Products

Secure Remote Access

GRANULAR REMOTE ACCESS CONTROL WITHOUT VPN

Provide your IT administration teams, outsourced IT, and third-party vendors with secure, granular access to critical infrastructure resources regardless of location and without the hassles of a virtual private network (VPN). Centrify Privileged Access Service enables secure remote access to data center and cloud-based infrastructures through a cloud-based service or on-premises deployment.

Secure Privileged Access for On-Site and Remote Administration

  • Grant IT administrators secure, context-aware access to a controlled set of servers, network devices and Infrastructure-as-a-Service (IaaS).
  • Enable outsourced IT without the need of including administrators in Active Directory.
  • Control access to specific data center and cloud-based resources without the increased risk of providing full VPN access.
  • Secure all administrative access with risk-aware, multi-factor authentication (MFA).
  • Single secure access point for administrators to manage infrastructure using shared accounts or their own Active Directory account.
  • Enable secure remote access to data center and cloud-based infrastructures for internal users, third party vendors and outsourced IT through a cloud service or on-premises deployment.
secure-access-to-servers

Secure Access to Servers, Network Devices and IaaS

IT users launch SSH and RDP sessions for resources directly from the Centrify Admin Portal or local clients. In addition, step-up authentication for identity assurance protects your critical assets.

directory-services

Secure Access for Employees and Third Parties — Remote and On-Site

Centrify enables you to authenticate your internal and outsourced IT users through Active Directory, LDAP and the Centrify Directory. You can use one or any combination of these identity stores or grant granular, federated privileged access to resources for business partners and third-party vendors.

limit-access-to-resources

Grant Access to Specific Resources

Unlike a VPN that gives users visibility to the entire network, Centrify enables you to grant access to resources on a per-resource basis. Give your most privileged internal IT admins access to as much of your infrastructure as necessary, while limiting access by an outsourced team to only the servers and network hardware their role requires.

access-from-any-location

ANYTIME, ANYWHERE ACCESS

Your IT admins can log in and securely access resources from any location that can reach the Centrify Zero Trust Privilege Services. For user logins outside the corporate network, you can require multi-factor authentication for security stronger than a user name and password.

password-checked-out

Break-Glass Access to Passwords from a Mobile Device

Get controlled, emergency access to privileged account passwords from your mobile device enrolled in the Centrify Zero Trust Privilege Services. Secured password checkout requires a PIN or fingerprint validation. Checkout automatically times out based on per-resource policy.

user risk

Strengthen Protection for Privileged Access to Critical Systems with Risk-Based MFA

Guard against cyber-attacks by combining risk-level with role-based access controls, user context and multi-factor authentication (MFA) to enable intelligent, automated and real-time decisions for granting privileged access to users who are remotely accessing servers, on password checkout or when using a shared account to log into remote systems.

See Centrify Privilege Access Service in Action

Centrify Risk-Based Access Control
Centrify Break-Glass Access to Passwords

Watch this video to learn how Centrify Privileged Access Service allows organizations to grant granular privileged access control without the hassles of a VPN to their internal users, third-party vendors and outsourced IT.

Watch this video to learn how to get controlled, emergency access to privileged account passwords from your mobile device.

Ready to protect against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial