Products

Centrify Privilege Elevation

Grant Just Enough Privilege Across Windows, Linux and UNIX

Reduce the risk of attack through individuals with too much privilege. Implementing least privilege access limits potential damage from security breaches. Thus, the flexible, fine-grained Centrify Privilege Elevation Service lets your users get work done, reduces risk and makes implementing a just-in-time, least privilege model easy with role-based access controls.

A Single Source of Identity Makes Assigning, Changing, and Auditing Privileges Easy

  • Reduce the risk of attack through individuals with too much privilege. Implementing least privilege access limits potential damage from security breaches.
  • Increase security and accountability by having fewer shared accounts and vaulted credentials. Easily assign or revoke privileges for users across Windows, Linux and UNIX systems.
  • Realize operational efficiencies through integrated authorization, authentication and audit that leverages existing investments in Active Directory.
  • Leverage a single corporate policy across a wide variety of platforms.
  • Prove compliance with regulations and industry mandates to auditors with a single view into the control and security of user privileges.
  • Ensure all privileged activity is tied to an individual. Users log in as themselves, seamlessly elevate privilege and all activity is audited.
  • Enable just-in-time privilege by requiring workflow-based management approvals for credential checkouts, privileged sessions and privileged roles.
Role-Based Access Controls Make Least Privilege Easy

Role-Based Access Controls Make Least Privilege Easy

Least privilege access gives you strong controls over your users’ privilege and reduces your risk from a range of threats. Centrify’s patented Zones technology provides highly granular, role-based access controls that simplify the implementation of a least-privilege model across Windows, Linux and UNIX systems.

Seamless Privilege Elevation with Dynamic Access Restrictions

Seamless Privilege Elevation with Dynamic Access Restrictions

Secure your Windows, Linux and UNIX systems by controlling exactly who can access what and when. Unlike de-centralized single-purpose tools like sudo, Centrify enables the configuration of dynamic privileges so that users can only elevate privilege at specific times, for a length of time and on certain servers. You can also isolate servers based on time and trust relationships to further protect sensitive data.

Powerful Tools Automate Privilege Creation and Assignment

Powerful Tools Automate Privilege Creation and Assignment

Centrify provides a powerful set of tools to simplify adoption and management of a least privilege access model. Centrify Zero Trust Privilege Services include tools and APIs to assess identity-related risk, assign pre-defined roles and rights, import existing sudo files, automate the creation of new roles and rights, create reports and meet audit requirements.

See Centrify Privilege Elevation Service in Action

Centrify Privilege Elevation Service: Privilege Elevation for Citrix Xen

Watch this video to learn how Centrify Zero Trust Privilege Services help elevate privilege for Citrix Xen.

Ready to protect against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial