSI
Learn More About Centrify Vault Suite
Centrify Vault Suite
It’s become evident that cyber-attackers are no longer “hacking” to carry out data breaches — they...
2021 Gartner Magic Quadrant for Privileged Access Management
Gartner Identifies Centrify as a Leader in the 2021 Privileged Access Management Magic Quadrant.