Complete Cloud Security with Centrify + Elastica
The Elastica CloudSOC™ is a unique platform that enables transaction level security for your cloud apps and services by combining data science, machine learning, real-time traffic processing, insightful visualization and intuitive controls.
Centrify improves end-user and IT productivity, while securing access to cloud, mobile, and on-premises apps via single sign-on, multi-factor authentication and provisioning of users and mobile apps.
“Enterprise adoption of cloud applications is growing rapidly, with more organizations storing and sharing critical business data in the cloud. This trend requires new tools to monitor, govern and secure usage of these new applications. Partnering with Centrify allows us to deliver seamless integration of their identity management solution along with our industry leading CASB offering to streamline safe adoption of the cloud for enterprise organizations.”
- Sheldon Gilbert, VP of Business Development at Elastica
Centrify Identity Service™ integrates with Elastica Apps, deployed on their extensible CloudSOC™ platform, to provide a comprehensive solution for provisioning, governing, and securing enterprise cloud apps.
Elastica customers can use Centrify Identity Service to:
- Provide secure access to business-critical applications via directory integration
Control access to cloud and mobile apps, and manage the devices used to access them. Keep sensitive directory info where you want it: on-site in LDAP or Active Directory, in the cloud, or any combination
- Provision and de-provision users
Automatically create accounts, manage access to those accounts, and revoke access from all devices when necessary — all from a central control point
- Deploy Elastica’s Apps
Centrify’s turnkey integration with Elastica provides seamless deployment of Elastica's Apps and ensures the appropriate cloud app traffic is monitored and protected
- Enforce deeper security with per-app policies
Centrify Identity Service provides context-aware, step-up authentication based on per-app policy. Users can re-authenticate simply using a mobile, phone, SMS, or email