About Centrify

Our mission is to stop the leading cause of breaches – privileged access abuse. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment.

Partnership with SHI

By partnering with Centrify, organizations can minimize your attack surface, improve audit and compliance visibility, and reduce risk, complexity, and costs for your hybrid enterprise. Over half of the Fortune 100 trust SHI and Centrify to stop the leading cause of breaches – privileged credential abuse. Contact SHI 

Centrify Privileged Access Service

Putting Core Privileged Access Controls in Place

Cloud-ready Zero Trust Privilege is designed to handle the rudimentary use case of privileged access management (PAM), which lies in granting access to privileged user accounts via a shared account, password or applications password and secrets vault, as well as securing remote access. Centrify Privileged Access Service allows for all the above, as well as secure administrative access via jump box, workflow-driven access requests and approvals, and multi-factor-authentication (MFA) at the vault.

Large Graphic

Centrify Privileged Access Service Provides:

  • Shared Account and Password Vault
  • Application Passwords & Secrets Vault
  • Credential Management
  • Secure Remote Access
  • Secure Administrative Access via Jump Box
  • Access Request and Approval Workflow
  • MFA at Vault

Centrify Authentication Service

Going Beyond Discovering and Vaulting Passwords

Cloud-ready Zero Trust Privilege is designed to handle requesters that are not only human but also machines, services and APIs. There will still be shared accounts, but for increased assurance, best practices now recommend individual identities, where least privilege can be applied. Centrify Authentication Service properly verifies who requests privileged access by leveraging enterprise directory identities, eliminating local accounts, and decreasing the overall number of accounts and passwords, therefore reducing the attack surface.

Large Graphic

Centrify Authentication Service Provides:

  • Multi-Directory Brokering
  • Active Directory Bridging
  • Machine Identity and Credential Management
  • Local Account and Group Management
  • Centrify Zone Technology
  • Group Policy Management
  • MFA at System Login

Centrify Privilege Elevation Service

Establish Least Privilege Access to Reduce Attack Surface

Centrify Privilege Elevation Service minimizes the risk exposure to cyberattacks caused by individuals with too much privilege. The service allows customers to implement just enough, just-in-time privileged access best practices and in turn limiting potential damage from security breaches.

Large Graphic

Centrify Privilege Elevation Service Provides:

  • Privilege Elevation
  • Delegated Privilege Role and Policy Management
  • Time-Based Role Assignment
  • MFA at Privilege Elevation

Centrify Audit and Monitoring Service

Harden Your Environment with High Assurance

For privileged sessions, it is best practice to audit everything. A documented record of all actions performed can be used in forensic analysis to find exactly the issue and attribute it to a specific user and session. Because these sessions are so critical, it is also best practice to keep a video recording of the session that can be reviewed or used as evidence for your most critical assets or in highly regulated industries. With the Centrify Audit and Monitoring Service, monitoring and session recording can be achieved through either a gateway-based and/or host-based technique. Advanced monitoring capabilities even allow for process launch and file integrity monitoring.

Large Graphic

Centrify Audit and Monitoring Service Provides:

  • Session Recording and Auditing
  • Gateway Session Monitoring and Control
  • Host-Based Session Auditing, Recording, and Reporting

Related SHI Content

Ready to Learn More?

Contact us to discuss Centrify solutions for your organization.