Multi-factor Authentication Across Your Enterprise
Passwords are the weakest link in your security. They offer inadequate protection against cyber attacks, data breaches and fraud. Centrify strengthens security with adaptive multi-factor authentication (MFA) across enterprise identities and resources — without frustrating users.
What is Multi-factor Authentication?
Multi-factor authentication (MFA) adds a layer of security that allows companies to protect against the leading cause of data breach — compromised credentials. Users provide extra information or factors when they access corporate applications, networks and servers. Multi-factor authentication uses a combination of the following factors:
Smartphone, one-time passcode or Smart Card
Biometrics, like your fingerprint, retina scans or voice recognition
Why MFA Everywhere?
With so many credentials having been compromised and made available to attackers, password-based security is no longer effective. Because multi-factor authentication (MFA) requires multiple methods for identification, it’s one of the best ways to prevent unauthorized users from accessing corporate data.
But applying MFA for only certain apps, users, or resources, still leaves your organization exposed. Implementing MFA across every user (end-users and privileged users), and every IT resource (cloud and on-premises apps, VPN, endpoints, servers and privilege elevation) blocks cyberattacks at multiple points in the attack chain — and protects against compromised credentials.
Benefits of Centrify Multi-factor Authentication
- Bolster security for every enterprise user — end and privileged users, internal and external
- Balance convenience, cost and security with adaptive MFA
- Eliminate security gaps with one consistent set of authentication policies
- Protect across enterprise resources — cloud and on-prem apps, VPNs, endpoints, servers, privilege elevation and more
- Reduce cost and complexity with an integrated identity platform
- Make MFA easy for your users
Centrify Multi-factor Authentication Solutions
Secure App Access
Users need anytime, anywhere access to their apps — cloud, mobile and on-premises. As the number of apps grow, so does password risk, making strong authentication even more critical. Centrify helps mitigate password risk with adaptive multi-factor authentication integrated with single sign-on (SSO).Learn More
Stronger security is good, but not if it slows your users down. You need stronger and smarter security based on context. Centrify allows you to progressively challenge for MFA with flexible, context-based policies. Incorporate location, device details, network, time of day, user attributes and more. Thwart attackers, not your users.Learn More
Secure VPN Access
Today’s mobile and remote workforce needs anytime access. VPNs are one way companies provide that access. But any behind the firewall access poses a significant security risk. A number of high profile data breaches started with attackers compromising VPN credentials. Centrify lets you reduce VPN risk with multi-factor authentication for any VPN that supports RADIUS.Learn More
Secure Windows PCs
Granting access to Windows PCs with just a password presents a huge risk to businesses. Centrify integrates hassle-free MFA for Windows login to stop password-based attacks. Thanks to adaptive MFA and integrated SSO, IT gets added security, and users get easy access to the apps and endpoints they need – with just their domain credentials.Learn More
Secure Privileged Access
IT administrators who access critical resources are a common attack point to reach your corporate “keys to the kingdom.” By adding a second authentication factor requirement to security policies, attackers are unable to gain privileged access without possessing the physical device or email address needed to complete the authentication process.Learn More
The fact that your single sign-on provider can also be your mobile device management provider and your multi-factor authentication provider is definitely a positive. In modern IT, you have to cover a lot of bases with a lot of overlap, and dealing with one vendor rather than two or three is optimal.Luis Mena, Director of IT at Early Learning Coalition
We’ve gained increased visibility and control over cloud and mobile apps and devices by using granular, per-app access policy and multi-factor authentication.Alessandro Figueiredo, CISO at SulAmérica
Our remote users are leveraging Centrify’s multi-factor authentication to gain access. It has simplified the process for them, made us more secure and also helped us to maintain compliance with GLBA regulations.Ledale Reynolds, CIO, The Citizens Bank of Philadelphia
How Centrify MFA Compares to Others
|Multi-factor Authentication for...||Centrify||Cloud MFA vendors||Cloud SSO vendors|
|Cloud apps (SaaS)||X||X||X|
Centrify Identity Platform
Protect against the leading cause of cyberthreats — compromised credentials — with a complete set of solutions to secure the modern enterprise.
- All Users: Employees, contractors, privileged users, partners, customers
- All Apps: Cloud or on premises
- All Resources: Network infrastructure, outsourced IT, Mac and mobile devices
solutions briefMulti-factor Authentication
best practices briefStrengthening App Security with Multi-factor Authentication
webinarMulti-factor Authentication Everywhere: A Platform Approach to Defending Against Breaches