Mission Possible: Secure and Productive Compliance to Federal Regulations
Centrify has an extensive history of delivering data center, cloud and mobile solutions for the federal market.
Trusted by 100+ Top Government Agencies
Listen to Centrify on Federal News Radio
Greg Cranley is a Vice President Federal & Public Sector Sales. A 30 year IT veteran that has specialized in the issues of security and compliance for the public sector market for the last 15 years. An active presenter and blogger on cybersecurity and access management, he focuses on how public sector organizations can best deal with the multitude of federal cyber security compliance requirements while conceptualizing strategies against multi-pronged attacks.
Listen to Greg's podcast: http://federalnewsradio.com/identity
See Greg in action at The Institute for Critical Infrastructure Technology panel discussion (C-SPAN)
Achieve Federal Compliance Mandates with Centrify
DHS CDM Phase 2
Address the requirements for DHS CDM Phase 2 that ensures all federal agency associates only have access to servers, applications or network resources based on their unique role and responsibility within their organization.
Facilitate compliance measures to address key Federal Information Security Management Act requirements on Windows, UNIX and Linux systems while ensuring users are individually identifiable and accountable for access to shared apps.
Other Federal Compliance Mandates
Major compliance regulations require agencies to link access controls, role-based privileges and user activity to named users. Centrify addresses these IT security and compliance requirements with a unified identity management solution that addresses key regulations such as:
Centrify Federal Resellers
Centrify works with licensed partners to provide the right solution that best fits your environment.
FISMA Compliance through Centralized IAM Leveraging Active Directory
The Federal Information Security Management Act (FISMA) lays out a comprehensive set of security requirements for federal IT managers. While it is a complex process, its core IAM requirements come down to common sense and well established principles that can be addressed through a strategy of centralized management, policy enforcement and continuous monitoring.