English

Endpoint Services

Secure Access Starts with Trusted Endpoints

Protect corporate resources and data through a zero trust security approach. Verify identity of users and endpoints with adaptive MFA, conditional access and analytics that govern how, when and what users have access to. Bolster endpoint security with cross-platform policy enforcement, powerful host-based privilege management, session recording and logging for IT and end-users.

product-endpoint-device-management.jpg

Product Features

icon-adaptive-mfa.gif

Adaptive MFA & Strong Authentication

Verify identity of users with flexible adaptive MFA and strong authentication controls before access or privilege is granted on the endpoint.
conditional-access_120x120_web.png

Conditional
Access

Govern how, when and what users have access to with pre-defined conditions that factor device posture and user behavior before access is granted.
endpoint-priv-mgmt.png

Endpoint Privilege Management

Minimize the attack surface by controlling privileged account usage and providing just-enough privilege for all users on the endpoint.
cas_device-management_120x120_web.png

Device Security Management

Protect endpoints with cross-platform policy enforcement to bolster endpoint security posture and establish trusted devices in the enterprise.

Adaptive MFA & Strong Authentication

Prove Users Are Who They Say They Are

Leverage context-based and risk-aware MFA to bolster access security and ensure user validity. Implement strong authentication on endpoints to comply with security regulations without compromising end user productivity or device support.

Learn More
adaptive-mfa.png

Conditional Access

A Zero Trust Approach to Access

A Zero Trust security model implemented by combining Identity Assurance and Endpoint Security Posture to control access to applications and infrastructure when identity-centric conditions are met. Minimize endpoint threat vectors while enabling broader visibility and management controls.

Learn More
conditional-access-diagram.png

Endpoint Privilege Management

Award-winning Privilege Management Now on the Endpoint

Increase endpoint security posture while minimizing the attack surface using a powerful combination of identity assurance, just-in-time access, just enough privilege, advanced monitoring and auditing controls. Enable enterprise application management to ensure only trusted applications are installed and accessible without requiring end-users to have administrative privileges.

Learn More
endpoint-priv-management.png

Device Security Management

Device Identity + Security + Configuration

Enforce endpoint security posture for BYOD or corporate-owned devices ensuring consistent preventative security and policy management for Windows, Mac, Linux, iOS and Android endpoints.

Learn More
device-management.png

Zero Trust Security — Rethink Your Approach to Enterprise Security

Centrify Endpoint Services

Endpoint Services
Standard

Starting At

$4 / month per user

Start Trial
MFA (Endpoint), Device Mgmt, App Mgmt, AD-based Policy Mgmt,
Local Account Pass Mgmt

Available Add-Ons

Privilege Elevation Services

$2 / month per endpoint

Privilege Elevation for Endpoints

Audit & Monitoring Services

$2 / resource per endpoint

Session Monitoring
(Host + Gateway)

Smart Card
Services

$2 / month per user

Smart Card Login to Portal Derived Credentials

Admin
Users

$12 / month per user

Secure Remote Access, Checkout Password, Request & Approve
Pricing shown is in USD, based on a minimum 12 month contract and includes Standard support.

Can't Wait?
Get Centrify Next-Gen Access Today

Try Centrify Next-Gen Access Free for 30-Days.