CENTRIFY IDENTITY SERVICE
Enterprise Mobility Management
Gain control of mobile access with integrated enterprise mobility management (EMM). Manage devices. Secure native mobile apps. Provide context for smarter access decisions.
Mobile Device Management
Whether corporate-owned or BYOD, providing secure application access starts with securing and managing devices. Automatically push email, Wi-Fi and VPN settings, and ensure device compliance. Manage passcodes, remotely lock and wipe, and leverage device posture for app SSO policy — Complete EMM, integrated with identity.
Mobile Application Management
Apps are in the cloud, but they’re accessed from users’ pockets. Whether from the app stores or an enterprise catalog, Centrify combines user identity, device posture and IT policy to provision apps, provide single sign-on and revoke access to native mobile and cloud apps — unifying mobile application management with identity policy.
Device Security and App Policy
Secure access policy for cloud apps is much more than just single sign-on. By integrating identity policy with EMM, you can leverage device attributes, location, network, as well as user and device certificates to ensure that your application data is protected from unauthorized access.
Smartcard Derived Credentials
Smartcards are a highly secure alternative to passwords, but the physical cards don’t work with mobile devices. Centrify lets you use derived credentials for smartcard-based, compliant single sign-on to your mobile apps — without cumbersome readers.
Manage Devices that Matter to Your Business
Leverage Apple's managed application features to secure BYOD or corporate-liable iPhones and iPads in your business
Deploy apps into private KNOX workspaces on Samsung devices and protect and manage corporate data separately from personal apps
Take Control of Mobile and SAAS
Mobile is driving the adoption of SaaS applications. This is good news for users because they want the latest devices and apps, but it's a management problem for IT who have to ensure that users gain productivity, without sacrificing business security.