SECURE REMOTE ACCESS
Secure Remote Access to Infrastructure without a VPN
Provide remote administrators, outsourced IT and third party vendors with secure access to the specific servers and network equipment they manage — on-premises and in the cloud. Context-aware multi-factor authentication combined with VPN-less access and a choice of deployment models deliver the robust security your hybrid IT environment demands.
SHARED ACCOUNT PASSWORD MANAGEMENT
Simplified Management of Privileged and Shared Account Passwords
Secure and manage super user and service accounts on servers and network devices, both on-premises and in the cloud. Auto-rotate passwords after checkout. Provide security for the modern enterprise where IT is increasingly outside the firewall with a secure service that is faster to implement and delivers quicker ROI.
PRIVILEGED ACCESS REQUEST
Time-bound and Monitored Access to Privileged Accounts
Minimize your attack surface with governed access to privileged roles, account credentials and remote sessions. Keep control with request and multi-level approval workflows, time-bound access and privileged session monitoring. Capture who requested access and who approved it, and easily reconcile approved access with actual access by internal users, outsourced IT and third party vendors for privileged access governance.
Identity Flexibility for the Hybrid Cloud
Simplify user authentication to Linux servers from any directory service including Active Directory, LDAP or cloud directories such as Google's. Organizations can take advantage of the benefits of the cloud without compromising the level of privileged access security and enterprise access they currently have on-premises.
PRIVILEGED SESSION MONITORING
Detailed Monitoring and Reporting of Privileged Sessions
Consistently monitor privileged sessions, whether using shared accounts or user accounts with privilege elevation, for servers and network devices, both on-premises and cloud-based. Establish accountability and streamline regulatory compliance through session auditing, video replay, search capabilities and comprehensive compliance reporting. IT teams can pinpoint suspicious activity, troubleshoot system failures, and perform forensic investigations into breaches.
Centrify’s Identity Management for Privileged Users
Choose the Capabilities That are Right for Your Business
|Server Suite Standard Edition||Server Suite Enterprise Edition||Server Suite Platinum Edition||Privilege Service|
|Free Trial||Free Trial||Free Trial||Free Trial|
|MFA for Privileged Access 1||X||X||X||X|
|Auditing and Compliance||X||X|
|Secure Remote Access||X|
|Shared Password Management||X|
|Privileged Access Request 2||X||X||X||X|
|App Password Management 2||X||X||X||X|
|Privileged Session Monitoring||X|
|1 Requires Server Suite plus Privilege Service or Identity Service
2 Requires both Server Suite and Privilege Service