© Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation (408)
2 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. The unique role played by identity…and the opportunity it presents Data center, cloud and mobile trends re-shaping enterprise IT Current state of enterprise identity and the impact of fragmented identity Unified Identity Services across data center, cloud and mobile Demonstration – Centrify Your Users, Centrify Your Security, Centrify Your IT Questions Today’s Discussion
3 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Based in Sunnyvale, CA with offices in Seattle, London, Munich, Hong Kong, Brisbane and Sao Paulo Founded in 2004 with over 300 personnel (2/3rds in engineering) Recently named Deloitte 2012 Technology Fast 500 Winner as one of North America’s Fastest Growing Companies Delivers software and cloud services that lets you securely leverage your existing identity infrastructure — Active Directory — across data center, cloud and mobile Support for 400+ operating systems and Apps Proven technology deployed by customers, over 40% of Fortune 50 Award-winning solutions and numerous industry certifications About Centrify Industry AwardsIndustry Certifications
4 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Some of our Customers BANKING & FINANCEPHARMA & HEALTHDEFENSE & GOVERNMENT RETAIL & INTERNETTECHNOLOGY & TELECOMAUTOMOTIVE & ENERGY
5 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. The Unique Role of Identity The fundamental means of distinguishing authorized from unauthorized access The primary tool for defining and enforcing IT control The front line of security defense Increasingly central to intelligence Security: Legitimate vs. malicious activity IT Ops: Resource use consistent with policy © 2012 Enterprise Management Associates, Inc.
6 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Industry Trends Cloud, mobile and compliance requirements are the three top business and technology waves impacting enterprise IT Identity is at the center of all three waves How will you manage identities to optimize user productivity, IT efficiency and compliance across data center, cloud and mobile?
7 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Current State of Enterprise Identity Multiple Logins for Users. Multiple Identity Infrastructures for IT. DATA CENTER DATA CENTER SERVERS DATA CENTER APPS MOBILE CLOUD ENTERPRISE ENDPOINTS ID
8 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. The Impact of Fragmented Identity The ideal can be hard to achieve when identity is scattered among Applications Systems Endpoints Mobile devices Third party apps Networks On premises SaaS, Cloud Etc. … From: The Rise of Data-Driven Security, EMA Research Report, 2012 © 2012 Enterprise Management Associates, Inc. Poor integration among security tools Too difficult to distinguish which security actions or policies are working and which are ineffective or unnecessary Most significant frustrations with IT security technologies? Top 2 responses:
9 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Centrify: Unified Identity Services One Single Login for Users. One Unified Identity Infrastructure for IT. Software and Cloud Services DATA CENTER DATA CENTER SERVERS DATA CENTER APPS MOBILE CLOUD ENTERPRISE ENDPOINTS Active Directory ID Centrify lets you securely leverage your existing identity infrastructure across data center, cloud and mobile
10 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Across Data Center = Unified Identity Services +, Cloud and Mobile Centrify Cloud Services Centrify Software Authentication / Single Sign-On (SSO) Auditing and reporting Self-service portal Mobile application management Encryption of data-in-motion Policy enforcement Authorization and role-based access control Mobile Zero Sign-on (ZSO) Mobile device management Etc.
11 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Single username/password across all their devices, systems and apps — on-premise and in the cloud Saves users time, improves their productivity, and gives them the freedom to use latest technology Self-service portal to manage their devices, update their AD attributes, provision access to SaaS apps and push company approved apps to their mobile devices Centrify Your Users
12 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Demonstration
13 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Centrify Reduces Post-it Note Budget by 50%
14 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. A “Big Easy Button” to control and audit access to 400+ operating systems and Apps … For Mac and Mobile: Lock down and authenticate your mobile devices and your Macs using the same tools you use for Windows For Servers: Granular role-based access control, auditing and privileged identity management for all your *nix and Windows servers For Apps: Role-based approach to setting up which users can access which apps as well as usage reporting … and do so by leveraging existing skillsets, processes and infrastructure you already own — Active Directory More security, e.g. disable a user in AD and that user will be automatically locked out of all apps/systems and devices wiped More quickly and easily meet regulatory and security requirements Centrify Your Security
15 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Makes IT’s life easier via a “single pane of glass” for policy and identity Reduces help desk burden and costs Single sign-on = eliminating calls re: lost/forgotten passwords User self-service = reducing calls re: lost devices, pushing corporate mobile apps, setting up users to access SaaS apps, etc. A standards and non-intrusive based approach Supports standards such as Kerberos, SAML, LDAP, PAM, etc. No schema changes to Active Directory or software on domain controllers, no appliances and no poked holes/software in DMZ Centrify’s integrated architecture across data center, cloud and mobile + leveraging existing Active Directory = faster and more successful deployments Centrify Your IT
16 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Demonstration
17 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Centrify: Unified Identity Services One Single Login for Users. One Unified Identity Infrastructure for IT. Software and Cloud Services DATA CENTER DATA CENTER SERVERS DATA CENTER APPS MOBILE CLOUD ENTERPRISE ENDPOINTS Active Directory ID Centrify lets you securely leverage your existing identity infrastructure across data center, cloud and mobile
18 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Resources and Next Steps Try Centrify Express for Free Centrify Express for UNIX, Linux and Mac Centrify Express for SaaS Centrify Express for Mobile Centrify Express for Mac Smartcard Request a Trial Chalktalks, Webinars, Whitepapers and Collateral Contact Us for More Information Centrify Corporation (408)
© Centrify Corporation. All Rights Reserved. Thank You