centrifyCentrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure each user’s access to apps and infrastructure through the power of identity services. This is Next Dimension Security in the Age of Access.

Centrify is enabling over 5,000 customers, including over half the Fortune 50, to defend their organizations. Founded in 2004 by Tom Kemp, Adam Au and Paul Moore, Centrify is headquartered in Santa Clara, California, with additional development and regional offices in Seattle, Hong Kong, Japan, London, Munich, Melbourne and Sao Paulo.

Secur is a Centrify Platinium partner based in South Africa, offering Centrify implementation, integration and support services, these services can be offered even in Botswana, Lesotho, Namibia, Kenya and Nigeria

Centrify Privileged Access Management:
Don’t Let PAM Stall Your Cloud Transformation Projects

Cloud transformation projects have very aggressive timelines. This frequently results in IT having to cut corners to accommodate and Privileged Access Management (PAM) lagging, exposing you to increased risk. Traditional PAM solutions don’t help. They are designed for the data center and don’t easily fit cloud and hybrid-cloud scenarios.

centrify partner

Traditional PAM Can’t Keep Up

Traditional PAM solutions were designed to support IT infrastructure and enterprise directories in the same data center network. With IT infrastructure and workloads migrating to the cloud, these legacy solutions can’t naturally extend. This puts enormous pressure on IT to try and fit a square peg into a round hole. They struggle to preserve consistent administrator access, security, risk, audit, and compliance. You risk going live without the requisite PAM controls in place.

centrify pam

Modern PAM Considerations

The cloud introduces additional use cases, attack surfaces, and risks that your PAM solution must accommodate. Many organizations use multiple cloud platforms, exacerbating the situation. New considerations include centralized PAM policy management across all hybrid IT assets; controlling access to the cloud provider front door – its management console; reducing local IAM privileged user account silos; continuously discovering virtual machines and automatically deploying PAM controls to bring them under management; adapting to an elastic compute environment; supporting a hybrid IT infrastructure without the pain of vault replication or complicated sync models; efficiently permitting admins to use their individual account to access infrastructure wherever it lives – the data center, DMZ, multiple VPCs, or multiple clouds – without directory replication.

Let Centrify Help

Centrify Cloud Suite leverages the native Centrify Platform to manage PAM policies centrally. As a SaaS service, it dovetails elegantly with your cloud environments, whether single cloud or multi-cloud. It aligns with your Zero Trust or zero standing privileges requirements, implementing a least privilege access control model that supports privilege elevation, just-in-time access requests, MFA on server login and privilege elevation, and host-based auditing, reporting, and session recording for proof of compliance and incident response.

With Centrify PAM, you can:

Centrally Manage Access

Simplify user authentication to servers from any directory service including Active Directory, LDAP, and cloud directories. Organizations can take advantage of the benefits of the cloud without compromising the level of privileged access security and enterprise access they currently have on-premises.

Elevate Privilege

Consistent with a least-privilege approach to PAM, you can enable users to elevate privilege to run privileged applications and commands. Elevated privileges are sufficient only for the task at hand and provisioned for a limited time.

Audit and Record Privileged Session Activity

Provide auditors and incident response teams with the tools and data they need. Give auditors reports as well as privileged session recordings for visual proof that controls are in place and effective. Transcribe privileged sessions so your teams can use the resulting meta data to search within recorded sessions. Capture events on the host at the shell and process level for granular forensic-level details.

Centrify Privileged Access Management:
Keep Up with Evolving Compliance Requirements

Compliance requires proof that security controls are in place and doing their job. With the growth of identity-related data breaches, mandates and regulations have responded, requiring more robust privileged access management controls. Thus, having visibility across your users and IT infrastructure, whether on-premises or in multiple clouds, is essential.


Don’t Let Digital Transformation Projects Reduce your Visibility

Many organizations are moving workloads to the cloud, whether a basic lift-and-shift or re-designing/re-platforming to take full advantage of the cloud economy, containers, and microservices. For many, this has also resulted in blind spots regarding blanket security controls and end-to-end auditing of privileged activity, putting them at risk of a breach and audit findings.

Even if you have solid PAM controls and auditing of privileged activity for your on-premises infrastructure, your PAM solution may not easily extend its reach to cloud-hosted workloads. Instead of forcing or running two different PAM stacks, you need a modern PAM solution designed for such hybrid IT models.

Let Centrify Help

Centrify PAM provides the trifecta of necessary capabilities from a single vendor through a single modern PAM stack. It includes privileged access controls for on-premises and cloud-hosted workloads, centralized policy and role management across the hybrid infrastructure, and cross-platform/cross-cloud auditing and session recording for centralized compliance auditing and reporting with no blind spots.

With Centrify PAM, you can:

Deploy PAM Controls Wherever They’re Needed

Centrify PAM controls access to your host systems, whether on-premises, in a private cloud, public cloud, or multi-cloud. It’s the same technology, so you get a consistent and predictable security blanket across your entire IT infrastructure to satisfy compliance requirements. You can enforce role-based access at the Vault Suite level and the host level for finer-grained access control and to ensure you don’t lose control should an attacker circumvent the vault.

Centrally Manage Access Control Policies

Having a single, centralized set of policies that govern access across all your IT assets is critical. It helps ensure complete visibility, consistency, and coverage.

Ensure Full Visibility into Privileged Activities

Log all privileged activity events at the vault level and the host level and automatically consolidate and correlate activity in a central audit store. This provides internal and external auditors with a centralized way to generate reports on user entitlements and user activity across all systems in the hybrid infrastructure.

Having a comprehensive view of user roles, rights, and privileged activities across Windows, Linux, UNIX, and network devices is challenging enough. This is compounded when that infrastructure spans the data center, cloud, and multi-cloud environments.

Centrify PAM provides comprehensive auditing, reporting, and session recording.

Get in Touch

+27 (0) 11-881-5943
Click to email
Request a Quote