Identity Consolidation, Privilege Management and Audit

Combines comprehensive bridging of Linux and UNIX systems to Active Directory with powerful privilege management, multi-factor authentication and session monitoring across Windows, Linux and UNIX systems. Net result is increased security, improved compliance and comprehensive reporting and auditing.

Benefits of Unified Identity Management Across Windows, Linux and UNIX Systems

Benefits for Executives

Reduce risk of security breach
Protect critical information and minimize attack surface by providing only necessary access levels to IT systems.

Make compliance efforts efficient and effective
Easily prove who has access to what IT resource, and how that access is used across the enterprise.

Accelerate time-to-value with a proven partner
Achieve rapid value through an experienced identity management leader with over 5,000 customers.

Thwart in-progress attacks via MFA
Stop attackers using stolen credentials with multi-factor authentication (MFA).

BENEFITS FOR IT LEADERS

Increase security and accountability
Associate privileged activity with an individual versus a shared account when users log in as themselves and elevate privilege as needed.

Speed deployment and reduce integration costs
Deliver identity consolidation, MFA, privilege management, auditing and reporting for Windows, Linux and UNIX systems with one solution.

Improve operating efficiencies and lower TCO
Leverage existing investments in technology and skill sets. Productivity improves when access, privilege and audit policies are managed from a centralized point of control — Active Directory.

Sustain compliance and simplify IT audits
Streamline the audit process via a 360-degree view of what users can access and when, and record their activities.

BENEFITS FOR IT USERS

Easily access servers and applications
Administrators log in through Active Directory and get secure SSO access and the privileges they need across Windows, Linux and UNIX servers and applications.

Administer servers, apps and services the way you always have
Administrators log in as themselves and seamlessly elevate privilege as required to do their job without disruption to their current routines.

Get the access you need
Centrally managed access assigned through roles provides users with faster access and fewer time-consuming errors — all through your existing Active Directory infrastructure.

ACTIVE DIRECTORY BRIDGE

Manage Identities for Cross-platform Systems in Active Directory

Secure Linux, UNIX, Mac and mobile devices with the same consistent identity management services currently deployed for your Windows systems. An integrated set of tools centralizes discovery, management and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory.

Learn More

MULTI-FACTOR AUTHENTICATION FOR SERVERS

Reinforce Secure Access to Critical Systems

Add an extra layer of security to protect against hackers by configuring multi-factor authentication (MFA) for IT administrators who access Windows, Linux and UNIX systems and require elevated privileges. Define authentication profiles with a selection of authentication challenges that will be trusted.

Learn More

PRIVILEGE MANAGEMENT

Simplify Privilege Management for Windows, Linux and UNIX

Secure mission-critical servers from identity-related insider risks and outsider attacks. Simplify the implementation of a least privilege access model across Windows, Linux and UNIX systems. Streamline the creation and management of administrative roles and rights with a robust set of tools that automate much of the process.

Learn More

AUDITING AND COMPLIANCE

Detailed Monitoring and Reporting of Privileged Sessions

Eliminate anonymous activity by associating all privileged activity with an individual vs. a shared account. Unique session auditing, video replay, search capabilities and comprehensive compliance reporting establish accountability and streamline regulatory compliance. IT teams can pinpoint suspicious activity, troubleshoot system failures, and perform forensic investigations into breaches.

Learn More

SERVER ISOLATION

Dynamically Segment and Isolate Cross-Platform Systems

Prevent unauthorized access to trusted computing resources and data, add policy-driven protection against network attacks for mixed Windows, Linux and UNIX environments and improve regulatory compliance. Secure access to sensitive information by isolating and protecting systems and by enabling end-to-end encryption of data-in-motion without the need for costly and complex network devices.

Learn More

BEST PRACTICES

Get Users to Log in as Themselves,
while Maximizing Control over Privileged Accounts

Best Practices for Privileged Identity Management

CENTRIFY PRIVILEGE SERVICE

Access and Password Management for the Modern Enterprise

Combines the ability to securely manage and audit access to infrastructure with shared account password management for internal users, outsourced IT and third party vendors. Includes choice of cloud or on-premises deployment.

Learn More

Centrify’s Identity Management for Privileged Users

Choose the Capabilities That are Right for Your Business

  Server Suite Standard Edition Server Suite Enterprise Edition Server Suite Platinum Edition Privilege Service
Free Trial Free Trial Free Trial Free Trial
Identity Consolidation X X X
MFA for Servers 1 X X X X
Privilege Management X X X
Auditing and Compliance X X
Server Isolation X
Secure Remote Access X
Shared Password Management X
Privileged Access Request X
App Password Management 2 X X X X
Privileged Session Monitoring X
1 Requires Server Suite plus Privilege Service or Identity Service
2 Requires both Server Suite and Privilege Service
English