Centrify is enabling digital transformation at scale, modernizing how organizations secure privileged access across hybrid and multi-cloud environments by enforcing identity-centric Privileged Access Management (PAM) based on Zero Trust principles. In the context of PAM, Zero Trust requires establishing a root of trust, and then granting least privilege access based on verifying who is requesting access, the context of the request, as well as the risk of the access environment.
By implementing identity-centric PAM, organizations minimize the attack surface, improve audit and compliance visibility, and reduce risk, complexity and costs for the modern, hybrid enterprise. Over half of the Fortune 100, the world's largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches — privileged credential abuse.
Centrify is FedRAMP Authorized.
For more information, visit: https://www.centrify.com/.
Privileged Access Service
- Cloud-ready Zero Trust Privilege is designed to handle the rudimentary use case of privileged access management (PAM), which lies in granting access to privileged user accounts via a shared account, password or applications password and secrets vault, as well as securing remote access. Centrify Privileged Access Service allows for all the above as well as secure administrative access via jump box, workflow-driven access requests and approvals as well as multi-factor-authentication (MFA) at the vault.
- Cloud-ready Zero Trust Privilege is designed to handle requesters that are not only human but also machines, services and APIs. There will still be shared accounts, but for increased assurance, best practices now recommend individual identities, not shared accounts, where least privilege can be applied. Centrify Authentication Service allows properly verifying who requests privileged access. This can be achieved by leveraging enterprise directory identities, eliminating local accounts and decreasing the overall number of accounts and passwords, therefore reducing the attack surface.
Privilege Elevation Service
- Centrify Privilege Elevation Service minimizes the risk exposure to cyber-attacks caused by individuals with too much privilege. The service allows customers to implement just enough, just-in-time privileged access best practices and in turn limiting potential damage from security breaches.
Audit and Monitoring Service
- For privileged sessions it is best practice to audit everything. With a documented record of all actions performed it not only can be used in forensic analysis to find exactly the issue and attribute it to a specific user and session. Because these sessions are so critical it is also best practice to keep a video recording of the session that can be reviewed or used as evidence for your most critical assets or in highly regulated industries. With the Centrify Audit and Monitoring Service monitoring and session recording can be achieved through either a gateway-based and/or host-based technique. Advanced monitoring capabilities even allow for process launch and file integrity monitoring.
|Contract Name||Contract Number||Sector||State|
|SEWP V||Group A: NNG15SC07B; Group D: NNG15SC98B||Federal|
|State of California Multiple Award Schedule (CMAS)||3-16-70-1047B||State||California|