English

DEVICE MANAGEMENT

Unified Endpoint Management Across All Endpoint Platforms

Help organizations stop breaches that start on endpoints by empowering users with self-service while ensuring users are not running with too much privilege.

Minimize Endpoint Threat Vectors, While Enabling
Device Choice and Secure App Access

Combine device posture with access policy for next-dimension, context-based security

Ensure your data is safe with full Enterprise Mobility Management (EMM) including remote lock and wipe capability across devices

Eliminate password re-use with Local Administrator Password Management

Enable secure BYOD, with simple device enrollment and integrated single sign-on to business apps

Cloud-based policy enforcement for remote BYOD & corporate laptops & mobile devices

Single managed identity for users that leverages existing infrastructure

Unified Cross Platform Management

Unified endpoint management enables you to provide consistent security and configuration policy for Windows, Mac, Linux, iOS and Android endpoints and deliver a common user experience for accessing cloud and on-premises apps with multi-factor authentication and single sign-on. With identity and security at the core, you can ensure only your trusted and secured systems have access to your data.

Local Administrator Password Management

One of the most common IT security deficiencies is the usage of a single local administrator password that is shared across all endpoints. This is a significant security concern as this password is inevitably shared or leaked. Additionally, when IT staff leave the organization, they often retain the knowledge of the admin account for all endpoints. Centrify provides a solution generating a strong and unique password for each endpoint and storing it securely in the Centrify Infrastructure Services. The password is rotated periodically and authorized personnel can check out the password upon request.
Learn More

Centrally-controlled Security

Reduce security and compliance risk with centrally managed security policies for endpoints. Administrators can manage PKI certificates, 802.1x settings, Wi-Fi security, VPN setup as well as FileVault2 disk encryption. Further secure your Mac and Linux systems with smart card authentication to Active Directory for compliance with security standards and mandates.

Learn More

Mobility Management

Gain control of mobile access with integrated enterprise mobility management (EMM). Minimize application and endpoint threats. Manage devices. Secure native mobile apps. Provide context for smarter access decisions. Improve mobile productivity.

Learn More

Group Policy and Cloud-based Policy Enforcement

Enforce security and configuration policy from Active Directory Group Policy or from the cloud to ensure your endpoints meet your security requirements. Ensure best practices for firewall settings, inactivity and screensaver lock settings, disk encryption, certificate management, 802.1X and much more. Deploy login scripts and automount configurations to simplify user access to network shares.

Learn More

Active Directory-based Identity Management

Centrify provides best-in-class Active Directory support for Mac and Linux systems and users, eliminating weak passwords and security settings. This allowing IT to ensure users accessing these systems are authenticating with their Active Directory credentials and benefits the users with single sign-on to corporate resources and apps.

Learn More

Inventory and Asset Management

Keep track of all of the Macs and mobile devices in your organization and get the latest system status. Centrify Identity Service ships with a rich set of Mac-specific reports providing a clear summary of the status of all the Macs in your organization — including FileVault 2 status, Mac OS X version, last check-in time, system details, cloud enrollment status and more. Build your own reports leveraging Centrify’s rich SQL based reporting engine and data dictionary.