Centrify Identity Service improves end-user productivity and secures access to cloud, mobile and on-premises apps via single sign-on, user provisioning and multi-factor authentication. Supports internal users (employees, contractors) and external users (partners, customers). Manage apps, mobile devices and Macs via Active Directory, LDAP or cloud identity stores.
One-click access to your cloud, mobile and on-premises apps. No more forgotten passwords, no more user confusion. Supports internal users (employees, contractors) and external users (partners, customers).
Centrify Identity Service provides turnkey SSO access to thousands of popular apps and adding your own takes just seconds with Infinite Apps.
From the day they start to the day they depart, manage employees’ access to all their apps from any source: Active Directory, LDAP, Cloud Directory or external identity.
Create accounts, automate app requests with workflows and revoke access from all devices when necessary — from a central control point.
Leverage your users’ mobile devices as a second factor for app authentication. SMS, email, voice or secure OTP — implement MFA without the hassle.
Centrify Identity Service provides context-aware, step-up authentication based on per-app policy. Without the hassle for your users.
Identity-based policy is the lifeblood of BYOD. Secure and manage the devices used to access cloud and mobile apps through fully-integrated mobile device and app management capabilities.
Push apps, policy, certificates and more — and pull it all back when devices are lost or stolen.
Join Macs to Active Directory, and provide SSO to your Mac users. Leverage Active Directory Group Policy to manage Macs just like Windows machines.
Lock and wipe remote Macs, and control FileVault2 encryption. Apply granular OS X policies. Leverage identity to securely manage Macs in your business.
Combines the ability to securely manage and audit access to infrastructure with shared account password management for internal users, outsourced IT and third party vendors. Includes choice of cloud or on-premises deployment.
Better manage vendor access
Enable secure remote access to data center and cloud-based infrastructures for internal users, third party vendors and outsourced IT through a cloud service or on-premises deployment.
Reduce risk of security breach when sharing privileged accounts
Minimize risks associated with privileged accounts — that are increasingly the focus of hackers and malicious insiders — by enforcing centralized control and multi-factor authentication when accessing shared credentials.
Simplify compliance efforts for privileged accounts
Leverage privileged session monitoring and access reporting to make compliance efforts for privileged accounts efficient and effective.
Increase access security
Grant internal and outsourced IT secure remote access to the specific data center and cloud-based infrastructure they manage without the increased risk of giving out full VPN access.
Enforce centralized control over privileged accounts
Control who can access privileged account credentials, audit all password check-in/check-out and record privileged sessions leveraging a cloud service, private cloud or data center deployment.
Enable cost effective compliance and audits for privileged accounts
Easily prove compliance with reports showing who has access to privileged and shared accounts and who has used them, supported by full video capture of privileged sessions.
Easily access servers and network infrastructure
Gain access to servers and network infrastructure without the need to establish a VPN connection to the data center or cloud.
Get the access you need
Single service for accessing shared administrative account credentials and single-click access to the infrastructure you manage in the data center and the cloud.
Single location for emergency access to super-user passwords
Get emergency access to super-user passwords for servers and network infrastructure to support break-glass scenarios.
Provide remote administrators, outsourced IT and third party vendors with secure access to the specific servers and network equipment they manage — on-premises and in the cloud. Context-aware multi-factor authentication combined with VPN-less access and a choice of deployment models deliver the robust security your hybrid IT environment demands.
Secure and manage super user and service accounts on servers and network devices, both on-premises and in the cloud. Auto-rotate passwords after checkout. Provide security for the modern enterprise where IT is increasingly outside the firewall with a secure service that is faster to implement and delivers quicker ROI.
Minimize your attack surface with governed access to privileged account credentials and remote sessions. Keep control with request and approval workflows, time-bound access and privileged session monitoring. Capture who requested access and who approved it, and easily reconcile approved access with actual access by internal users, outsourced IT and third party vendors for privileged access governance.
Simplify user authentication to Linux servers from any directory service including Active Directory, LDAP or cloud directories such as Google’s. Organizations can take advantage of the benefits of the cloud without compromising the level of privileged access security and enterprise access they currently have on-premises.
Consistently monitor privileged sessions, whether using shared accounts or user accounts with privilege elevation, for servers and network devices, both on-premises and cloud-based. Establish accountability and streamline regulatory compliance through session auditing, video replay, search capabilities and comprehensive compliance reporting. IT teams can pinpoint suspicious activity, troubleshoot system failures, and perform forensic investigations into breaches.
Combines comprehensive bridging of Linux and UNIX systems to Active Directory with powerful privilege management, multi-factor authentication and session monitoring across Windows, Linux and UNIX systems. Net result is increased security, improved compliance and comprehensive reporting and auditing.
Reduce risk of security breach
Protect critical information and minimize attack surface by providing only necessary access levels to IT systems.
Make compliance efforts efficient and effective
Easily prove who has access to what IT resource, and how that access is used across the enterprise.
Accelerate time-to-value with a proven partner
Achieve rapid value through an experienced identity management leader with over 5,000 customers.
Thwart in-progress attacks via MFA
Stop attackers using stolen credentials with multi-factor authentication (MFA).
Increase security and accountability
Associate privileged activity with an individual versus a shared account when users log in as themselves and elevate privilege as needed.
Speed deployment and reduce integration costs
Deliver identity consolidation, MFA, privilege management, auditing and reporting for Windows, Linux and UNIX systems with one solution.
Improve operating efficiencies and lower TCO
Leverage existing investments in technology and skill sets. Productivity improves when access, privilege and audit policies are managed from a centralized point of control — Active Directory.
Sustain compliance and simplify IT audits
Streamline the audit process via a 360-degree view of what users can access and when, and record their activities.
Easily access servers and applications
Administrators log in through Active Directory and get secure SSO access and the privileges they need across Windows, Linux and UNIX servers and applications.
Administer servers, apps and services the way you always have
Administrators log in as themselves and seamlessly elevate privilege as required to do their job without disruption to their current routines.
Get the access you need
Centrally managed access assigned through roles provides users with faster access and fewer time-consuming errors — all through your existing Active Directory infrastructure.
Secure Linux, UNIX, Mac and mobile devices with the same consistent identity management services currently deployed for your Windows systems. An integrated set of tools centralizes discovery, management and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory.
Add an extra layer of security to protect against hackers by configuring multi-factor authentication (MFA) for IT administrators who access Windows, Linux and UNIX systems and require elevated privileges. Define authentication profiles with a selection of authentication challenges that will be trusted.
Secure mission-critical servers from identity-related insider risks and outsider attacks. Simplify the implementation of a least privilege access model across Windows, Linux and UNIX systems. Streamline the creation and management of administrative roles and rights with a robust set of tools that automate much of the process.
Eliminate anonymous activity by associating all privileged activity with an individual vs. a shared account. Unique session auditing, video replay, search capabilities and comprehensive compliance reporting establish accountability and streamline regulatory compliance. IT teams can pinpoint suspicious activity, troubleshoot system failures, and perform forensic investigations into breaches.
Prevent unauthorized access to trusted computing resources and data, add policy-driven protection against network attacks for mixed Windows, Linux and UNIX environments and improve regulatory compliance. Secure access to sensitive information by isolating and protecting systems and by enabling end-to-end encryption of data-in-motion without the need for costly and complex network devices.
© 2017 Complete Tablet Solutions. All rights reserved.