ACTIVE DIRECTORY BRIDGE
Manage Identities for Cross-platform Systems in Active Directory
Secure Linux, UNIX, Mac and mobile devices with the same consistent identity management services currently deployed for your Windows systems. An integrated set of tools centralizes discovery, management and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory.
MFA for Privileged Access
Reinforce Secure Access to Critical Systems
Add an extra layer of security to protect against hackers by configuring multi-factor authentication (MFA) for IT administrators who access Windows, Linux and UNIX systems and require elevated privileges. Define authentication profiles with a selection of authentication challenges that will be trusted.
Access Request for Privileged Roles
Self-service Role Requests for Just-in-Time Privilege
Reduce the damage of a security breach by granting just-in-time privilege and just-enough-privilege through temporary and time-bound access to critical systems. Request and multi-tiered approval workflow system governs access for both privileged accounts and privileged roles, and automatically revokes an entitlement upon time allotment expiration.
Simplify Privilege Management for Windows, Linux and UNIX
Secure mission-critical servers from identity-related insider risks and outsider attacks. Simplify the implementation of a least privilege access model across Windows, Linux and UNIX systems. Streamline the creation and management of administrative roles and rights with a robust set of tools that automate much of the process.
AUDITING AND COMPLIANCE
Detailed Monitoring and Reporting of Privileged Sessions
Eliminate anonymous activity by associating all privileged activity with an individual vs. a shared account. Monitor real-time changes to critical system files such as SSH keys to prevent spoofed or bypassed access. Unique session auditing, video replay, search capabilities and comprehensive compliance reporting establish accountability and streamline regulatory compliance. IT teams can pinpoint suspicious activity, troubleshoot system failures, and perform forensic investigations into breaches.
Dynamically Segment and Isolate Cross-Platform Systems
Prevent unauthorized access to trusted computing resources and data, add policy-driven protection against network attacks for mixed Windows, Linux and UNIX environments and improve regulatory compliance. Secure access to sensitive information by isolating and protecting systems and by enabling end-to-end encryption of data-in-motion without the need for costly and complex network devices.
CENTRIFY PRIVILEGE SERVICE
Access and Password Management for the Modern Enterprise
Combines the ability to securely manage and audit access to infrastructure with shared account password management for internal users, outsourced IT and third party vendors. Includes choice of cloud or on-premises deployment.
Centrify’s Identity Management for Privileged Users
Choose the Capabilities That are Right for Your Business
|Server Suite Standard Edition||Server Suite Enterprise Edition||Server Suite Platinum Edition||Privilege Service|
|Free Trial||Free Trial||Free Trial||Free Trial|
|MFA for Privileged Access 1||X||X||X||X|
|Auditing and Compliance||X||X|
|Secure Remote Access||X|
|Shared Password Management||X|
|Privileged Access Request 2||X||X||X||X|
|App Password Management 2||X||X||X||X|
|Privileged Session Monitoring||X|
|1 Requires Server Suite plus Privilege Service or Identity Service
2 Requires both Server Suite and Privilege Service