© 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation www.centrify.com.

Slides:



Advertisements
Similar presentations
Mobile Care Everywhere. COMMUNITAKE CommuniTake provides operators with a comprehensive support platform including a native mobility VAS expansion aimed.
Advertisements

| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Govern the Flow of Data: Moving from Chaos to Control
Tech Ed North America /31/2017 9:47 PM Required Slide
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Customer Experience Solutions. Delivered. 1 BANK 2.0 Making Banks Successful in the Era of Engagement Banking.
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
Innovation the cloud for modern business
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
© 2012 SecureAuth. All rights reserved. 2-Factor Authentication and Single Sign-On in a Mobile World Thursday, December 5,
Empowering People-centric IT Speaker name 00/00/0000.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Thanks to Microsoft Azure’s Scalability, BA Minds Delivers a Cost-Effective CRM Solution to Small and Medium-Sized Enterprises in Latin America MICROSOFT.
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Single Identity – Multiple services how do I stay compliant? Wade Tongen NA Commercial SE.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Microsoft Identity and Access Solutions Market Trends and Futures
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Windows Azure Networking & Active Directory Nasir (Muhammad Nasiruddin) Developer Evangelist - Azure Microsoft Corporation
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
 HVL 2001 Password Management Using Directories to Cut Costs, Improve Productivity and Reduce Risk Guy Huntington, President HVL Derek Small, President.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Identity is the new Perimeter of Security Wade Tongen NA Enterprise SE Manager
User and Device Management
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
Powering the Cloud and Mobile Enterprise. The World is Changing Software is One Industry Employees CIOs are Technology Operators THE WORLD BEFORE Software.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Azure Active Directory Uday Hegde 2016 Redmond Summit | Identity Without Boundaries May 26, 2016 Group Program Manager, Azure AD
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Identity and Access Management Market to Global Analysis and Forecasts by Industries, Services No of Pages: 150 Publishing Date: Feb 2017 Single.
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: Feb 2017 Single User PDF: US$
Today’s challenges Data Users Apps Devices
Reduce Risk Across Hybrid IT
Secure Connected Infrastructure
The time to address enterprise mobility is now
Reduce Risk Across Hybrid IT
Cloud-First, Modern Windows Management and Security
SaaS Application Deep Dive
Manage mobile productivity with Enterprise Mobility + Security (EMS)
Forefront Security ISA
Product Datasheet AppSense DataNow 4.1
Reduce Risk Across Hybrid IT
Centrify Identity Service Balancing Security & Productivity
Secure & Unified Identity
BOMGAR REMOTE SUPPORT Karl Lankford
Company Overview & Strategy
Cloud Connect Seamlessly
Microsoft Virtual Academy
Access and Information Protection Product Overview October 2013
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Getting Started.
Getting Started.
TechEd /9/2018 1:09 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Protecting your data with Azure AD
System Center Marketing
TechEd /6/ :24 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Microsoft 365 Business Technical Fundamentals Series
Microsoft Virtual Academy
Presentation transcript:

© Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation (408)

2 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. The unique role played by identity…and the opportunity it presents Data center, cloud and mobile trends re-shaping enterprise IT Current state of enterprise identity and the impact of fragmented identity Unified Identity Services across data center, cloud and mobile Demonstration – Centrify Your Users, Centrify Your Security, Centrify Your IT Questions Today’s Discussion

3 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Based in Sunnyvale, CA with offices in Seattle, London, Munich, Hong Kong, Brisbane and Sao Paulo Founded in 2004 with over 300 personnel (2/3rds in engineering) Recently named Deloitte 2012 Technology Fast 500 Winner as one of North America’s Fastest Growing Companies Delivers software and cloud services that lets you securely leverage your existing identity infrastructure — Active Directory — across data center, cloud and mobile Support for 400+ operating systems and Apps Proven technology deployed by customers, over 40% of Fortune 50 Award-winning solutions and numerous industry certifications About Centrify Industry AwardsIndustry Certifications

4 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Some of our Customers BANKING & FINANCEPHARMA & HEALTHDEFENSE & GOVERNMENT RETAIL & INTERNETTECHNOLOGY & TELECOMAUTOMOTIVE & ENERGY

5 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. The Unique Role of Identity The fundamental means of distinguishing authorized from unauthorized access The primary tool for defining and enforcing IT control The front line of security defense Increasingly central to intelligence Security: Legitimate vs. malicious activity IT Ops: Resource use consistent with policy © 2012 Enterprise Management Associates, Inc.

6 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Industry Trends Cloud, mobile and compliance requirements are the three top business and technology waves impacting enterprise IT Identity is at the center of all three waves How will you manage identities to optimize user productivity, IT efficiency and compliance across data center, cloud and mobile?

7 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Current State of Enterprise Identity Multiple Logins for Users. Multiple Identity Infrastructures for IT. DATA CENTER DATA CENTER SERVERS DATA CENTER APPS MOBILE CLOUD ENTERPRISE ENDPOINTS ID

8 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. The Impact of Fragmented Identity The ideal can be hard to achieve when identity is scattered among Applications Systems Endpoints Mobile devices Third party apps Networks On premises SaaS, Cloud Etc. … From: The Rise of Data-Driven Security, EMA Research Report, 2012 © 2012 Enterprise Management Associates, Inc. Poor integration among security tools Too difficult to distinguish which security actions or policies are working and which are ineffective or unnecessary Most significant frustrations with IT security technologies? Top 2 responses:

9 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Centrify: Unified Identity Services One Single Login for Users. One Unified Identity Infrastructure for IT. Software and Cloud Services DATA CENTER DATA CENTER SERVERS DATA CENTER APPS MOBILE CLOUD ENTERPRISE ENDPOINTS Active Directory ID Centrify lets you securely leverage your existing identity infrastructure across data center, cloud and mobile

10 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Across Data Center = Unified Identity Services +, Cloud and Mobile Centrify Cloud Services Centrify Software Authentication / Single Sign-On (SSO) Auditing and reporting Self-service portal Mobile application management Encryption of data-in-motion Policy enforcement Authorization and role-based access control Mobile Zero Sign-on (ZSO) Mobile device management Etc.

11 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Single username/password across all their devices, systems and apps — on-premise and in the cloud Saves users time, improves their productivity, and gives them the freedom to use latest technology Self-service portal to manage their devices, update their AD attributes, provision access to SaaS apps and push company approved apps to their mobile devices Centrify Your Users

12 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Demonstration

13 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Centrify Reduces Post-it Note Budget by 50%

14 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. A “Big Easy Button” to control and audit access to 400+ operating systems and Apps … For Mac and Mobile: Lock down and authenticate your mobile devices and your Macs using the same tools you use for Windows For Servers: Granular role-based access control, auditing and privileged identity management for all your *nix and Windows servers For Apps: Role-based approach to setting up which users can access which apps as well as usage reporting … and do so by leveraging existing skillsets, processes and infrastructure you already own — Active Directory More security, e.g. disable a user in AD and that user will be automatically locked out of all apps/systems and devices wiped More quickly and easily meet regulatory and security requirements Centrify Your Security

15 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Makes IT’s life easier via a “single pane of glass” for policy and identity Reduces help desk burden and costs Single sign-on = eliminating calls re: lost/forgotten passwords User self-service = reducing calls re: lost devices, pushing corporate mobile apps, setting up users to access SaaS apps, etc. A standards and non-intrusive based approach Supports standards such as Kerberos, SAML, LDAP, PAM, etc. No schema changes to Active Directory or software on domain controllers, no appliances and no poked holes/software in DMZ Centrify’s integrated architecture across data center, cloud and mobile + leveraging existing Active Directory = faster and more successful deployments Centrify Your IT

16 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Demonstration

17 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Centrify: Unified Identity Services One Single Login for Users. One Unified Identity Infrastructure for IT. Software and Cloud Services DATA CENTER DATA CENTER SERVERS DATA CENTER APPS MOBILE CLOUD ENTERPRISE ENDPOINTS Active Directory ID Centrify lets you securely leverage your existing identity infrastructure across data center, cloud and mobile

18 © Centrify Corporation. All Rights Reserved. | Identify. Unify. Centrify. Resources and Next Steps Try Centrify Express for Free Centrify Express for UNIX, Linux and Mac Centrify Express for SaaS Centrify Express for Mobile Centrify Express for Mac Smartcard Request a Trial Chalktalks, Webinars, Whitepapers and Collateral Contact Us for More Information Centrify Corporation (408)

© Centrify Corporation. All Rights Reserved. Thank You