Digital transformation is changing the enterprise IT landscape, creating increased complexity as organizations leverage modern technologies such as the cloud, big data, DevOps, containers, and microservices. Privileged access abuse is the most common way these services are breached, but traditional vault-centric PAM solutions were never designed to accommodate these hybrid models and modern use-cases.
Centrify is different. It’s identity-centric approach to PAM mandates a “never trust, always verify, enforce least privilege” model that assures only authorized individuals, machines, or services access the right resources, at the right times, and for the right reasons. Administrators are no longer given carte-blanch access to superuser accounts. Using their own, individual account with minimum rights, they request access only when needed. Each request, whether from inside or outside the organisation (e.g., outsourced IT), is granted or denied according to who is making the request, the context, and the risk of the access environment.
Centrify provides:
- The two core PAM capabilities – privilege elevation and vaulting (as-a-Service or customer-managed on-premises)
- Support for more than 450 platforms and the broadest range of operating systems
- Secure vaulting of shared privileged account passwords, SSH keys, and secrets
- Secure, VPN-less remote login for internal administrators, outsourced IT, or third-party vendors
- Multi-factor authentication (MFA) at all major access control decision points with optional adaptive MFA based on behavioral risk profiling
- Centralized management of Windows, Linux, and UNIX computers, users, and roles from Active Directory
- RESTful APIs, CLIs, and PowerShell cmdlets allowing DevOps and other automated A2A functions to obtain ephemeral tokens for authentication
- Workflow-based access request for just-enough privilege, just-in-time, avoiding standing privileges
- Full video recording of every privileged session, for forensic auditing and compliance
Centrify leads the way in privileged access management and is used by over half of the Fortune 100.