Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America Channels
©2016 Centrify Corporation. All Rights Reserved. 2 Multiple points in the cyberattack chain Hackers target both end and privileged user’s credentials. Today’s Security Landscape Dissolving IT perimeter – data is everywhere SaaSIaaSAccess Anywhere Traditional perimeter-based security is not enough. #1 Point of attack — compromised credentials Mobile, Mac Enterprises no longer trust their networks Today’s security should be based upon context-based policies. Breach Accomplished 63% of data breaches are caused by compromised credentials. Mobile Identity Resources Zero Trust Model Identity is the New Perimeter
©2016 Centrify Corporation. All Rights Reserved. 3 Too Many Passwords Too Much Privilege DANGER RISK GOOD Establish Identity Assurance BETTER Limit Lateral Movement GREAT Enforce Least Privilege OPTIMAL Log & Monitor Today’s Threats Require Next-Generation Identity Platform Unified solution to reduce risk across cloud, mobile and data center RISK Comprehensive Privileged Access Security User-Level Auditing Reduce VPN Risk Automate App Provisioning Access Approval & Just-in-Time Access MFA Everywhere Get Identities Consolidated Get SSO Everywhere
©2016 Centrify Corporation. All Rights Reserved. 4 INFRASTRUCTURE-AS-A-SERVICE APPS ON PREMISES APPS SaaS INFRASTRUCTURE SERVERS INFRASTRUCTURE NETWORK PRIVILEGED ACCOUNTS PRIVILEGED ACCOUNTS PRIVILEGED ACCOUNTS PRIVILEGEDACCOUNTS Centrify Secures Access to Infrastructure and Apps PRIVILEGED ACCOUNTS (Employees, Contractors, Outsourced IT) Centrify Vision IT Users End Users OUTSOURCED IT PRIVILEGED IT USER CUSTOMER PARTNER END USER Secure Access to Infrastructure and Apps from Any Device for All Users
©2016 Centrify Corporation. All Rights Reserved. 5 Centrify Solutions CLOUD DIRECTORY AUTHENTICATION ENGINE FEDERATION ENGINE WORKFLOW ENGINE MFA / POLICY ENGINE REPORTING ENGINE SECURE DATA STORAGE Identity Service Single Sign-On Provisioning Enterprise Mobility Management Mac Management Privilege Service Shared Password Management Secure Remote Access Privileged Access Request Application Password Management Server Suite Identity Consolidation MFA for Servers Privilege Management Auditing Improved ROI One architecture Directory, MFA, Workflow Improved Security Consistent policy across apps, infrastructure, mobile and all users Continuous Compliance Visibility & control across hybrid IT
©2016 Centrify Corporation. All Rights Reserved. 6 Automotive & EnergyTechnology & TelecomRetail & Internet Banking & FinancePharma & HealthDefense & Government Trusted by over 5,000 Customers with 97% Retention 7 of Top 10 Pharma Companies 5 of Top 10 U.S. Oil and Gas Companies 6 of Top Worldwide Telcos 4 of Top 10 U.S. Retailers More Than 85 U.S. Federal Agencies 4 of Top 10 U.S. Financial Services Companies
©2016 Centrify Corporation. All Rights Reserved. 7 Why Choose Centrify? Protects against the leading point of attack used in data breaches — compromised credentials Protects end users and privileged users by stopping threats at multiple points in the cyberthreat chain Secures access to Apps and Infrastructure across your Hybrid IT environment of cloud, mobile and data center Trusted by over 5,000 customers, including more than half of the Fortune 50 Validated by third-party analysts as a Leader in cloud and privileged identity
©2016 Centrify Corporation. All Rights Reserved. 8 Named a Leader in the 2016 Gartner IDaaS Magic Quadrant A Leader in The Forrester Wave: Privileged Identity Management, Q One of Glassdoor Top 50 Best Places to Work for 2016 Clear Choice Winner in SSO Vendor Shootout, NetworkWorld The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester’s call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect the judgement at the time and are subject to change. Gartner “Magic Quadrant for Identity and Access Management as a Service” by Gregg Kreizman, June Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. A Recognized Leader
©2016 Centrify Corporation. All Rights Reserved. 9 Thank You
©2016 Centrify Corporation. All Rights Reserved. 10 BIG DATA APPLICATIONS CLOUD (IAAS & PAAS) NETWORK DEVICES DATA CENTER SERVERS PARTNER END USER PRIVILEGED IT USER CUSTOMER OUTSOURCED IT From Any Device For All Users Secure Access to Apps & Infrastructure Centrify Vision