Secure Remote Access
Granular Control Without VPN
Provide your IT administration teams with secure, granular access to infrastructure regardless of location and without the hassles of a VPN.
Secure Access to Servers, Network Devices and IaaS
IT users launch SSH and RDP sessions for resources directly from the Admin portal or local clients. Step up authentication for identity assurance protects your critical assets.
Secure Access for Employees and Third Parties — Remote and On-site
Centrify enables you to authenticate your internal and outsourced IT users through Active Directory, LDAP and the Centrify Directory. You can use one or any combination of these identity stores or grant granular, federated privileged access to resources for business partners and third party vendors.
Grant Access to Specific Resources
Unlike a VPN that gives users visibility to the entire network, Centrify enables you to grant access to resources on a per-resource basis. Give your most privileged internal IT admins access to as much of your infrastructure as necessary, while limiting access by an outsourced team to only the servers and network hardware their role requires.
Secure Remote Access that Follows Your Administrators
Your IT admins can log in and securely access resources from any location that can reach the Infrastructure Services. For user logins outside the corporate network, you can require multi-factor authentication for security stronger than a user name and password.
Strengthen Protection for Privileged Access to Critical Systems with Risk-based MFA
Guard against cyberattacks by combining risk-level with role-based access controls, user context and multi-factor authentication (MFA) to enable intelligent, automated and real-time decisions for granting privileged access to users who are remotely accessing servers, on password checkout or when using a shared account to log into remote systems.
Managing Privileged Access Security in a Hybrid IT World
Centrify commissioned Forrester Consulting to examine how IT decision-makers are both securing and granting privilege to identities in cloud-based environments. Forrester’s research included in-depth surveys with 150 IT decision-makers in the US, and discovered that the ubiquity of outsourced and remote identities is too large of a concern to overlook.