Centrify
About
Centrify
Centrify is a company that specializes in identity-centric privileged access management (PAM) and identity management solutions. Their platform aims to help organizations secure their critical systems, applications, and data by managing and controlling access to privileged accounts and sensitive information.
Centrify key offerings
01
Centrify
Privileged
Access Service
This solution focuses on securing privileged accounts and access to critical systems. It includes features for managing and rotating passwords, enforcing least privilege access, monitoring privileged sessions, and implementing multi-factor authentication for privileged users.
02
Centrify
Identity
Service
Centrify Identity Service provides comprehensive identity management capabilities, including single sign-on (SSO), multi-factor authentication (MFA), user provisioning, and access governance. It helps organizations centralize identity management across cloud, mobile, and on-premises environments.
03
Centrify
Authentication
Service
This product offers centralized authentication services for securing access to Unix, Linux, and Windows systems. It enables organizations to enforce strong authentication policies and manage access controls for users and privileged accounts across heterogeneous IT environments.
04
Centrify
Privilege
Elevation
Service
This service provides just-in-time privilege elevation and access request workflows. It allows organizations to grant temporary elevated privileges to users or applications based on predefined policies and workflows, reducing the risk of unauthorized access.
05
Centrify Infrastructure Service
Formerly known as Centrify Server Suite, this product focuses on securing access to servers, containers, and workloads in on-premises and cloud environments. It includes features for identity consolidation, privileged access management, and session monitoring to protect critical infrastructure.
06
Centrify
Endpoint
Service
This solution helps organizations secure endpoints, such as desktops, laptops, and mobile devices, by implementing advanced endpoint security controls, including device authentication, application whitelisting, and threat detection and response capabilities.