• slide
  • slide

Overview

Centrify is redefining the legacy approach to Privileged Access Management by delivering multi-cloud-architected Identity-Centric PAM to enable digital transformation at scale. Centrify Identity-Centric PAM establishes trust, and then grants least privilege access just-in-time based on verifying who is requesting access, the context of the request, and the risk of the access environment. Centrify centralizes and orchestrates fragmented identities, improves audit and compliance visibility, and reduces risk, complexity, and costs for the modern, hybrid enterprise. Over half of the Fortune 100, the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse.

Centrify is also the only pure PAM provider to achieve FedRAMP authority to operate for its Privileged Access Service, allowing government agencies to adopt Centrify’s cloud-ready service solutions and bolster mission security as they migrate an increasing amount of workloads to the cloud.

Products

  • Privileged Access Service

    Cloud-ready Zero Trust Privilege is designed to handle the rudimentary use case of privileged access management (PAM), which lies in granting access to privileged user accounts via a shared account, password or applications password and secrets vault, as well as securing remote access. Centrify Privileged Access Service allows for all of the above as well as secure administrative access via jump box, workflow-driven access requests and approvals as well as multi-factor-authentication (MFA) at the vault.

  • Authentication Service

    Cloud-ready Zero Trust Privilege is designed to handle requesters that are not only human but also machines, services and APIs. There will still be shared accounts, but for increased assurance, best practices now recommend individual identities, not shared accounts, where least privilege can be applied. Centrify Authentication Service allows properly verifying who requests privileged access. This can be achieved by leveraging enterprise directory identities, eliminating local accounts and decreasing the overall number of accounts and passwords, therefore reducing the attack surface.

  • Privilege Elevation Service

    Centrify Privilege Elevation Service minimizes the risk exposure to cyber-attacks caused by individuals with too much privilege. The service allows customers to implement just enough, just-in-time privileged access best practices and in turn limiting potential damage from security breaches.

  • Audit & Monitoring Service

    For privileged sessions it is best practice to audit everything. With a documented record of all actions performed it not only can be used in forensic analysis to find exactly the issue and attribute it to a specific user and session. Because these sessions are so critical it is also best practice to keep a video recording of the session that can be reviewed or used as evidence for your most critical assets or in highly regulated industries. With the Centrify Audit and Monitoring Service monitoring and session recording can be achieved through either a gateway-based and/or host-based technique. Advanced monitoring capabilities even allow for process launch and file integrity monitoring.

  • Privilege Threat Analytics Service

    Cyber adversaries are getting more and more sophisticated and therefore it is best practice to apply multiple security layers when protecting against privileged access abuse. Today’s threatscape requires security controls to be adaptive to the risk-context and to use machine learning to carefully analyze a privileged user’s behavior. Leveraging Centrify Privilege Threat Analytics Service can make the difference between falling victim to a break or stopping it in its tracks.

Contracts

Federal

SEWP V

NNG15SC03B/NNG15SC27B
May 01, 2015- Apr 30, 2020

Education

Massachusetts Higher Education Consortium (MHEC)

MC15-04
Aug 10, 2019- Jun 30, 2022
*Additional Option Years Available

Events

Upcoming Events


Live Webinar - Cloud PAM Confidence

September 15, 2020 at 11:00 AM ET


Live Webinar - IT Executive PAM Panel

September 23, 2020 at 11:00 AM


Archived Events

News

Latest News

Carahsoft Technology Corp., The Trusted Government IT Solutions Provider®, today announced a distribution partnership with Centrify, a leading provider of Identity-Centric Privileged Access ...
READ MORE >

Resources

Case Study

Ensure easy CAC smart card authentication across all Windows and Linux systems. Eliminate the need to provide root access to end users, with a FIPS 140-2 certified solution in accordance with HSPD-12 regulations.

The Department of Technology, Management and Budget (DTMB) is an arm of the Michigan State government responsible for the management of technologies for 19 peer agencies and several non-governmental entities.DTMB selected Centrify Zero Trust Privilege Services to help meet federal/industry complianc...

Datasheet

For privileged sessions, it is of course best practice to audit everything. With a documented record of allactions performed, audit logs not only can be used in forensic analysis to find exactly the issue, but alsoto attribute actions taken to a specific user. Because these sessions are so critical,...

databases, and network devices which all resided inside a well-defined boundary. Nowadays, privileged accessmanagement (PAM) must handle requesters that are not only human but also machines, services, and APIs.There will still be shared accounts, but for increased assurance, best practices now recom...

As organizations continue their digital transformation journeys, they struggle to manage an infrastructure that is fragmented across hybrid- and multi-cloud environments, resulting in data breaches, audit findings, and unnecessary overhead costs.Centrify enables digital transformation at scale, mode...

Over the past few years, it’s clear that attackers are no longer “hacking” in for data breaches: theyare simply logging in using weak, stolen, or otherwise compromised privileged credentials. Oncein, they take advantage of the fact that many organizations assign too much standing privilegeto t...

Zero Trust Privilege controls need to be adaptive to the risk-context. Gartner promotes CARTA – Continuous,Adaptive, Risk, and Trust Assessment – and it’s absolutely required for privileged access too. Zero TrustPrivilege means knowing that even if the right credentials have been entered by a ...

Over the last few years, it’s become evident that cyber-attackers are no longer “hacking” tocarry out data breaches — they are simply logging in by exploiting weak, default, stolen, orotherwise compromised privileged credentials. To add to this challenge, the attack surface oforganizations h...

For privileged sessions, it is of course best practice to audit everything. With a documented record of allactions performed, audit logs not only can be used in forensic analysis to find exactly the issue, but alsoto attribute actions taken to a specific user. Because these sessions are so critical,...

E-Book

Explore Zero Trust Privilege use cases, asses your Zero Trust Privilege maturity level, and create a road map to Zero Trust Privilege.