Regulatory Compliance
Centrify addresses the specific requirements of key industry regulations with a unified identity platform that helps you control, audit and report on access to sensitive data while reducing complexity and keeping users productive.
What is Regulatory Compliance?
In order to reassure the public that confidential data such as credit cards and health records are kept private, many industries must adhere to specialized security and auditing regulations.
Grant access and privileges based on business need-to-know
Enforce separation of duties and grant just the privileges needed
Capture and report on user activity with detailed session recordings

Why Regulatory Compliance?
Major industry compliance regulations require companies and agencies to link access controls, provide role-based privileges and track user activity to identifiable users. Failure to comply can lead to penalties or the loss of business accreditations, as well as public loss of confidence that can affect brand and image. Companies need a cost-effective solution that leverages existing infrastructure and enables consolidated, centralized management of user identities combined with user authentication, role-based access control, and session recording and reporting services to meet compliance auditing requirements.
Benefits
Regulatory Compliance Solutions
PCI-DSS
Address rigorous reporting requirements for the Payment Card Industry’s Data Security Standard (PCI DSS) with scheduled, packaged and customizable attestation reports representing “who has access to what” and detailed privileged session auditing.
SOX
Simplify Sarbanes-Oxley auditing requirements with a cost-effective solution that leverages existing identity infrastructure.
Monetary Authority of Singapore
Implement granular, role-based security, session audits and access controls on audited systems, providing the level of accountability required by MAS Technology Risk Management guidelines.
Centrify Identity Platform
Protect against the leading cause of cyberthreats — compromised credentials — with a complete set of solutions to secure the modern enterprise.
- All Users: Employees, contractors, privileged users, partners, customers
- All Apps: Cloud or on premises
- All Resources: Network infrastructure, outsourced IT, Mac and mobile devices