Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.

Similar presentations


Presentation on theme: "Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users."— Presentation transcript:

1 Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users

2 Copyright © 2015 Centrify Corporation. All Rights Reserved. 2 Identity at Center of Cyber Attacks… ID END USERS PRIVILEGED USERS

3 Copyright © 2015 Centrify Corporation. All Rights Reserved. 3 Desktops Data Center Apps Data Center Servers + + + …and Harder to Manage as Infrastructure Evolves Cloud (IaaS & PaaS)Cloud (SaaS)MobileBig Data ID

4 Copyright © 2015 Centrify Corporation. All Rights Reserved. 4 Identity Challenges are Major User Productivity More accounts/passwords means users are less productive/secure Users want self-service for devices + apps, but hard to do given sprawl Users need remote access to on-premises apps + systems without hassle of VPNs app Security & Compliance Admins sharing/using more privileged accounts (e.g. local, root) = greater attack surface for APTs and insider threats “Shadow IT” proliferation = lack of control and visibility Islands of identity = more difficult compliance and security Operational Efficiency No single pane of glass = operational inefficiencies and security risks IT wants single “easy button” to completely provision/de-provision users Multiple infrastructures/processes across disparate systems + apps app

5 Copyright © 2015 Centrify Corporation. All Rights Reserved. 5 …and a Top Priority for IT Management Q: What are your top security-related projects in next 12 months? Select up to three. 13% SIEM 13% Firewall Management 12% DLP 10% Intrusion Management 8% Log Management 8% Keeping Up with New Technology 7% Security Awareness 6% Vulnerability Assessment 6% Monitoring Improvements 6% Encryption 6% Application Security 5% Web Content Filtering 4% Data Classification 4% PCI Compliance 4% Data Security 4% Cloud Computing Control 3% VPN/Remote Access 3% GRC 3% Directory Services 3% Datacenter Expansion/Consolidation 3% Anti-DDos 14% Identity Management 9% Mobile Device Management 9% Authorization/Access Control 8% Policy Management INFORMATION SECURITY PROJECTS Source: TheInfoPro (451 Research), Information Security Wave 16, 2014

6 Copyright © 2015 Centrify Corporation. All Rights Reserved. 6 Cloud (IaaS & PaaS)Big Data Centrify Unifies Identity Management… Desktops Data Center Apps Data Center Servers Cloud (SaaS) Mobile ID Active Directory ID Identity Platform ID

7 Copyright © 2015 Centrify Corporation. All Rights Reserved. 7 …via Single Identity Platform for End and Privileged Users Centrify Identity Platform Identity Service Privilege Service Server Suite SSO (SaaS and on-prem apps) MFA Provisioning Enterprise Mobility Mgmt Mac Mgmt Secure Remote Access Secure Remote Access Session Monitoring Shared Account Password Mgmt. Active Directory Bridge Privilege Mgmt Auditing Server Isolation

8 Copyright © 2015 Centrify Corporation. All Rights Reserved. 8 Centrify: Win-Win for Users + IT User Productivity Self-service for devices and apps equals instant productivity Single (or zero) sign-on for all apps (SaaS or rich mobile) Secure remote access — without hassle of VPNs — to on-premises apps and systems app Security & Compliance Fewer passwords, more granular policy equals less risk Individual and secure shared accounts for admins, SSO + mobile policy for users Comprehensive auditing equals greater control, better compliance Operational Efficiency Consolidated identity infrastructure across OS, app, device, location, etc. Lower TCO (H/W, S/W, time) and leveraging existing skillsets Faster time to provision/de-provision and faster replies to audits app

9 Copyright © 2015 Centrify Corporation. All Rights Reserved. 9 Automotive & EnergyTechnology & TelecomRetail & Internet Banking & FinancePharma & HealthDefense & Government Centrify: 5,000+ Customers, 97% Retention 6 of Top 10 Pharma Companies 2 of Top 4 Energy Companies 7 of Top 12 Worldwide Telcos 3 of Top 5 U.S. Retailers More Than 60 U.S. Federal Agencies 4 of Top 10 Financial Services Companies

10 Copyright © 2015 Centrify Corporation. All Rights Reserved. 10 Why Centrify? Addressing two major IT challenges: the shift to cloud and mobile and security as the perimeter dissolves Unique portfolio that unifies identity across cloud, mobile and data center — for end users and privileged users 11 year enterprise security company with over 450 personnel, global sales and support Trusted technology with 5,000+ customers – ~50% of Fortune 50 – and 97% retention rate Strategic alliances with Microsoft, Apple, AVG and Samsung; 250+ reseller partners

11 Copyright © 2015 Centrify Corporation. All Rights Reserved. 11 Thank You

12 Copyright © 2015 Centrify Corporation. All Rights Reserved. 12 Centrify: Unified Identity Management Centrify Identity Service Identity-as-a-Service for SaaS, mobile and on-prem apps Fully integrated mobile device and app management Mac authentication and Group Policy management Improve SaaS and mobile app/device security Centrify Server Suite Consolidated identity and Active Directory bridge Privilege management Comprehensive auditing Server isolation Minimize privileged user risk and improve compliance Centrify Privilege Service Shared account password management Secure remote access Privileged session monitoring Mitigate risk of shared accounts and improve compliance Centrify Identity Platform Cloud-based platform for directory, authentication, MFA and policy, reporting and secure cloud store across both end users and privileged users


Download ppt "Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users."

Similar presentations


Ads by Google