At Centrify, nothing is more important than earning, and keeping, the trust of our customers.
Centrify was founded to secure businesses based on identity. We take pride in building solutions that help our customers protect their businesses, secure their data, and prove their compliance with critical regulations. That’s why, when we built our cloud platform, we held ourselves to the highest standards.
We hold ourselves accountable to three core pillars that define our strategy for building and keeping customers’ trust:
Centrify knows that data security is the most important part of any cloud service.
We start by allowing customers to determine what parts of their identity data they want to keep behind their own firewall. We then certify our cloud solutions with quarterly 3rd-party audits, and are proud to have maintained consistent SSAE16 SOC2 certification since launch.
Additionally, we have chosen Microsoft’s Azure platform to gain the security benefits of their ISO 27001 and FedRAMP certifications. We then continuously monitor our services and incorporate the latest security innovations to ensure our customers can trust our cloud.
Designed from day one to be fully multi-tenant, our cloud has to support the privacy needs of every one of our customers, from global fortune 50 banks, to international healthcare providers. We encrypt each customer’s data with unique 2048-bit keys, and further prove our compliance with Truste and SafeHarbor validation.
Because our customers are 24x7, global enterprises, we had to design a cloud service that met those needs.
We have three layers of redundancy to provide the highest levels of availability:
- All customer data is encrypted and backed up in three redundant local systems, for immediate local failover to hot backup
- All customer data is additionally backed up to another datacenter within the same continent, for global failover if needed
- Centrify leverages Microsoft Azure datacenters, to take advantage of their best practices for fault tolerance and always-on availability
Centrify has over 5,000 customers who trust the authentication and privilege management that we provide across their data centers, devices, and cloud apps. We take that trust very seriously, and are committed to helping our customers bolster their security, based on identity.
“Centrify makes customer privacy job one – whether for our small business or fortune 50 customers. We take your identity and privacy as seriously as we take our own.”
– Tom Kemp, Founder and CEO, Centrify
SOC 2 Type II Compliance
Centrify has successfully passed an independent audit against the rigorous SSAE 16 SOC 2 Type II standard and achieved compliance, a prestigious accomplishment showcasing Centrify’s longstanding commitment to securing customer data. Information security is far reaching and ingrained into Centrify’s culture and is evident from design of the service and infrastructure to the processes and people. Furthermore, achieving compliance demonstrates Centrify’s dedication to both its existing high security standards and Centrify’s ability to quickly and effectively raise the bar and adapt to the changing information security climate.
TRUSTe and SafeHarbor
Centrify also complies with the U.S. — E.U. Safe Harbor framework and the U.S. — Swiss Safe Harbor framework as set forth by the U.S. Department of Commerce regarding collection, use and retention of personal data from European Union member countries and Switzerland. You can learn more about the Safe Harbor program and view our certification by visiting the Safe Harbor website.